Kelser Blog, Media, and News
All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.
By:
Patrick Martin
October 03, 2022
Editor's note: This article was originally posted in 2016. It has been updated to reflect the latest information and insight.
By:
Patrick Martin
October 01, 2022
According to a 2022 study conducted by IBM, the average cost of a data breach is currently $4.35 million. And the popularity of ransomware, just one tool that cyber criminals use, continues to climb.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
Cybersecurity | Wireless | Networking
By:
Paul Tablan
September 22, 2022
Editor’s note: This article was originally posted in 2017 and has been updated to reflect new information.
By:
Patrick Martin
September 06, 2022
Editor’s note: This article was originally published in 2020 but has been updated to reflect the latest information.
Cybersecurity | Executive Consulting
By:
Karen Cohen
August 11, 2022
Editor’s note: This article was originally published in 2019, but has been updated to include new content.
By:
Karen Cohen
July 16, 2022
Like most business leaders, you have a lot of conflicting demands on your resources. There are budgets to consider, overhead costs, schedules, and myriad other implications for every decision you make.
By:
Karen Cohen
July 07, 2022
Like most business leaders you probably shudder every time you see a news story about a cyber attack. You may be crossing your fingers and hoping that your business won’t be the next victim. You may have shored up your IT infrastructure security and wondering what else you can do.
Cybersecurity | Information Security
By:
Patrick Martin
June 09, 2022
With ransomware attacks a frequent topic of news reports, most people understand that money is often a motivating factor. But, while that is a powerful motivator, it isn’t the only reason hackers take action.