<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Information technology blog, cybersecurity blog

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Cybersecurity | Executive Consulting | Workforce Enablement | In the Media

By: Brian Mulligan
October 1st, 2019

I recently had the chance to help Reader’s Digest update an article titled “11 Things IT Professionals Don’t Want You To Know”. It’s no secret that IT is a little misunderstood. Part of our mission at Kelser is to connect IT strategy to the overall business strategy of our clients. When integrated into the company as a whole, IT can be a major business enabler, helping achieve goals across the business. It starts with viewing IT as more than fixing things when they break.

Blog Feature

Cybersecurity | Business Continuity | Disaster Recovery | In the Media

By: Adam Stahl
September 5th, 2019

It’s been a difficult summer for Connecticut public schools when it comes to cybersecurity. In addition to the three Connecticut school districts hit by cyber attacks in late July, it recently came to light that the Wolcott public school district suffered a devastating ransomware attack months ago from which it has not fully recovered. No data was stolen, but a great deal of data was locked and held for ransom, much of which was not backed up. As a result, teachers are starting the new school year without key materials.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | In the Media

By: Andrew Tyler
August 20th, 2019

Earlier this year, a simple thought occurred to me. Hackers are the new mafia. Cybercrime is the newest part of the organized crime business model. How could looking at things this way change the cybersecurity landscape?

Blog Feature

Cybersecurity | In the Media

By: Adam Stahl
August 15th, 2019

In late July, three Connecticut school districts experienced or became aware of data breaches or cyberattacks. The school districts of New Haven, Wallingford, and Pomfret were affected. NBC Connecticut interviewed Kelser’s George W. Kudelchuk III for a story that covers each of the three school districts.

Blog Feature

Cybersecurity | In the Media | News

By: Adam Stahl
August 8th, 2019

Less than 12 hours after the massive Capital One data breach was announced on a Monday night, Kelser CTO Jonathan Stone was on the phone with a reporter from The Washington Post helping break down the role of cloud storage in the story. In the days that followed, Kelser experts were on all four local Connecticut TV networks to provide perspective on this breach.

Blog Feature

Cybersecurity

By: Jonathan Stone
August 5th, 2019

Improving record keeping and data handling is critical to keeping the trust of partners, vendors, contractors, and customers. The importance is magnified when the federal government is involved, with the goal of creating a national culture of cybersecurity that protects the information of our businesses, citizens, and government. The National Institute of Standards and Technology (NIST) created Special Publication 800-171 to help protect Controlled Unclassified Information. But what does that actually look like? How will you know you’re meeting the standards laid out in NIST 800-171? What is CUI?

Blog Feature

Cybersecurity | In the Media | News

By: Jonathan Stone
July 17th, 2019

I recently visited the set of Good Morning Connecticut to talk about the biggest cybersecurity stories in the news right now.

Blog Feature

Cybersecurity | Networking

By: Patty Luxton
June 26th, 2019

Here at Kelser, we’ve been in the IT consulting business for nearly four decades. By now, we’ve heard every excuse in the book from companies who don’t want to take a proactive approach to network security services.