<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Cybersecurity | Managed Services

By: Kelser
September 05, 2018

What Does a Managed Security Service Provider do? A managed security service provider (MSSP) provides outsourced monitoring and management of security devices and systems.

Blog Feature

Cybersecurity | IT Lifecycle Management | Managed Services

By: Adam Stahl
August 29, 2018

IT hardware, like cars, are depreciating assets. As soon as you drive them off the proverbial lot, they begin to lose value. The reason for this depreciation is twofold: the product will eventually wear down, and newer models will be released with greater specs. Keeping this in mind, how often should you refresh your IT assets? To understand the answer to this question, let’s look at the IT-asset lifecycle management.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | In the Media | News

By: Adam Stahl
August 28, 2018

RealClearLife, an online "guide to a life well lived," recently published an article called "25 Tips from Cybersecurity Experts on Protecting Your Data." The tips pull from experts from a wide range of backgrounds, including President George W Bush's White House CIO Theresa Payton and Kelser Vice President of Professional Services Matt Kozloski. Matt's quote points to one of our favorite tools: Cisco Umbrella, formerly known as OpenDNS:

Blog Feature

Cybersecurity | Business Continuity | Disaster Recovery | In the Media | News

By: Adam Stahl
August 16, 2018

Last month, Kelser was thrilled to be invited back to the 94.9 FM CBS Radio airwaves for another episode of Real Estate Radio (listen to the first appearance here). I actually love this radio show. It seems so random—a full hour about real estate—but the hosts Byron Lazine and Pat Kenny use real estate as a jumping off point to talk about a wide range of topics that affect quality of life and where people choose to live. This time around they focused on hot topics in the tech world including Facebook privacy and the GDPR, ransomware, and phishing following high-profile cyber attacks in Connecticut.

Blog Feature

Cybersecurity | Networking

By: Kelser
August 15, 2018

Network security services are designed to protect the usability and integrity of your network and data. This includes both hardware and software technologies.

Blog Feature

Cybersecurity | Compliance

By: Dave Bykowski
August 10, 2018

Trust can be a precarious thing. One mistake could ruin it forever. You spend so much time and energy building trust with your customers, vendors, contractors, and partners, that the last thing you want to do is lose it, particularly over non-compliance. Believe it or not, record keeping and data handling is critical to maintaining that trust.

Blog Feature

Cybersecurity | In the Media | News

By: Adam Stahl
July 28, 2018

Kelser Vice President of Professional Services Matt Kozloski returned to the 94.9 FM CBS Radio airwaves for another episode of Real Estate Radio. Using recent high profile hacks in Connecticut as a jumping off point, the hour-long conversation focused on hot topics in the tech world including Facebook privacy and the GDPR, ransomware, and phishing.

Blog Feature

Cybersecurity

By: Kelser
July 17, 2018

Many organizations lack a dedicated IT security professional on staff. Implementing Cybersecurity as a Service (CSaaS) enables businesses to forgo hiring a costly, full-time security staff member allowing them to only pay for the services their unique organization requires.

Back to Top
Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn’t as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.