<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Cybersecurity | Managed Services

By: Kelser
March 19, 2018

The bring-your-own-device (BYOD) business model is ideal for small to mid-sized companies that want to save money on computer equipment. By allowing employees to bring devices from home, your IT provider in Connecticut can help cut computer costs. You simply need to provide your workforce with a cloud computing solution, such as setting up a private cloud. Here are steps to implement a secure BYOD solution to help your bottom line:

Blog Feature

Cybersecurity | News | Foundation

By: Adam Stahl
March 14, 2018

If there are two things we love here at Kelser, it's charities and sports. Our Kelser Foundation has raised over $900,000 for worthy causes over the years, and as a sponsor of UConn Athletics, we are pretty excited about postseason college basketball.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | Networking | Managed Services

By: Kelser
March 05, 2018

Safeguarding your firm’s network security should be one of your top priorities. This is important, especially now that malicious hackers have become cunning and look for vulnerabilities to attack their victims. Improving your network security is something that can be done with the guidance of an IT consultant in Connecticut. Speaking to one of these professionals will help you hack-proof your IT network and keep malicious attackers at bay.

Blog Feature

Cybersecurity | In the Media | News

By: Adam Stahl
March 03, 2018

Heading into tax season, Kelser Vice President of Professional Services Matt Kozloski and Commissioner of the Connecticut Department of Consumer Protection Michelle H. Seagull appeared on WTNH's Good Morning Connecticut and the MetroHartford Alliance's "Pulse of the Region" radio show to talk about tax scams and how businesses can avoid them.

Blog Feature

Cybersecurity | Managed Services

By: Kelser
February 28, 2018

Imagine hanging out on your couch, playing video games after a grueling day at work. You look up and spot a thief looking through your china cabinet. You would likely demand the thief identify himself and explain his actions. You would also call the police. This scenario is similar to what happens with computers and networks on a daily basis. However, plenty of the victims are unaware their digital belongings are being rummaged through. This is precisely why you need the assistance of IT services experts in CT.

Blog Feature

Cybersecurity

By: Adam Stahl
February 27, 2018

Twelve Connecticut state agencies were impacted by a cyber attack over the weekend. According to reports, the cyber attack appeared to be the nefarious ransomware WannaCry that wreaked havoc worldwide in 2017. Officials say that even though approximately 160 computers across twelve agencies were affected, the outbreak was contained by Sunday night and there were no reports of encryption or data loss. Fortunately, it appears that the state was able to effectively mitigate ill effects from the attack. As we’ve discussed with Arthur House, Chief Cybersecurity Risk Officer for the State of Connecticut, our state is an international leader in cybersecurity. This was demonstrated in the state’s response to the attack.

Blog Feature

Cybersecurity | Wireless | Networking | In the Media | News

By: Adam Stahl
February 26, 2018

Kelser COO & CTO Jonathan Stone was quoted in an article about Wi-Fi security for Inc.com sponsored by Comcast Business. The article explores the different types of wi-fi hacks in detail and recounts how Kelser has been known to demonstrate how "evil twin" attacks work by setting up our own fake networks at conferences and then revealing them to attendees.

Blog Feature

Cybersecurity | Managed Services

By: Kelser
February 22, 2018

Social engineering attacks are becoming increasingly more prevalent. These types of attacks are designed to steal valuable data, which can result in identity theft and cause a whole host of issues for companies and individuals. If you are interested in learning more, the following information from IT services experts in CT will identify the various types of social engineering schemes and the best ways to avoid them:

Back to Top