<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Cybersecurity | Managed Services

By: Kelser
June 21, 2018

The internet has transformed life as we know it. From almost anywhere on the planet, you can get almost anything done, anywhere. But that global reach and high speed have drawbacks. Cybercrooks and their nefarious hacking tools can operate anywhere too, and they can reach deep into your IT systems, potentially causing terrible damage at the center of your organization. The good news is that tools and protocols for combating security breaches are evolving all the time, too.

Blog Feature

Cybersecurity | In the Media | News

By: Adam Stahl
June 19, 2018

Kelser has worked with Hoffman Auto Group to update and optimize many of their systems, including cybersecurity. One of the last pieces to address for the well-known Connecticut auto dealer was cybersecurity awareness for its employees. In a story on their evening news, New Haven-based ABC affiliate WTNH showed how Kelser created a very convincing phishing email from a Hoffman executive to simulate a cyber attack on employees.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | Managed Services

By: Kelser
June 14, 2018

Moving toward a mobile workforce is best implemented with the help of IT services providers in CT. While a bring-your-own-device (BYOD) policy helps cut costs on hardware, it opens the door to vulnerabilities. Experienced IT personnel can help guide you through learning proactive steps to keep your network safe from cyberattacks.

Blog Feature

Cybersecurity | Workforce Enablement | Managed Services

By: Kelser
June 13, 2018

The IoT (Internet of Things) technology has played a pivotal role in many businesses, especially for companies in the manufacturing industry. IoT has transformed the identity of manufacturing companies, as they have spent over $178 billion in 2016, according to IDC data. This number is only expected to continue to grow as more businesses transition into using IoT technology.

Blog Feature

Cybersecurity | Managed Services

By: Kelser
June 07, 2018

Cyber security in Connecticut is not just for financial institutions and social media platforms. All businesses need to protect themselves from any threats to the sensitive and confidential information that they use and store. This could be client, employee, or business information, but one thing is certain--- hackers are getting smarter and more cunning in their tactics. It’s time to make sure data security IT services in CT are a priority.

Blog Feature

Cybersecurity | Executive Consulting | Wireless | Networking | In the Media | News

By: Jonathan Stone
May 31, 2018

Earlier this week, the FBI urged thousands of small business and home office internet users to reboot their routers to prevent the impact of VPNFilter, the latest malware threat to businesses and consumers. Hours after the story broke, I was invited to WTNH News 8's studios to do a Facebook live Q&A.

Blog Feature

Cybersecurity | Wireless | Networking | Managed Services

By: Kelser
May 22, 2018

IT providers in Connecticut are now providing services for banks and other financial institutions which must incorporate IoT, or Internet of Things, strategy. Wireless technology has grown into a dominating force in the market today, and those operations which don't incorporate it into regular business are apt to feel the sting of increased cost and decreased competitiveness.

Blog Feature

Cybersecurity | Managed Services

By: Kelser
May 17, 2018

Social engineering attacks continue to become more complex. A social engineering scheme focuses on an employee giving up personal information, such as passwords or other login credentials. These attacks can target individuals through email, social media, or even over the phone. However, an IT services provider in CT can help you avoid these attacks by providing additional training for employees and offering around-the-clock monitoring services. Here are the three most common social engineering schemes:

Back to Top