Kelser Blog, Media, and News
All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.
By:
Patrick Martin
May 06, 2022
If you’re considering working with an outside IT provider, you’ve likely noticed that many of them promise the services of a virtual Chief Information Officer (vCIO) to their customers. You may be wondering what a vCIO is and the role they play. You may also wonder what advantage a vCIO will provide for your organization.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
By:
Tim Colby
May 04, 2022
If your organization is like most, you probably have an IT environment that includes a variety of platforms (devices and operating systems), with employees at different levels who need access to and the ability to share applications and documents.
By:
Karen Cohen
April 30, 2022
People who want to gain unauthorized access to information often use social engineering tactics that capitalize on human instincts. Tailgating and piggybacking are social engineering tactics that have nothing to do with riding the bumper of the car in front of you on the highway, playing cornhole at a football game, or carrying someone on your back.
Managed Services | In the Media
By:
Tim Colby
April 25, 2022
Love it or hate it, remote work is here to stay. I reflected on what the last two years have taught us about remote work in an article for the CT Mirror. Two years ago, IT workers scrambled to make remote work not only feasible but productive. It's been a crucial aspect in keeping America working ever since.
By:
Patrick Martin
April 23, 2022
You can’t turn on the news these days without hearing about the latest data breach, ransomware attack, or other cybersecurity threats. The threat landscape seems to change daily.
By:
Karen Cohen
April 22, 2022
If you are considering working with an outside IT service provider, you’ve probably noticed that there are a variety of options. If you’re already in the decision-making process, you may be wondering how something that seems to be similar can vary so widely in cost.
Cybersecurity | IT Support | Information Security
By:
Karen Cohen
April 20, 2022
Business leaders know that social engineering attacks are on the rise. These attacks, in which people with bad intentions manipulate users into taking actions that will provide access to information or networks, take many forms.