Kelser Blog, Media, and News
All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.
Cybersecurity | Executive Consulting
By:
Kelser
January 06, 2016
All kidding aside, you may or may not be aware of a pending change in how secure sites (think SSL/TLS) are secured. This is the SHA-1 to SHA-2 transition. It’s actually been in the works for a while, and primarily involves upgrading the certificate(s) on your public-facing websites, with more secure certificates. So what is SHA-1 or SHA-2 and why do we need to change?
Cybersecurity | IT Lifecycle Management | Executive Consulting | Workforce Enablement
By:
Kelser
December 23, 2015
iPads, tablets, and other ‘smart’ devices are well known as popular entertainment mechanisms. But considering how distracting these devices can be, should your company allow and encourage their use?
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
Cybersecurity | Modern Data Center | IT Lifecycle Management
By:
Kelser
December 07, 2015
There is a fairly serious bug, in vSphere 6.0, which can make backup data corrupt and prevent you from restoring data. This issue is specifically targeted at those (most) who use CBT (change block tracking) to take efficient image-based backups of their environment. If you need any assistance with applying or testing these patches and/or the integrity of your backups, please give your account representative a call. You can also contact us here. The VMware KB for this article is here: http://kb.vmware.com/kb/2136854
By:
Kelser
December 02, 2015
A company’s security network is like a chain in that it’s only as strong as its weakest link. For this reason, a thorough and regular
Cybersecurity | Managed Services
By:
Kelser
October 28, 2015
If you’re reading this, then you likely already know the dangers of data breaches for companies of all sizes. In 2014, the average cost of an organizational data breach was $5.4M, with each individual compromised record costing between $191 and $201, on average. And that’s not including the immeasurable costs to company integrity, public relations, and future sales. So kudos for researching the topic.
By:
Kelser
September 23, 2015
When a breach in your data security occurs, it may not be immediately apparent. The longer the breach goes unnoticed, the greater the damage will be. Breaches, however, are not entirely invisible. There are signs you should be aware of which, when noticed, tip you off to a hole in your security.
Office 365 | Cybersecurity | Workforce Enablement
By:
Adam Stahl
September 09, 2015
Virtualizing your office is only a headache when you don’t know all the benefits you have to gain from the process. Your company probably already feels the pressure to virtualize day-to-day operations—the trend is only becoming more popular. So why not think through some of the benefits? In this post, we’ll discuss some of the ways in which your office operations will become more flexible as a result of virtualization.
Cybersecurity | Executive Consulting | Workforce Enablement | Disaster Recovery | Managed Services
By:
Lisa Carroll
September 02, 2015
Networks and network security have gone from simple multi-cell organisms into a supernova of colliding devices. As any network admin can tell you, more users and more devices means more complexity. And as networks quickly inflate they quickly become hard to administer.