<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Cybersecurity | In the Media | News

By: Adam Stahl
February 27th, 2020

The world learned last week that the information of over 10 million hotel guests at MGM Resorts was obtained by hackers. The data breach is the result of a security incident that occurred last year, but the data was being shared in hacker circles recently and discovered and verified by ZDnet. Most of the data is limited to hotel stay info, addresses, and phone numbers dating back to 2017 and earlier. Since Kelser is a trusted, local managed service and cybersecurity provider, FOX61 News had Kelser CTO Jonathan Stone on following the breach to discuss what hackers can do with this type of apparently harmless information.

Blog Feature

Cybersecurity | Wireless | Networking | In the Media | News

By: Andrew Tyler
February 12th, 2020

The latest issue of Corporate & Incentive Travel Magazine tells the story of how I was at a conference—a cybersecurity conference of all things!—and it provided an unsecure general access wireless network. There was no preregistration for this network and the password was distributed freely to attendees. Most attendees wound up using the hotspots on their phones. Many conferences and events of all types have inadequate cybersecurity protections in place. The Wi-Fi networks offered at these events may seem more secure than public Wi-Fi, but in most cases, they are not. In fact, they could be more dangerous to use because hackers interested in a particular type of data can target the network of a specifically relevant conference (rather than the general network of a coffee shop, for instance).

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | Executive Consulting | In the Media | News

By: Adam Stahl
January 14th, 2020

Hopefully you’re reading this on a device that is running an operating system other than Windows 7. If not, I have some bad news for you. You’re on your own.

Blog Feature

Executive Consulting | In the Media | News

By: Lisa Carroll
January 7th, 2020

Recently, Kelser CEO Barry Kelly gave two extremely detailed interviews, one with Authority Magazine (which will also run this year on Thrive Global) and one with CEO CFO Magazine. These interviews provide a glimpse into the roots of our company, its future, its culture, and more. Here is a selection of highlights from each interview which provide particular insights into Barry’s point of view and the character of the company he leads.

Blog Feature

Cybersecurity | Wireless | Networking | In the Media | News

By: Adam Stahl
December 17th, 2019

IoT devices pose uniquely terrifying security threats. Just ask a Waterbury, Connecticut, family who was awakened and harassed by hackers accessing their Ring security cameras. As part of their coverage of this incident, WFSB Channel 3 news asked Kelser to offer some insight into how hackers may have gotten access, and what can be done to secure IoT devices.

Blog Feature

Cybersecurity | In the Media | News

By: Jonathan Stone
December 6th, 2019

Simply having or transmitting data is a risk. It’s often a necessary risk—companies have to store and share data constantly in order to do business—but it’s important to remember that if something is deleted or isn’t shared, it’s much less likely to fall into the wrong hands. This is something we talk about with our cybersecurity clients throughout Connecticut on a regular basis. Part of our process is to take stock of who they are sharing data with and why. If there’s not a reason to be sharing a particular type of data with a particular party, then not sharing it cuts down on risk of it being breached at some point. If data isn’t in use anymore, deleting it eliminates something a hacker could get a hold of.

Blog Feature

Cybersecurity | In the Media | News

By: Brian Mulligan
November 21st, 2019

Connecticut-based Starling Physicians, which operates 32 locations in the greater Hartford area, announced a data breach this month linked to a cyber attack dating back to February. When we first learned of this breach, we were discussing it around the office and quickly learned that three Kelser employees are parents of kids who are patients at a Starling practice. NBC Connecticut stopped by our office both to hear from these parents and for insights on cybersecurity from me.

Blog Feature

Executive Consulting | Managed Services | In the Media | News

By: Lisa Carroll
October 8th, 2019

The MetroHartford Alliance’s “Pulse of the Region” radio show recently dedicated an episode to the IT collaboration between Kelser Corporation and Hoffman Auto Group. The conversation is a great example of a premier Connecticut company taking a proactive approach to cybersecurity and technology infrastructure through a partnership with Kelser.

Back to Top