<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Information technology blog, cybersecurity blog

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Cybersecurity | Wireless | Networking | In the Media

By: Andrew Tyler
February 12th, 2020

The latest issue of Corporate & Incentive Travel Magazine tells the story of how I was at a conference—a cybersecurity conference of all things!—and it provided an unsecure general access wireless network. There was no preregistration for this network and the password was distributed freely to attendees. Most attendees wound up using the hotspots on their phones. Many conferences and events of all types have inadequate cybersecurity protections in place. The Wi-Fi networks offered at these events may seem more secure than public Wi-Fi, but in most cases, they are not. In fact, they could be more dangerous to use because hackers interested in a particular type of data can target the network of a specifically relevant conference (rather than the general network of a coffee shop, for instance).

Blog Feature

Cybersecurity | Wireless | Networking | In the Media

By: Adam Stahl
December 17th, 2019

IoT devices pose uniquely terrifying security threats. Just ask a Waterbury, Connecticut, family who was awakened and harassed by hackers accessing their Ring security cameras. As part of their coverage of this incident, WFSB Channel 3 news asked Kelser to offer some insight into how hackers may have gotten access, and what can be done to secure IoT devices.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Wireless | Networking | Managed Services

By: Mark Lepak
January 23rd, 2019

The “as a service” business model, in which third-party consulting firms provide IT services to customers on a subscription basis, has been nothing short of a revolution. In particular, network as a service (NaaS) has saved many companies from having to build their own networking infrastructure in-house. Configuring and operating devices such as routers, WAN optimizers, and firewalls is no easy task even for IT experts.

Blog Feature

Wireless | Networking

By: Mark Lepak
January 15th, 2019

Maybe your in-house IT staff is overworked, or perhaps you simply don’t have the expertise necessary to build a robust network infrastructure. Whatever the reason may be, a growing number of businesses have chosen to outsource much of the heavy lifting to a network services company. Although there are many network services providers out there, not all of them are the right fit for your business. However, just because you’re not an IT company doesn’t mean that you aren’t able to evaluate potential IT partners. Below, we’ll discuss the six most important traits that you should look for in a network services company.

Blog Feature

Wireless | Networking | Managed Services

By: Kelser
October 11th, 2018

What are Network Support Services? Network support services focus on the maintenance of an existing business network.

Blog Feature

Cybersecurity | Wireless | Managed Services | In the Media | News

By: Jonathan Stone
July 10th, 2018

Not too long ago, I was interviewed for a Comcast Business blog post and Inc.com article about Wi-Fi security. As long as the Wi-Fi is up and running, the security of it isn’t something the average person gives a lot of thought to, but improperly secured Wi-Fi networks present a number of unique vulnerabilities hackers can exploit to gain access to sensitive data. To understand Wi-Fi security, it helps to know about these strategies that hackers use.

Blog Feature

Cybersecurity | Executive Consulting | Wireless | Networking | In the Media

By: Jonathan Stone
May 31st, 2018

Earlier this week, the FBI urged thousands of small business and home office internet users to reboot their routers to prevent the impact of VPNFilter, the latest malware threat to businesses and consumers. Hours after the story broke, I was invited to WTNH News 8's studios to do a Facebook live Q&A.

Blog Feature

Cybersecurity | Wireless | Networking | Managed Services

By: Kelser
May 22nd, 2018

IT providers in Connecticut are now providing services for banks and other financial institutions which must incorporate IoT, or Internet of Things, strategy. Wireless technology has grown into a dominating force in the market today, and those operations which don't incorporate it into regular business are apt to feel the sting of increased cost and decreased competitiveness.

Back to Top