<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Cybersecurity

By: Karen Cohen
April 30, 2022

People who want to gain unauthorized access to information often use social engineering tactics that capitalize on human instincts. Tailgating and piggybacking are social engineering tactics that have nothing to do with riding the bumper of the car in front of you on the highway, playing cornhole at a football game, or carrying someone on your back.

Blog Feature

Managed Services | In the Media

By: Tim Colby
April 25, 2022

Love it or hate it, remote work is here to stay. I reflected on what the last two years have taught us about remote work in an article for the CT Mirror. Two years ago, IT workers scrambled to make remote work not only feasible but productive. It's been a crucial aspect in keeping America working ever since.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity

By: Patrick Martin
April 23, 2022

You can’t turn on the news these days without hearing about the latest data breach, ransomware attack, or other cybersecurity threats. The threat landscape seems to change daily.

Blog Feature

IT Support | Cost

By: Karen Cohen
April 22, 2022

If you are considering working with an outside IT service provider, you’ve probably noticed that there are a variety of options. If you’re already in the decision-making process, you may be wondering how something that seems to be similar can vary so widely in cost.

Blog Feature

Cybersecurity | IT Support | Information Security

By: Karen Cohen
April 20, 2022

Business leaders know that social engineering attacks are on the rise. These attacks, in which people with bad intentions manipulate users into taking actions that will provide access to information or networks, take many forms.

Blog Feature

Networking | In the Media

By: Dave Bykowski
April 18, 2022

See this article as it originally appeared in Industry Today.

Blog Feature

Cybersecurity | Compliance

By: Dave Bykowski
April 16, 2022

If you are a business leader for a manufacturer that is part of the U.S. Defense Industrial Base, you are likely awaiting word about the new CMMC 2.0 standards. You may be checking the internet every week to see if there is any news about when they will be released. You may be wondering what the new standards will require of your organization.

Blog Feature

IT Support | Information Security

By: Tim Colby
April 15, 2022

In the old days, when people had important documents they wanted to keep secure, they would lock them in a filing cabinet. The only people who could access the files would have a key or would need to contact the file administrator.

Back to Top