Kelser Blog, Media, and News
All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.
Wireless | Networking | Managed Services
By:
Paul Tablan
February 07, 2023
Editor's note: This article was originally posted in 2019, but has been updated to reflect the latest information. The “as a service” business model, in which third-party consulting firms provide IT services on a subscription basis, has been nothing short of a revolution. In particular, network as a service (NaaS) has saved many companies from having to build and maintain their own networking infrastructure in-house. Configuring and operating devices such as routers, WAN optimizers, and firewalls is no easy task even for IT experts.
Cybersecurity | Wireless | Networking
By:
Paul Tablan
September 22, 2022
Editor’s note: This article was originally posted in 2017 and has been updated to reflect new information.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
By:
Paul Tablan
July 29, 2022
Editor’s Note: This article was originally posted in May 2021, but has been updated to include the latest information, including information about Wi-Fi 6E.
By:
Paul Tablan
July 28, 2022
You may or may not have heard of Wi-Fi 6/6E. This latest iteration of wireless technology (also known as wireless standard 802.11ax) has been incorporated into a variety of access points (APs) and hardware. But it may not be the solution to all of your business IT problems.
By:
Paul Tablan
March 12, 2022
Wireless technology is magic, right? It allows us to communicate without clunky wires. We can use it to send a joke to family, connect with work from home, or log in and access documents on our organization’s network from the road.
By:
Patty Luxton
September 17, 2021
We all know when it is time for a new mobile phone. The battery doesn’t hold a charge. The screen is cracked. It takes forever to do anything. Or the service provider lets us know an upgrade is available. We look at the new offerings, evaluate the staying power and benefits, and decide whether to switch.
Cybersecurity | Wireless | Networking | In the Media | News
By:
Andrew Tyler
February 12, 2020
The latest issue of Corporate & Incentive Travel Magazine tells the story of how I was at a conference—a cybersecurity conference of all things!—and it provided an unsecure general access wireless network. There was no preregistration for this network and the password was distributed freely to attendees. Most attendees wound up using the hotspots on their phones. Many conferences and events of all types have inadequate cybersecurity protections in place. The Wi-Fi networks offered at these events may seem more secure than public Wi-Fi, but in most cases, they are not. In fact, they could be more dangerous to use because hackers interested in a particular type of data can target the network of a specifically relevant conference (rather than the general network of a coffee shop, for instance).
Cybersecurity | Wireless | Networking | In the Media | News
By:
Adam Stahl
December 17, 2019
IoT devices pose uniquely terrifying security threats. Just ask a Waterbury, Connecticut, family who was awakened and harassed by hackers accessing their Ring security cameras. As part of their coverage of this incident, WFSB Channel 3 news asked Kelser to offer some insight into how hackers may have gotten access, and what can be done to secure IoT devices.