Kelser Blog, Media, and News
All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.
Cybersecurity | Information Security
By:
Patrick Martin
June 09, 2022
With ransomware attacks a frequent topic of news reports, most people understand that money is often a motivating factor. But, while that is a powerful motivator, it isn’t the only reason hackers take action.
By:
Paul Tablan
June 04, 2022
Virtual private networks (VPNs) have been around since 1996, but if you are like most business leaders, you may not fully understand what they do, how they work, and whether your business needs one.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
By:
Paul Tablan
May 24, 2022
Firewalls often fall into that “out-of-sight, out-of-mind” category; quietly operating to keep your network safe without too much thought from business leaders or users. But, just like every other part of your network, firewalls need to be monitored and updated to ward off new threats.
Cybersecurity | Information Security
By:
Patrick Martin
May 12, 2022
Everyone knows that cybersecurity is important. We all want to prevent people from accessing our data and using it to their advantage.
Cybersecurity | IT Support | Information Security
By:
Karen Cohen
April 20, 2022
Business leaders know that social engineering attacks are on the rise. These attacks, in which people with bad intentions manipulate users into taking actions that will provide access to information or networks, take many forms.
IT Support | Information Security
By:
Tim Colby
April 15, 2022
In the old days, when people had important documents they wanted to keep secure, they would lock them in a filing cabinet. The only people who could access the files would have a key or would need to contact the file administrator.
By:
Patrick Martin
March 24, 2022
Cybersecurity and compliance are important building blocks for a healthy IT infrastructure. Some organizations assume that once they have these two elements in place, they have checked the box and their IT environment is secure.