Kelser Blog, Media, and News
All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.
Cybersecurity | Workforce Enablement
By:
Jonathan Stone
May 19, 2016
Securing today’s mobile workforce is becoming increasingly difficult. As the demand for remote productivity grows, so too does the sophistication of cyber-attacks aimed at road warriors. Some of today’s threats include mobile malware, eavesdropping, unauthorized access, and unlicensed or unmanaged applications. Let’s take a look at these threats and what can be done to combat them.
Cybersecurity | IT Lifecycle Management | News | Events
By:
Adam Stahl
May 12, 2016
HARTFORD – Kelser, HP Inc., and Intel educated guests about security threats to their mobile workforces and how to protect against those threats during a lunch and learn at VIVO Seasonal Trattoria.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
Office 365 | Cybersecurity | Workforce Enablement
By:
Adam Stahl
April 27, 2016
With so many companies utilizing the cloud and mobile devices, data security should be a major concern for all businesses. Yet, despite numerous security breaches, distributed denial-of-service (DDoS), and security experts’ repeated warnings that businesses need to better protect their information, many companies remain unprepared or inadequately protected from various security threats.
Office 365 | Cybersecurity | Workforce Enablement
By:
Adam Stahl
April 06, 2016
With a society that has become increasingly digitized, innovative, and mobile, it is no surprise that business technologies have had to adjust. After all, the business landscape and digital world are constantly changing, and that produces new challenges:
Cybersecurity | Modern Data Center
By:
Kelser
March 09, 2016
Cisco has long been known as the digital Fort Knox of the network security world. Their breadth of products offers an all-encompassing path to internet security, and includes a multitude of security fronts.
By:
Kelser
February 01, 2016
Over the weekend, a colleague sent me a link to the recent NASA data breach (the one where they hijacked a drone). The drone hijack is really the highlight of the article, but two things really resonated with me as well:
Cybersecurity | Managed Services
By:
Kelser
January 20, 2016
Here at Kelser we've seen the same security errors being committed time and time again. In order to help keep companies from making the same mistakes, we put together a list of not only the worst security sins -but also some of the most surprising (and least thought of).
Cybersecurity | Executive Consulting
By:
Kelser
January 08, 2016
Independent security audits, such as a penetration test or vulnerability assessment, serve a critical purpose in an information systems security program. I’ll offer you two distinct perspectives to consider, depending on your role in your organization.