<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Cybersecurity | IT Lifecycle Management | Managed Services

By: Adam Stahl
August 29, 2018

IT hardware, like cars, are depreciating assets. As soon as you drive them off the proverbial lot, they begin to lose value. The reason for this depreciation is twofold: the product will eventually wear down, and newer models will be released with greater specs. Keeping this in mind, how often should you refresh your IT assets? To understand the answer to this question, let’s look at the IT-asset lifecycle management.

Blog Feature

Cybersecurity | In the Media | News

By: Adam Stahl
August 28, 2018

RealClearLife, an online "guide to a life well lived," recently published an article called "25 Tips from Cybersecurity Experts on Protecting Your Data." The tips pull from experts from a wide range of backgrounds, including President George W Bush's White House CIO Theresa Payton and Kelser Vice President of Professional Services Matt Kozloski. Matt's quote points to one of our favorite tools: Cisco Umbrella, formerly known as OpenDNS:

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Networking | Managed Services

By: Kelser
August 28, 2018

A managed network is a type of communication network that is built, operated, secured and managed by a third-party service provider.

Blog Feature

Cybersecurity | Business Continuity | Disaster Recovery | In the Media | News

By: Adam Stahl
August 16, 2018

Last month, Kelser was thrilled to be invited back to the 94.9 FM CBS Radio airwaves for another episode of Real Estate Radio (listen to the first appearance here). I actually love this radio show. It seems so random—a full hour about real estate—but the hosts Byron Lazine and Pat Kenny use real estate as a jumping off point to talk about a wide range of topics that affect quality of life and where people choose to live. This time around they focused on hot topics in the tech world including Facebook privacy and the GDPR, ransomware, and phishing following high-profile cyber attacks in Connecticut.

Blog Feature

Cybersecurity | Networking

By: Kelser
August 15, 2018

Network security services are designed to protect the usability and integrity of your network and data. This includes both hardware and software technologies.

Blog Feature

Cybersecurity | Compliance

By: Dave Bykowski
August 10, 2018

Trust can be a precarious thing. One mistake could ruin it forever. You spend so much time and energy building trust with your customers, vendors, contractors, and partners, that the last thing you want to do is lose it, particularly over non-compliance. Believe it or not, record keeping and data handling is critical to maintaining that trust.

Blog Feature

Networking

By: Kelser
August 07, 2018

Network management services provide complete support for the management and support processes for Local Area Networks (LAN) and Wide Area Networks (WAN). Services are provided either on-site or remotely

Blog Feature

Networking

By: Kelser
August 02, 2018

What are IT Network Services? IT network services are designed to facilitate a networks operation. It typically is provided by a server (which can be running one or more services), based on network protocols running at the application layer in the Open Systems Interconnection (OSI) model of the network.

Back to Top