<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Cybersecurity | Executive Consulting | In the Media

By: Adam Stahl
January 14th, 2020

Hopefully you’re reading this on a device that is running an operating system other than Windows 7. If not, I have some bad news for you. You’re on your own.

Blog Feature

Cybersecurity | Wireless | Networking | In the Media

By: Adam Stahl
December 17th, 2019

IoT devices pose uniquely terrifying security threats. Just ask a Waterbury, Connecticut, family who was awakened and harassed by hackers accessing their Ring security cameras. As part of their coverage of this incident, WFSB Channel 3 news asked Kelser to offer some insight into how hackers may have gotten access, and what can be done to secure IoT devices.


Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | In the Media | News

By: Jonathan Stone
December 6th, 2019

Simply having or transmitting data is a risk. It’s often a necessary risk—companies have to store and share data constantly in order to do business—but it’s important to remember that if something is deleted or isn’t shared, it’s much less likely to fall into the wrong hands. This is something we talk about with our cybersecurity clients throughout Connecticut on a regular basis. Part of our process is to take stock of who they are sharing data with and why. If there’s not a reason to be sharing a particular type of data with a particular party, then not sharing it cuts down on risk of it being breached at some point. If data isn’t in use anymore, deleting it eliminates something a hacker could get a hold of.

Blog Feature

Cybersecurity | In the Media

By: Brian Mulligan
November 21st, 2019

Connecticut-based Starling Physicians, which operates 32 locations in the greater Hartford area, announced a data breach this month linked to a cyber attack dating back to February. When we first learned of this breach, we were discussing it around the office and quickly learned that three Kelser employees are parents of kids who are patients at a Starling practice. NBC Connecticut stopped by our office both to hear from these parents and for insights on cybersecurity from me.

Blog Feature

Cybersecurity | Executive Consulting

By: Adam Stahl
October 30th, 2019

In case you haven’t heard, October is National Cybersecurity Awareness Month! Perhaps you’ve already checked out some tips and best practices to help keep you more secure. If you haven’t, not to worry as we have you covered with a roundup of tips and resources from our experts. If you have, you might find additional valuable cybersecurity awareness info below!

Blog Feature

Cybersecurity | Executive Consulting | Workforce Enablement | In the Media

By: Brian Mulligan
October 1st, 2019

I recently had the chance to help Reader’s Digest update an article titled “11 Things IT Professionals Don’t Want You To Know”. It’s no secret that IT is a little misunderstood. Part of our mission at Kelser is to connect IT strategy to the overall business strategy of our clients. When integrated into the company as a whole, IT can be a major business enabler, helping achieve goals across the business. It starts with viewing IT as more than fixing things when they break.

Blog Feature

Cybersecurity | Business Continuity | Disaster Recovery | In the Media

By: Adam Stahl
September 5th, 2019

It’s been a difficult summer for Connecticut public schools when it comes to cybersecurity. In addition to the three Connecticut school districts hit by cyber attacks in late July, it recently came to light that the Wolcott public school district suffered a devastating ransomware attack months ago from which it has not fully recovered. No data was stolen, but a great deal of data was locked and held for ransom, much of which was not backed up. As a result, teachers are starting the new school year without key materials.

Blog Feature


By: Andrew Tyler
September 2nd, 2019

Cybersecurity risks have been on the rise in recent years, and products and services have been constantly evolving to keep up with these threats: 83 percent of organizations say that they experienced phishing attacks in 2018, up from 76 percent in 2017. Social engineering attacks use psychology to trick people into revealing sensitive information such as passwords and credit card numbers by impersonating a trusted authority. Cryptocurrencies such as Bitcoin are a new (and lucrative) attack target.

Back to Top