<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Cybersecurity | Information Security

By: Patrick Martin
June 09, 2022

With ransomware attacks a frequent topic of news reports, most people understand that money is often a motivating factor. But, while that is a powerful motivator, it isn’t the only reason hackers take action.

Blog Feature

Information Security

By: Paul Tablan
June 04, 2022

Virtual private networks (VPNs) have been around since 1996, but if you are like most business leaders, you may not fully understand what they do, how they work, and whether your business needs one.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Information Security

By: Paul Tablan
May 24, 2022

Firewalls often fall into that “out-of-sight, out-of-mind” category; quietly operating to keep your network safe without too much thought from business leaders or users. But, just like every other part of your network, firewalls need to be monitored and updated to ward off new threats.

Blog Feature

Cybersecurity | Information Security

By: Patrick Martin
May 12, 2022

Everyone knows that cybersecurity is important. We all want to prevent people from accessing our data and using it to their advantage.

Blog Feature

Cybersecurity | IT Support | Information Security

By: Karen Cohen
April 20, 2022

Business leaders know that social engineering attacks are on the rise. These attacks, in which people with bad intentions manipulate users into taking actions that will provide access to information or networks, take many forms.

Blog Feature

IT Support | Information Security

By: Tim Colby
April 15, 2022

In the old days, when people had important documents they wanted to keep secure, they would lock them in a filing cabinet. The only people who could access the files would have a key or would need to contact the file administrator.

Blog Feature

Information Security

By: Patrick Martin
March 24, 2022

Cybersecurity and compliance are important building blocks for a healthy IT infrastructure. Some organizations assume that once they have these two elements in place, they have checked the box and their IT environment is secure.

Back to Top