<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Information technology blog, cybersecurity blog

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Modern Data Center | In the Media

By: Tim Colby
April 28th, 2020

With so many businesses operating fully remotely, the ability to collaborate in the cloud has become essential. Hybrid cloud solutions give companies the flexibility to use the cloud in a way that best suits them. TechTarget recently interviewed me about how Amazon Web Services (AWS) fits into the hybrid cloud landscape. Thus far, AWS has not made a play to be a leader in hybrid cloud. But could that be part of a bigger strategy for the cloud computing giant?

Blog Feature

Cybersecurity | Workforce Enablement | In the Media

By: Jonathan Stone
April 24th, 2020

Video chat meetings are now part of daily operations for so many businesses. When the coronavirus quarantine period started, video conferencing was a bit of a fun novelty. Colleagues who had never tried Zoom were now using it multiple times a day. Sadly, it didn’t take hackers long to realize they could exploit the popularity of video chat platforms to commit cybercrimes. Zoom in particular has experienced so many security issues that many organizations, including school districts in NYC, have banned it. While there are certainly more secure platforms, I use Zoom every day. Since the COVID-19 pandemic began, Kelser has advised our clients on how to use Zoom and set it up for them. Recently, I was a guest on FOX 61 Morning News to discuss cybersecurity best practices for Zoom.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | Executive Consulting | In the Media

By: Jonathan Stone
March 3rd, 2020

During tax season, personal information is being exchanged at a much higher rate than any other time of year. Documents like W2s with Social Security numbers on them are just par for the course. It’s also a time of year when employers and employees engage in tax-related tasks that aren’t routine to them. There’s often a bit of chaos getting everything in order and even a bit of anxiety over doing it right. For hackers and scammers who rely on human error and deception, all of this combines to create ideal conditions. I was recently on FOX61 Morning news to offer tips to viewers to avoid tax season scams.

Blog Feature

Cybersecurity | In the Media

By: Adam Stahl
February 27th, 2020

The world learned last week that the information of over 10 million hotel guests at MGM Resorts was obtained by hackers. The data breach is the result of a security incident that occurred last year, but the data was being shared in hacker circles recently and discovered and verified by ZDnet. Most of the data is limited to hotel stay info, addresses, and phone numbers dating back to 2017 and earlier. Since Kelser is a trusted, local managed service and cybersecurity provider, FOX61 News had Kelser CTO Jonathan Stone on following the breach to discuss what hackers can do with this type of apparently harmless information.

Blog Feature

Cybersecurity | Wireless | Networking | In the Media

By: Andrew Tyler
February 12th, 2020

The latest issue of Corporate & Incentive Travel Magazine tells the story of how I was at a conference—a cybersecurity conference of all things!—and it provided an unsecure general access wireless network. There was no preregistration for this network and the password was distributed freely to attendees. Most attendees wound up using the hotspots on their phones. Many conferences and events of all types have inadequate cybersecurity protections in place. The Wi-Fi networks offered at these events may seem more secure than public Wi-Fi, but in most cases, they are not. In fact, they could be more dangerous to use because hackers interested in a particular type of data can target the network of a specifically relevant conference (rather than the general network of a coffee shop, for instance).

Blog Feature

Cybersecurity | Executive Consulting | In the Media

By: Adam Stahl
January 14th, 2020

Hopefully you’re reading this on a device that is running an operating system other than Windows 7. If not, I have some bad news for you. You’re on your own.

Blog Feature

Executive Consulting | In the Media | News

By: Lisa Carroll
January 7th, 2020

Recently, Kelser CEO Barry Kelly gave two extremely detailed interviews, one with Authority Magazine (which will also run this year on Thrive Global) and one with CEO CFO Magazine. These interviews provide a glimpse into the roots of our company, its future, its culture, and more. Here is a selection of highlights from each interview which provide particular insights into Barry’s point of view and the character of the company he leads.

Blog Feature

Cybersecurity | Wireless | Networking | In the Media

By: Adam Stahl
December 17th, 2019

IoT devices pose uniquely terrifying security threats. Just ask a Waterbury, Connecticut, family who was awakened and harassed by hackers accessing their Ring security cameras. As part of their coverage of this incident, WFSB Channel 3 news asked Kelser to offer some insight into how hackers may have gotten access, and what can be done to secure IoT devices.

Back to Top