<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Networking | Managed Services

By: Kelser
August 28, 2018

A managed network is a type of communication network that is built, operated, secured and managed by a third-party service provider.

Blog Feature

Managed Services

By: Brian Mulligan
July 31, 2018

Many times, when looking for a managed service provider (MSP), price is the main issue that floats to top of mind. Unfortunately, you likely don’t have an unlimited pot of money to work with and this can cause you to lose track of why you’re looking for an MSP in the first place. While cost is a factor, it’s important not to overlook the fact that you’re looking for a trusted partner that can help move your organization forward by transforming your IT department from an operating drain into a critical business asset.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | Wireless | Managed Services | In the Media | News

By: Jonathan Stone
July 10, 2018

Not too long ago, I was interviewed for a Comcast Business blog post and Inc.com article about Wi-Fi security. As long as the Wi-Fi is up and running, the security of it isn’t something the average person gives a lot of thought to, but improperly secured Wi-Fi networks present a number of unique vulnerabilities hackers can exploit to gain access to sensitive data. To understand Wi-Fi security, it helps to know about these strategies that hackers use.

Blog Feature

Cybersecurity | Managed Services

By: Kelser
June 27, 2018

Mobile devices have become so important to professional productivity--- they're the way you connect with others, maintain your schedule, and find important information on the go. However, they're also very easily hacked or compromised if you don't take steps to prevent this from happening. Here are some tips from IT services firms in CT that your company can use to help keep your phones safe:

Blog Feature

Cybersecurity | Managed Services | Compliance

By: Kelser
June 26, 2018

Privacy laws changed profoundly with the Health Insurance Portability and Accountability Act (HIPAA), which has had a major impact on the healthcare industry and IT in CT. Not only does a healthcare firm have to commit to protecting patient data--- it has to be very careful in how it uses social media.

Blog Feature

Networking | Managed Services | In the Media | News

By: Adam Stahl
June 22, 2018

Kelser's Andrew Tyler was interviewed by WFSB Channel 3 Eyewitness News at the Travelers Championship about providing IT for the tournament for over 20 years. Working in conjunction with vendors who wire and connect the course, Kelser provides the IT for the tournament staff, volunteers, ticketing, scoring and more.

Blog Feature

Managed Services

By: Kelser
June 22, 2018

Have you ever thought about using a managed service provider (MSP) or IT company in Connecticut to help you with your technology requirements? Your business is undoubtedly similar to all companies these days in that you rely on your IT systems to function, and as technology gets more complex, this can take a toll on how many hours you have to dedicate to it. If any of the following factors resonate with you, it might be time to look into outsourcing some of your systems.

Blog Feature

Cybersecurity | Managed Services

By: Kelser
June 21, 2018

The internet has transformed life as we know it. From almost anywhere on the planet, you can get almost anything done, anywhere. But that global reach and high speed have drawbacks. Cybercrooks and their nefarious hacking tools can operate anywhere too, and they can reach deep into your IT systems, potentially causing terrible damage at the center of your organization. The good news is that tools and protocols for combating security breaches are evolving all the time, too.

Back to Top