<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Cybersecurity | In the Media | News | Compliance

By: Adam Stahl
October 06, 2017

IndustryWeek, one of the largest trade publications in the country serving the manufacturing sector, published a detailed article about the new NIST 800-171 cybersecurity guidelines, the bulk of which is an extensive Q&A with Kelser VP of Professional Services Matt Kozloski.

Blog Feature

Cybersecurity | In the Media | News

By: Lisa Carroll
October 05, 2017

Equifax made some serious mishaps lately, both technically and incident response. What’s really disturbing: while this is the largest, this is not an isolated incident. We won’t cover the details here, since there are plenty of sources where you can find information about the breach, its consequences, and what has happened after that. What we will cover is some thoughts around what we can all learn from the events leading up to, during, and after the breach. At Kelser, we don’t want any company to fall victim to the same incident and aftermath that Equifax did. We match our recommendations to our clients’ business objectives, establishing a comprehensive and multi-layered strategy to manage risk before, during and after a cybersecurity incident.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | In the Media | News

By: Adam Stahl
September 18, 2017

Following the massive Equifax data breach, Kelser VP of Professional Services Matt Kozloski returned to WNPR's Where We Live to discuss the hack alongside Commissioner of the Connecticut Department of Consumer Protection Michelle H. Seagull.

Blog Feature

Cybersecurity

By: Kelser
July 20, 2017

Welcome to the present, a time in which no industry is uninfluenced by technological advancement. The healthcare sector has moved forward with million dollar investments that revolutionized the way we treat patients. But it’s also been transformed by technology that’s changed how providers and facilities create and manage electronic health records. Technological advancements also bring new risks. Take the adoption of IoT-enabled medical equipment, for example. While these devices offer valuable functionality, they introduce new cybersecurity challenges. With these factors and the scores of personal information they handle, hospitals and healthcare practices bear greater risks of cybersecurity breaches.

Blog Feature

Cybersecurity | Wireless | Networking | Managed Services

By: Kelser
June 30, 2017

The internet has transformed the way people communicate. It also brought with it never-before-seen privacy issues. Now, the Internet of Things – known as IoT – is transforming how devices communicate. Using your wired or wireless network, these devices can all share information, helping to create smarter, more efficient systems.

Blog Feature

Cybersecurity | In the Media | News

By: Adam Stahl
June 13, 2017

Following one of the most widespread cyber attacks ever (WannaCry), Kelser VP of professional services Matt Kozloski writes for the Hartford Business Journal about how companies need to be proactive about cybersecurity. He breaks down the minimal steps that would have prevented WannaCry, and recommends courses of action for successfully defending against the next cyber attack.

Blog Feature

Cybersecurity | In the Media | News

By: Adam Stahl
May 30, 2017

From a financial perspective, cybersecurity is about weighing the cost of protection and upkeep versus the potential cost of a cyber attack. Following the massive WannaCry cyber attack, Kelser COO and CTO Jonathan Stone helps CFOs navigate this equation in an article published on the homepage of CFO.com.

Blog Feature

Cybersecurity

By: Adam Stahl
May 24, 2017

The malicious ransomware dubbed "WannaCry" has seized systems in over 150 countries since its discovery on May 12th, holding computers across all industries hostage. The program infects computers and encrypts their files, demanding $300 in Bitcoin or the files will be erased. This ransomware currently affects Microsoft Windows machines through an exploit known as EternalBlue. Given the severity of this attack and other ransomware variants following suit, it's time to make sure that your organization is protected. We've compiled this list of 9 resources that will help prepare your organization for malware attacks like WannaCry, so that you can ensure your files and information are safe.

Back to Top