Kelser Blog, Media, and News
All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.
Cybersecurity | Managed Services
By:
Kelser
June 21, 2018
The internet has transformed life as we know it. From almost anywhere on the planet, you can get almost anything done, anywhere. But that global reach and high speed have drawbacks. Cybercrooks and their nefarious hacking tools can operate anywhere too, and they can reach deep into your IT systems, potentially causing terrible damage at the center of your organization. The good news is that tools and protocols for combating security breaches are evolving all the time, too.
Cybersecurity | In the Media | News
By:
Adam Stahl
June 19, 2018
Kelser has worked with Hoffman Auto Group to update and optimize many of their systems, including cybersecurity. One of the last pieces to address for the well-known Connecticut auto dealer was cybersecurity awareness for its employees. In a story on their evening news, New Haven-based ABC affiliate WTNH showed how Kelser created a very convincing phishing email from a Hoffman executive to simulate a cyber attack on employees.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
Cybersecurity | Managed Services
By:
Kelser
June 14, 2018
Moving toward a mobile workforce is best implemented with the help of IT services providers in CT. While a bring-your-own-device (BYOD) policy helps cut costs on hardware, it opens the door to vulnerabilities. Experienced IT personnel can help guide you through learning proactive steps to keep your network safe from cyberattacks.
Cybersecurity | Workforce Enablement | Managed Services
By:
Kelser
June 13, 2018
The IoT (Internet of Things) technology has played a pivotal role in many businesses, especially for companies in the manufacturing industry. IoT has transformed the identity of manufacturing companies, as they have spent over $178 billion in 2016, according to IDC data. This number is only expected to continue to grow as more businesses transition into using IoT technology.
Cybersecurity | Managed Services
By:
Kelser
June 07, 2018
Cyber security in Connecticut is not just for financial institutions and social media platforms. All businesses need to protect themselves from any threats to the sensitive and confidential information that they use and store. This could be client, employee, or business information, but one thing is certain--- hackers are getting smarter and more cunning in their tactics. It’s time to make sure data security IT services in CT are a priority.
Cybersecurity | Executive Consulting | Wireless | Networking | In the Media | News
By:
Jonathan Stone
May 31, 2018
Earlier this week, the FBI urged thousands of small business and home office internet users to reboot their routers to prevent the impact of VPNFilter, the latest malware threat to businesses and consumers. Hours after the story broke, I was invited to WTNH News 8's studios to do a Facebook live Q&A.
Cybersecurity | Wireless | Networking | Managed Services
By:
Kelser
May 22, 2018
IT providers in Connecticut are now providing services for banks and other financial institutions which must incorporate IoT, or Internet of Things, strategy. Wireless technology has grown into a dominating force in the market today, and those operations which don't incorporate it into regular business are apt to feel the sting of increased cost and decreased competitiveness.
Cybersecurity | Managed Services
By:
Kelser
May 17, 2018
Social engineering attacks continue to become more complex. A social engineering scheme focuses on an employee giving up personal information, such as passwords or other login credentials. These attacks can target individuals through email, social media, or even over the phone. However, an IT services provider in CT can help you avoid these attacks by providing additional training for employees and offering around-the-clock monitoring services. Here are the three most common social engineering schemes: