<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Executive Consulting | Managed Services

By: Jonathan Stone
February 20, 2017

Why you need an IT consultant is the same reason why you need innovation at the workplace—the sustained protection and growth of your company. In a fast-paced world of increased consumer choice and quick-moving competitors, innovation through use of technology isn’t just a nice thing to have; it’s essential for growth. Many organizations don’t have the time or resources to achieve technological gains in house. They usually have other day-to-day responsibilities that consume their time leaving little left to think about innovative strategies to tackle their IT challenges. Technology, when applied properly, doesn’t just benefit the IT department—it helps every part of the business run more smoothly and achieve at a higher level.

Blog Feature

Cybersecurity | Executive Consulting

By: Adam Stahl
October 17, 2016

Matt Kozloski, Kelser's Vice President of Professional Services, was recently invited to speak as a cybersecurity expert on WNPR's Where We Live along with FBI Special Agent Judy Eide.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Modern Data Center | Executive Consulting

By: Adam Stahl
March 30, 2016

Kelser’s VP of Professional Services, Matt Kozloski, and Manchester Community College’s Director of Technology, Barry Grant, spoke recently at NERCOMP’s annual conference in Providence, RI. They presented, “A VDI Design for Cultural Change” to a packed crowd of IT professionals that practice in the educational space. Their presentation shared the journey of bringing VDI to MCC. Read the recap of the event here. Here are Matt’s thoughts about the conference and his reflections on the benefits of virtualization in higher education.

Blog Feature

Executive Consulting | Managed Services

By: Adam Stahl
February 10, 2016

Project management is a challenge in any vertical with hurdles that include changing deadlines, high expectations, constantly-changing requests, team cooperation, and of course the simple fact that at least one thing will go disastrously wrong. On top of that, IT specifically has its own unique challenges.

Blog Feature

Modern Data Center | Executive Consulting

By: Kelser
January 27, 2016

Keeping up with the whirlwind pace of the technology industry is difficult, to say the least. To help you spot the big trends in IT and cloud computing for 2016 and keep up with data security needs, we've put together a list of what we expect to see this year.

Blog Feature

Cybersecurity | Executive Consulting

By: Kelser
January 08, 2016

Independent security audits, such as a penetration test or vulnerability assessment, serve a critical purpose in an information systems security program. I’ll offer you two distinct perspectives to consider, depending on your role in your organization.

Blog Feature

Cybersecurity | Executive Consulting

By: Kelser
January 06, 2016

All kidding aside, you may or may not be aware of a pending change in how secure sites (think SSL/TLS) are secured. This is the SHA-1 to SHA-2 transition. It’s actually been in the works for a while, and primarily involves upgrading the certificate(s) on your public-facing websites, with more secure certificates. So what is SHA-1 or SHA-2 and why do we need to change?

Blog Feature

Cybersecurity | IT Lifecycle Management | Executive Consulting | Workforce Enablement

By: Kelser
December 23, 2015

iPads, tablets, and other ‘smart’ devices are well known as popular entertainment mechanisms. But considering how distracting these devices can be, should your company allow and encourage their use?

Back to Top