<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Information technology blog, cybersecurity blog

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Cybersecurity | In the Media | News

By: Jonathan Stone
July 17th, 2019

I recently visited the set of Good Morning Connecticut to talk about the biggest cybersecurity stories in the news right now.

Blog Feature

Office 365 | In the Media | News | Cloud

By: Jim Parise
July 11th, 2019

Not too long ago, I contributed an article titled “How to tell if the cloud is right for your business” to the Hartford Business Journal. The goal was to help readers understand a few key concepts about the cloud:


Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Networking | In the Media | News | Foundation

By: Barry Kelly
July 2nd, 2019

The Travelers Championship is always one of my favorite weeks of the year, and despite quite a bit of rain and mud early in the tournament, this year did not disappoint.

Blog Feature

Cybersecurity | In the Media | News

By: Jonathan Stone
June 4th, 2019

Only twice has Microsoft issued a patch for old, out-of-support versions of Windows: in 2017, just before the massive WannaCry cyber attack, and just recently. With newly discovered vulnerabilities from Intel, and even one in Windows 10, a very high number of computers around the world are potentially exposed right now. While we haven’t seen exploits yet to take advantage of these vulnerabilities, they likely aren’t far off. Conditions have scarcely been better for a massive cyber attack on the scale of WannaCry. Last week, I had the chance to break this down for listeners of the Brad Davis Show.

Blog Feature

Modern Data Center | In the Media | News

By: Jonathan Stone
May 15th, 2019

Cloud computing has been around for a while now, but it remains a bit mysterious to many in the business world. I was thrilled to have the chance to help well-known tech journalist John Edwards break down some common misconceptions and assumptions in an article for CIO.com.

Blog Feature


By: Adam Stahl
May 14th, 2019

Kelser is proud to announce that Jim Parise has been promoted to president. In 21 years with the company, Parise was previously vice president of professional services and an enterprise solutions executive. He was instrumental in launching Kelser's suite of professional services such as Cybersecurity-as-a-Service and technology lifecycle management.

Blog Feature

Workforce Enablement | In the Media | News

By: Brian Mulligan
May 8th, 2019

Voice over IP, or VoIP, has come a long way. Where once the call quality of a landline couldn’t be beat and voice communication over the internet was unreliable, companies can now run their entire voice communication system seamlessly through their internet connection and computers. The headsets and phones even look and function the same. VoIP is a very hot topic in the business world as companies evaluate if traditional phone lines continue to make sense for them or if one of the many VoIP options in the marketplace could save money, improve efficiency, or add useful features. This is something the team at Kelser routinely helps our clients navigate and implement. In fact, we even help the media provide information to the business community about VoIP.

Blog Feature

Cybersecurity | In the Media | News

By: George W Kudelchuk III
May 1st, 2019

It’s well known that cyber attacks on businesses are increasing every year. The fact that the number of city governments falling victim to hackers as well is just coming to light. In Connecticut alone, the City of West Haven, the Derby Police Department, and the Bridgeport School District have all experienced cyber attacks in the past year inflicting varying degrees of damage.