Kelser Blog, Media, and News
All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.
Cybersecurity | Information Security
By:
Patrick Martin
May 12, 2022
Everyone knows that cybersecurity is important. We all want to prevent people from accessing our data and using it to their advantage.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
By:
Karen Cohen
April 30, 2022
People who want to gain unauthorized access to information often use social engineering tactics that capitalize on human instincts. Tailgating and piggybacking are social engineering tactics that have nothing to do with riding the bumper of the car in front of you on the highway, playing cornhole at a football game, or carrying someone on your back.
By:
Patrick Martin
April 23, 2022
You can’t turn on the news these days without hearing about the latest data breach, ransomware attack, or other cybersecurity threats. The threat landscape seems to change daily.
Cybersecurity | IT Support | Information Security
By:
Karen Cohen
April 20, 2022
Business leaders know that social engineering attacks are on the rise. These attacks, in which people with bad intentions manipulate users into taking actions that will provide access to information or networks, take many forms.
By:
Dave Bykowski
April 16, 2022
If you are a business leader for a manufacturer that is part of the U.S. Defense Industrial Base, you are likely awaiting word about the new CMMC 2.0 standards. You may be checking the internet every week to see if there is any news about when they will be released. You may be wondering what the new standards will require of your organization.
By:
Karen Cohen
April 13, 2022
As a business leader, you understand that your IT infrastructure is important. You have invested in technology that positions your business for success. You’ve put security measures in place to keep your data safe. But, you know that risks still exist. You want to minimize them.
By:
Karen Cohen
April 07, 2022
As a business or technology leader, you are likely familiar with the term “phishing.” You may have a general idea of what it means and what it looks like. You (or one of your colleagues) may have even fallen prey to a phishing attack (and may not even know it yet).