<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Cybersecurity | Modern Data Center

By: Kelser
March 09, 2016

Cisco has long been known as the digital Fort Knox of the network security world. Their breadth of products offers an all-encompassing path to internet security, and includes a multitude of security fronts.

Blog Feature

Cybersecurity

By: Kelser
February 01, 2016

Over the weekend, a colleague sent me a link to the recent NASA data breach (the one where they hijacked a drone). The drone hijack is really the highlight of the article, but two things really resonated with me as well:

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | Managed Services

By: Kelser
January 20, 2016

Here at Kelser we've seen the same security errors being committed time and time again. In order to help keep companies from making the same mistakes, we put together a list of not only the worst security sins -but also some of the most surprising (and least thought of).

Blog Feature

Cybersecurity | Executive Consulting

By: Kelser
January 08, 2016

Independent security audits, such as a penetration test or vulnerability assessment, serve a critical purpose in an information systems security program. I’ll offer you two distinct perspectives to consider, depending on your role in your organization.

Blog Feature

Cybersecurity | Executive Consulting

By: Kelser
January 06, 2016

All kidding aside, you may or may not be aware of a pending change in how secure sites (think SSL/TLS) are secured. This is the SHA-1 to SHA-2 transition. It’s actually been in the works for a while, and primarily involves upgrading the certificate(s) on your public-facing websites, with more secure certificates. So what is SHA-1 or SHA-2 and why do we need to change?

Blog Feature

Cybersecurity | IT Lifecycle Management | Executive Consulting | Workforce Enablement

By: Kelser
December 23, 2015

iPads, tablets, and other ‘smart’ devices are well known as popular entertainment mechanisms. But considering how distracting these devices can be, should your company allow and encourage their use?

Blog Feature

Cybersecurity | Modern Data Center | IT Lifecycle Management

By: Kelser
December 07, 2015

There is a fairly serious bug, in vSphere 6.0, which can make backup data corrupt and prevent you from restoring data. This issue is specifically targeted at those (most) who use CBT (change block tracking) to take efficient image-based backups of their environment. If you need any assistance with applying or testing these patches and/or the integrity of your backups, please give your account representative a call. You can also contact us here. The VMware KB for this article is here: http://kb.vmware.com/kb/2136854

Blog Feature

Cybersecurity

By: Kelser
December 02, 2015

A company’s security network is like a chain in that it’s only as strong as its weakest link. For this reason, a thorough and regular

Back to Top