<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Cybersecurity | Managed Services

By: Kelser
February 06, 2018

Web filtering is a common question of concern that many IT services providers in CT are receiving today. Most business managers would ask whether it is appropriate to filter certain sites so that they are not accessible to their employees. Well, whether to filter some sites or not depends on a specific business’ requirements.

Blog Feature

Cybersecurity | Managed Services

By: Kelser
February 05, 2018

It is essential to partner with an IT provider in CT that can provide a vulnerability assessment for your organization as data breaches and cyber attacks are occurring at an alarming pace. A vulnerability assessment simply means the process of identifying any weakness within the network or infrastructure. These assessments can help your business locate any security loopholes or coding errors. It can be performed on a frequent basis. According to a recent analysis, it is expected that over 30% of the Global 2000 companies will suffer a security incident by 2020.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity

By: Adam Stahl
January 05, 2018

Just under a week into the New Year and the world is already experiencing the first critical vulnerability in 2018. Researchers have discovered two security vulnerabilities that collectively affect most modern chips made by Intel, AMD, and ARM. If exploited, a hacker could potentially steal data from the breached machine ranging from emails and browsing data to login credentials. So, what are these vulnerabilities and what steps can you take to protect your business network from them?

Blog Feature

Cybersecurity | In the Media | News

By: Adam Stahl
December 30, 2017

Kelser Vice President of Professional Services Matt Kozloski was the guest for the full hour of Real Estate Radio on 94.9FM CBS Radio. He discussed the unique cybersecurity concerns of the real estate industry and strategies for companies of all types to avoid cyber attacks. The show is streaming and transcribed on our blog.

Blog Feature

Cybersecurity

By: Adam Stahl
December 28, 2017

In the fall of 2017, the State of Connecticut announced a cybersecurity action plan. In order to learn more about this--and the state of cybersecurity in Connecticut in general--we reached out to Arthur House, Chief Cybersecurity Risk Officer for the State of Connecticut. He was gracious enough to fill us in on a wide variety of topics from how Connecticut’s towns and cities are battling hackers, to why countries like Ukraine are looking to CT for guidance on cybersecurity.

Blog Feature

Cybersecurity | Executive Consulting

By: Adam Stahl
November 14, 2017

It seems like you can’t open a web browser, scroll through your LinkedIn timeline, or turn on the TV today without hearing about the latest data breach or threat to your cybersecurity. With high-profile breaches like Equifax and global ransomware outbreaks like Bad Rabbit, we’re in a very different world than just a few years ago. Perhaps you find that cyber threats and cybersecurity in general is annoying, overwhelming, or even frustrating but it’s imperative that cybersecurity protection become part of your business strategy. It doesn’t have to be as complicated or costly as you might think.

Blog Feature

Cybersecurity | Managed Services

By: Adam Stahl
November 02, 2017

Given the current cyber threat landscape, we think it’s a good time to talk about what to actually do about cybersecurity. After all, though you likely hear about a new data breach or critical vulnerability every other week, awareness without action isn’t much use! Before we dive in, however, let’s talk about some thought patterns we often see that prevent companies from taking effective action on cybersecurity.

Blog Feature

Cybersecurity

By: Adam Stahl
October 30, 2017

Last week the third major ransomware outbreak in 2017 was spreading through Eastern Europe and even starting to creep further across the globe. So far striking Russia and Ukraine the most, Bad Rabbit has disrupted industries ranging from media outlets to banks. Some reports even have the attack showing up right here in the U.S. Similar to the Petya/NotPetya ransomware outbreak earlier this year (so similar in fact that Bad Rabbit reportedly shares 2/3 of its code with variants of Petya), this ransomware encrypts a system, requests a ransom (the current rate is about $285 in bitcoin) to decrypt the victim’s files, and then attempts to spread itself across the network. With ransomware and cyberattacks commonplace in today’s world, what takeaways can come out of the Bad Rabbit outbreak to help prevent these types of attacks from derailing your organization?

Back to Top