<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Information technology blog, cybersecurity blog

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Cybersecurity | In the Media | News

By: Adam Stahl
April 16th, 2019

Kelser was in news outlets across the world this spring when the Associated Press quoted CEO Barry Kelly in an article titled “6 things small businesses can do to improve cybersecurity” which ran in the New York Times, Washington Post, ABC News, Daily Mail, Fox Business, and many more.

Blog Feature

Cybersecurity | In the Media | News

By: George W Kudelchuk III
March 20th, 2019

UConn Health announced a large data breach, and as is often the case, not many details were made available about it. In the hours after the announcement, two local news stations turned to Kelser to fill in the blanks.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | In the Media | News

By: Adam Stahl
March 12th, 2019

When the news emerged that there was a security issue in Google Chrome, Kelser provided NBC Connecticut with some expert perspective.

Blog Feature

Cybersecurity

By: Jonathan Stone
March 11th, 2019

Every year Cisco releases an annual Cybersecurity Report detailing the state of global cybersecurity. In the most recent edition, two key trends stood out to me as threats that every business owner and IT manager should be aware of and prepared for.

Blog Feature

Cybersecurity | Business Continuity | Disaster Recovery | Managed Services

By: George W Kudelchuk III
March 5th, 2019

Managed services providers (MSPs) offer 24/7 support for your entire IT infrastructure: software, hardware, and configurations. These services are remotely monitored and managed in order to keep a pulse on your IT environment at all times.

Blog Feature

Cybersecurity

By: Adam Stahl
January 18th, 2019

It seems like large-scale data breaches that expose thousands upon millions of records are regrettably becoming commonplace today. Protecting your personal and business data should be a priority for anyone that has ever entered information into a web form. Without taking proper steps to secure your data like login credentials, you could make yourself vulnerable to anything from phishing attacks to full account takeover (or even worse). Even a single breach can cost a business upwards of $2.3 million per attack (not to mention the costs related to things like the damage to your reputation) and personal accounts risk losing personal finances, priceless memories (like photos and videos), and more. One of the most basic ways to improve cybersecurity is to make sure you're following best practices for your passwords.

Blog Feature

Cybersecurity | In the Media | News

By: Adam Stahl
December 20th, 2018

By now, you’ve probably heard about the Starwood Hotel breach. In November, Marriott, the world’s largest hotel chain, confirmed that as many as 500 million people who made reservations at one of its Starwood properties could have had their personal information—including names, mailing addresses, phone numbers, dates of birth, passport and credit card info—stolen by Chinese hackers. Peter Aiken, associate professor of information systems at the Virginia Commonwealth University School of Business, calls the attack “the biggest threat to U.S. national security that we have ever faced” from a data breach.

Blog Feature

Cybersecurity | In the Media | News

By: Adam Stahl
December 19th, 2018

At the recent TEDxHartford event, Kelser Vice President of Professional Services Matt Kozloski spoke about cybersecurity. His goal -- and our goal as a Cybersecurity-as-a-Service provider -- is to change the way the we think about cybersecurity, so that it becomes part of our habits. Watch the video and enjoy some choice quotes below.