<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

IT Support

By: Jim Parise
May 20, 2022

Every business needs IT help. The question is, which IT service provider is right for you?

Blog Feature

Cloud | IT Support | Cost

By: Ed Matias
May 19, 2022

As we know all too well, prices are on the rise for everything from gasoline to technology.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

IT Support

By: Karen Cohen
May 14, 2022

You’ve decided that your organization can benefit by partnering with an outside IT partner. You may have skill gaps that need to be addressed. You could need service desk support. Or maybe you are looking for someone to handle your network maintenance. Whatever the reason, you are ready and may have even started to evaluate IT providers.

Blog Feature

IT Support

By: Patrick Martin
May 06, 2022

If you’re considering working with an outside IT provider, you’ve likely noticed that many of them promise the services of a virtual Chief Information Officer (vCIO) to their customers. You may be wondering what a vCIO is and the role they play. You may also wonder what advantage a vCIO will provide for your organization.

Blog Feature

IT Support | Cost

By: Karen Cohen
April 22, 2022

If you are considering working with an outside IT service provider, you’ve probably noticed that there are a variety of options. If you’re already in the decision-making process, you may be wondering how something that seems to be similar can vary so widely in cost.

Blog Feature

Cybersecurity | IT Support | Information Security

By: Karen Cohen
April 20, 2022

Business leaders know that social engineering attacks are on the rise. These attacks, in which people with bad intentions manipulate users into taking actions that will provide access to information or networks, take many forms.

Blog Feature

IT Support | Information Security

By: Tim Colby
April 15, 2022

In the old days, when people had important documents they wanted to keep secure, they would lock them in a filing cabinet. The only people who could access the files would have a key or would need to contact the file administrator.

Blog Feature

IT Support

By: Lisa Carroll
April 08, 2022

You’ve made the initial decision. You need help. You’ve collected extensive information from several IT providers. At this point, you may be feeling overwhelmed by your options.

Back to Top