<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

IT Support | Information Security

By: Tim Colby
April 15, 2022

In the old days, when people had important documents they wanted to keep secure, they would lock them in a filing cabinet. The only people who could access the files would have a key or would need to contact the file administrator. 

Blog Feature

Cybersecurity

By: Karen Cohen
April 13, 2022

As a business leader, you understand that your IT infrastructure is important. You have invested in technology that positions your business for success. You’ve put security measures in place to keep your data safe. But, you know that risks still exist. You want to minimize them. 

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Networking | In the Media

By: Patrick Martin
April 11, 2022

See this article as it originally appeared in the New England Real Estate Journal.

Blog Feature

IT Support

By: Lisa Carroll
April 08, 2022

You’ve made the initial decision. You need help. You’ve collected extensive information from several IT providers. At this point, you may be feeling overwhelmed by your options. 

Blog Feature

Cybersecurity

By: Karen Cohen
April 07, 2022

As a business or technology leader, you are likely familiar with the term “phishing.” You may have a general idea of what it means and what it looks like. You (or one of your colleagues) may have even fallen prey to a phishing attack (and may not even know it yet). 

Blog Feature

Cybersecurity | Compliance

By: David Bykowski
April 06, 2022

I see it all the time. A business gets hacked and comes to an IT provider for a solution. Unfortunately, once a breach occurs, the only solution is remediation. The best advice I can give any business is to put a cybersecurity plan in place before an incident happens. 

Blog Feature

Cybersecurity

By: David Bykowski
April 02, 2022

Are you waiting for IT support? Still waiting? Tempted to find your own solution? We understand, but, please…don’t take matters into your own hands.

Blog Feature

IT Support

By: Jim Parise
April 01, 2022

Your IT provider has always been very responsive to your needs. Somehow, that hasn’t been the case lately. They keep saying there’s a bottleneck. They blame the global supply chain and shipping delays. What’s really going on? 

Back to Top