<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Cybersecurity | In the Media | News

By: Kelser
March 20, 2019

UConn Health announced a large data breach, and as is often the case, not many details were made available about it. In the hours after the announcement, two local news stations turned to Kelser to fill in the blanks.

Blog Feature

Cybersecurity | In the Media | News

By: Adam Stahl
March 12, 2019

When the news emerged that there was a security issue in Google Chrome, Kelser provided NBC Connecticut with some expert perspective.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity

By: Jonathan Stone
March 11, 2019

Every year Cisco releases an annual Cybersecurity Report detailing the state of global cybersecurity. In the most recent edition, two key trends stood out to me as threats that every business owner and IT manager should be aware of and prepared for.

Blog Feature

Cybersecurity | Business Continuity | Disaster Recovery | Managed Services

By: Adam Stahl
March 05, 2019

Managed services providers (MSPs) offer 24/7 support for your entire IT infrastructure: software, hardware, and configurations. These services are remotely monitored and managed in order to keep a pulse on your IT environment at all times.

Blog Feature

Cybersecurity | IT Lifecycle Management | Managed Services

By: Adam Stahl
January 17, 2019

As technology relentlessly pushes forward, you and your organization will undoubtedly need to upgrade your hardware. However, you can’t simply forget about your old hardware while reaping the benefits of replacing it with the latest and greatest. You should be excited about the upgrade, but how will you transfer data from your old equipment to the new? How will you erase data from the original hardware?

Blog Feature

Cybersecurity | In the Media | News

By: Adam Stahl
December 20, 2018

By now, you’ve probably heard about the Starwood Hotel breach. In November, Marriott, the world’s largest hotel chain, confirmed that as many as 500 million people who made reservations at one of its Starwood properties could have had their personal information—including names, mailing addresses, phone numbers, dates of birth, passport and credit card info—stolen by Chinese hackers. Peter Aiken, associate professor of information systems at the Virginia Commonwealth University School of Business, calls the attack “the biggest threat to U.S. national security that we have ever faced” from a data breach.

Blog Feature

Cybersecurity | In the Media | News

By: Adam Stahl
December 19, 2018

At the recent TEDxHartford event, Kelser Vice President of Professional Services Matt Kozloski spoke about cybersecurity. His goal -- and our goal as a Cybersecurity-as-a-Service provider -- is to change the way the we think about cybersecurity, so that it becomes part of our habits. Watch the video and enjoy some choice quotes below.

Blog Feature

Cybersecurity

By: Adam Stahl
November 15, 2018

Each organization has its own approach to cybersecurity—some of them better than others. While many small businesses take a proactive role by working with third-party managed security service providers, others are content to employ “security through obscurity,” hoping that there will always be a bigger, more appealing target. Unfortunately, every business is a potential target for cyber criminals.

Back to Top