<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Information technology blog, cybersecurity blog

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Networking | In the Media

By: David Bykowski
April 18, 2022

See this article as it originally appeared in Industry Today.

Blog Feature

Networking | In the Media

By: Patrick Martin
April 11, 2022

See this article as it originally appeared in the New England Real Estate Journal.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Wireless | Networking

By: Patty Luxton
May 26, 2021

You may have heard by now that the newest wireless standard 802.11ax, also known as Wi-Fi 6, is upon us. Many vendors are now incorporating this standard into their latest round of access points (AP) and hardware. You’re likely intrigued by that alone but also swarmed with a few questions. Like what the benefits of Wi-Fi 6 are outside of the info in manufacturer slicks. Over the past several years, I've worked in complex Wi-Fi environments where it has been critical to understanding how the various 802.11 protocols work and what has been most prominent in their feature evolution.

Blog Feature

Networking | In the Media

By: Patty Luxton
May 06, 2021

This article originally appeared in the New England Real Estate Journal. The arrival of 5G wireless enables much broader internet availability and greater speeds on the job site as well as the opportunity to employ IoT (internet of things) devices that previously would not have been practical.

Blog Feature

Cybersecurity | Wireless | Networking | In the Media | News

By: Andrew Tyler
February 12, 2020

The latest issue of Corporate & Incentive Travel Magazine tells the story of how I was at a conference—a cybersecurity conference of all things!—and it provided an unsecure general access wireless network. There was no preregistration for this network and the password was distributed freely to attendees. Most attendees wound up using the hotspots on their phones. Many conferences and events of all types have inadequate cybersecurity protections in place. The Wi-Fi networks offered at these events may seem more secure than public Wi-Fi, but in most cases, they are not. In fact, they could be more dangerous to use because hackers interested in a particular type of data can target the network of a specifically relevant conference (rather than the general network of a coffee shop, for instance).

Blog Feature

Cybersecurity | Wireless | Networking | In the Media | News

By: Adam Stahl
December 17, 2019

IoT devices pose uniquely terrifying security threats. Just ask a Waterbury, Connecticut, family who was awakened and harassed by hackers accessing their Ring security cameras. As part of their coverage of this incident, WFSB Channel 3 news asked Kelser to offer some insight into how hackers may have gotten access, and what can be done to secure IoT devices.

Blog Feature

Networking | In the Media | News | Foundation

By: Barry Kelly
July 02, 2019

The Travelers Championship is always one of my favorite weeks of the year, and despite quite a bit of rain and mud early in the tournament, this year did not disappoint.

Blog Feature

Cybersecurity | Networking

By: Patty Luxton
June 26, 2019

Here at Kelser, we’ve been in the IT consulting business for nearly four decades. By now, we’ve heard every excuse in the book from companies who don’t want to take a proactive approach to network security services.

Back to Top