<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Cybersecurity | Executive Consulting

By: Kelser
June 02, 2015

Securing Humanity You probably hear a lot about information system security these days. Not really a day goes by where we don’t hear about a new threat or exposure. Traditional approaches talk about performing business risk assessment, and using that information to drive decisions. You're ultimately achieving the goal of reducing then accepting a given risk, based on analysis of likelihood and impact to your organization. This approach is logical, sound, and certainly the appropriate way to manage risk and information security for your systems, however, I challenge you to think about another angle.

Blog Feature

Cybersecurity

By: Kelser
May 26, 2015

Network and data security isn’t a battle, it’s all-out warfare. Attacks come often, in varying levels of network security and without warning. Being unprepared is simply not an option, especially in today’s increasingly malicious online world where network security holes in your frontline proliferate.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity

By: Kelser
May 19, 2015

In today’s world of IT – it’s not a matter of “if” your systems and data will be compromised, it’s when and how bad will it be “when” it occurs. Attacks can originate from inside or outside of your organization so “hopefully” you’re prepared to deal with the damage that an attack will have on your firms reputation.

Blog Feature

Cybersecurity

By: Kelser
May 14, 2015

You're a successful medium-sized business. You have worked hard to build your business and protect your assets. What about your information systems? Have you given due care to securing your systems and information? Today's technology landscape changes dramatically from day to day and it's no longer a nice-to-have nor is just the anti-virus and firewall enough to protect what you've built. Unfortunately, your size business is probably at the greatest risk of compromise.

Blog Feature

Office 365 | Cybersecurity | Workforce Enablement

By: Lisa Carroll
May 07, 2015

Microsoft Office 365 was designed to assist you in meeting your businesses’ needs for content security and data usage compliance with legal, regulatory, and technical standards. As an essential component of administering Office 365, it is important to set up policies and enable services that optimize these conditions. To begin a secure and compliant Office 365 work environment that meets your organization’s requirements, you may want to learn more about the staples of security and compliance described in this blog post. Many businesses are concerned with security, and this is completely reasonable; to learn more about Microsoft Office 365’s security options, continue reading!

Blog Feature

Office 365 | Cybersecurity | Workforce Enablement

By: Lisa Carroll
April 30, 2015

Legal professionals in an online world face many challenges, as they need to ensure compliance and make sure that their documents are secure and easy to share with other teams and clients. Legal professionals from all around the country expect their technology solutions to reduce overhead, enhance productivity, and provide the ability to work anywhere, anytime.

Back to Top