<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">
{% if (contact[widget_data.bop.subscriber_information.subscriber_property_id.src]|lower == "yes") %} {% elif (widget_data.bop.subscriber_information.subscribe_url) %} {% endif %}

Information technology blog, cybersecurity blog

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

{% if contact[widget_data.bop.subscriber_information.subscriber_property_id.src]|lower == "yes" %} {% else %} {% endif %}
Blog Feature

Executive Consulting | In the Media | News

By: Lisa Carroll
January 7th, 2020

Recently, Kelser CEO Barry Kelly gave two extremely detailed interviews, one with Authority Magazine (which will also run this year on Thrive Global) and one with CEO CFO Magazine. These interviews provide a glimpse into the roots of our company, its future, its culture, and more. Here is a selection of highlights from each interview which provide particular insights into Barry’s point of view and the character of the company he leads.

Blog Feature

Cybersecurity | In the Media | News

By: Jonathan Stone
December 6th, 2019

Simply having or transmitting data is a risk. It’s often a necessary risk—companies have to store and share data constantly in order to do business—but it’s important to remember that if something is deleted or isn’t shared, it’s much less likely to fall into the wrong hands. This is something we talk about with our cybersecurity clients throughout Connecticut on a regular basis. Part of our process is to take stock of who they are sharing data with and why. If there’s not a reason to be sharing a particular type of data with a particular party, then not sharing it cuts down on risk of it being breached at some point. If data isn’t in use anymore, deleting it eliminates something a hacker could get a hold of.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

News | Press Release

By: Adam Stahl
August 9th, 2019

Glastonbury, CT, August 9, 2019 - Kelser Corp announced that CRN®, a brand of The Channel Company®, has named Kelser to its 2019 Fast Growth 150 list. The list recognizes the fastest-growing technology integrators, solution providers, and IT consultants in North America.

Blog Feature

Cybersecurity | In the Media | News

By: Adam Stahl
August 8th, 2019

Less than 12 hours after the massive Capital One data breach was announced on a Monday night, Kelser CTO Jonathan Stone was on the phone with a reporter from The Washington Post helping break down the role of cloud storage in the story. In the days that followed, Kelser experts were on all four local Connecticut TV networks to provide perspective on this breach.

Blog Feature

Managed Services | In the Media | News

By: Jonathan Stone
July 25th, 2019

As part of my role as CTO at Kelser, I am also vCIO for some of our clients, such as Hoffman Auto Group. A vCIO, also called a virtual or fractional CIO, performs the strategic function of a tech executive for an organization that doesn’t necessarily need a fulltime CIO in house.

Blog Feature

News | Press Release

By: Adam Stahl
July 24th, 2019

Glastonbury, CT - Kelser Corporation announced that CRN®, a brand of The Channel Company, has named Kelser to its 2019 Solution Provider 500 list.

Blog Feature

Cybersecurity | In the Media | News

By: Jonathan Stone
July 17th, 2019

I recently visited the set of Good Morning Connecticut to talk about the biggest cybersecurity stories in the news right now.

Blog Feature

Office 365 | In the Media | News | Cloud

By: Jim Parise
July 11th, 2019

Not too long ago, I contributed an article titled “How to tell if the cloud is right for your business” to the Hartford Business Journal. The goal was to help readers understand a few key concepts about the cloud: