<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Everything You’re Looking to Learn About IT in Connecticut and Massachusetts

Whether you’re searching for videos about securing your organization from cyberthreats, eBooks on building a robust network, an assessment of your disaster recovery capabilities, look no further. You’ll find it all and more here.

Topics:

I Am:

Content Types:

Blog

10 Simple Things You Can Do to Improve Your Company's Cybersecurity Posture

Improve your company's cybersecurity posture with these ten relatively simple things you can start doing today.
Blog

10-Step Disaster Recovery Plan for Your IT Department

Creating an IT disaster recovery plan will ensure that you can focus on the business at hand instead of worrying about systems that are down.
Blog

11 Reasons Why You Should Work With A Microsoft Office 365 Partner

This post discusses the benefits of working with a Microsoft Office 365 partner during your migration to the cloud.
Blog

12 Ways Managed Services Companies Can Help You

Here are 12 main ways that your organization can benefit from the right managed service provider (MSP).
Blog

13 Ways to Help Your Data Survive Cybersecurity Awareness Month

National Cybersecurity Awareness Month is a great time to review your cybersecurity, discover where you can improve, and make changes.
Blog

16 Tips for Cybersecurity Awareness Month

October is National Cybersecurity Awareness Month! Here are 16 cybersecurity tips and 3 free resources to help keep you secure.
 
Blog | Video/Webinar

3 Connecticut School Districts Were Hacked: What You Need To Know

Three Connecticut school districts experienced breaches or cyberattacks. Local news outlets reached out to Kelser for more insight.
 
Blog | Video/Webinar

3 Cybersecurity Stories Businesses Need to Know About

Kelser CTO Jonathan Stone visited the set of Good Morning Connecticut to talk about the biggest cybersecurity stories in the news right now.
Blog

3 Leading Cybersecurity Threats for Small Businesses (and How to Combat Them)

Cybersecurity isn't just a big business issue. Find out the common threats small businesses are facing and how to combat them effectively.
Blog

3 Reasons for Small and Medium Business to Care About Information Systems Security

Check out three main reasons for businesses like yours to care about cybersecurity.
Blog

3 Reasons Why You Should Start with Disaster Recovery When Outsourcing Your Company's IT in CT

Before outsourcing your company's IT in CT and disaster recovery efforts, you have to consider where you're going to start.
Blog

3 Tips to Secure Your Virtual Infrastructure

Are you giving due care to ensuring the security of your host/guest systems and information? Here are 3 concepts to get you thinking.
Blog

3 Ways an IT Services Provider in CT Can Improve Telecommuting

An IT services provider in CT leverage the latest technology to help improve remote work for your employees.
Blog

3 Ways to Ramp Up Your Business' Cyber Security with IT Services in CT

Hackers are getting smarter and more cunning in their tactics. It's time to make sure data security IT services in CT are a priority.
Blog

4 Best Practices For IT Asset Management

With the proliferation of devices in the workplace, IT asset management is turning from a nice-to-have to a must-have for your company.
Blog

4 IT Services in CT for Your Business' Cybersecurity

Here are 4 IT services in CT that you can leverage to help improve your organization's cybersecurity.
Blog

4 Reasons To Trust Microsoft Office 365's Security Features

Discover four of Microsoft Office 365's best security features.
Blog

4 Simple Ways to Strengthen Your Passwords

It's crucial that everyone keep up with password best practices. To help get you started, we've compiled a list of ways to strengthen yours.
Blog

4 Ways to Develop an IT Strategy for Your Higher Education Institution with IT Services in CT

An IT services provider in CT can advise you on the best way to provide a robust network strategy for your students, faculty, and staff.
Blog

5 Causes of Costly Cybersecurity Breaches in the Healthcare Industry

The healthcare industry has long been one of the most vulnerable to cyber attacks. Learn common causes of breaches and how to address them.
Blog

5 Concerns When Scaling Your Business

Scaling your business? Here are 5 concerns to keep in mind to help iron out any hiccups.
Blog

5 Key Aspects of Intelligent Supply Chain Management

These aspects of supply chain management are beyond the daily supply-and-demand approach and are targeted at improving standard approaches.
Blog

5 Major Benefits Microsoft Office 365 Can Offer To Small Businesses

Discover five major benefits that Microsoft Office 365 can offer to small businesses.
Blog

5 Reasons Why Knowing And Regularly Reviewing Your Cybersecurity Vulnerabilities Is Crucial

With incidents of hacking and cybercrime on the rise, it's becoming increasingly important for organizations to boost their cybersecurity.
 
Blog | Video/Webinar

5 Tips to Help Keep You Secure While Working from Home

We've put together these five tips to help keep you and your employees secure when you’re working from home.

Blog

6 Microsoft Office 365 Features That Fly Under The Radar

Discover six features of Microsoft's Office 365 that you may not know about.
Blog

6 Reasons You Need Wireless-as-a-Service

Find out why Wireless-as-a-Service (WaaS) is a growing trend in the IT industry and how your company can take advantage.
Blog

6 Ways to Achieve Operational Simplicity

We discusses 6 achievable ways to simplify your business operations.
Blog

7 Advantages of a Managed Network Security Service

Your network is a critical part of your business—that's why many organizations are partnering with a managed network security provider.
Blog

7 Characteristics of a Successful Cybersecurity Policy

Every effective cybersecurity policy has certain traits. We've identified 7 characteristics every successful policy has in common.
Blog

8 Project Management Tips for IT Professionals

To keep deadlines from getting away from you on your next major IT project, consider these 8 tips gleaned from our years of experience.
Blog

8 Things to Ask About Your Managed Service Provider (MSP)

How do you make sure that you're choosing a managed service provider (MSP) you can trust? Start by asking yourself these 8 questions.
Blog

8 Ways to Trim the IT Budget with TechRepublic

It’s good to eliminate inefficiencies or redundancies whenever possible. Here are 8 ways that companies can potentially find cost savings in the ...

Blog

9 Resources to Help Protect You From Ransomware Attacks Like WannaCry

Here is a list of resources you can utilize to help protect yourself and your organization from ransomware attacks like WannaCry.
Blog

94.9FM CBS Real Estate Radio Interviews Kelser About Cybersecurity

94.9FM CBS Real Estate Radio Interviews Kelser About Cybersecurity.
Video/Webinar

[On-Demand Webinar] Combat Ransomware with Business Continuity

Find out why having business continuity in place should be a priority and how it can help protect your business from costly downtime.
Video/Webinar

[On-Demand Webinar] Finding Cybersecurity Gaps And Vulnerabilities In Your Organization

Find out how to identify and close cybersecurity gaps and vulnerabilities in your organization.
Blog

[Webinar Recap] Finding Cybersecurity Gaps and Vulnerabilities in Your Organization

With cyberattacks on the rise, businesses wanting to reduce their cybersecurity vulnerabilities can invest in useful assessments and penetration ...
Blog

A Look at How Manufacturing Companies Can Benefit from IT Services in CT

Lean on our IT services team in CT to help develop the optimal IT strategy for your manufacturing firm and you will maximize your resources.
 
Blog | Video/Webinar

Anatomy of a Phishing Cyber Attack

A well-known Connecticut business recently hired Kelser to hack them with a simulated phishing attack. Here's how we did it.
Interactive Tool

Are IT Managed Services Right for Your Organization? Quiz

Are IT Managed Services right for your organization? Take the quiz to determine what services are the best fit for your team.
Blog

Are You Prepared for Your Migration?

Regardless of the software you're migrating from, there are questions you can answer to mitigate data loss and disruption during migration.
Blog

Are Your IT Systems Prepared For CT Hurricanes and Blizzards?

Extreme weather can take your business offline for a few days or more. We explore 4 ways to make sure your IT systems are prepared for it.
Blog

Avoiding On-Premise Costs

We compiled a list of on-premise costs your company no longer has to worry about when using the cloud.
Blog

Basics of Open-Standards Based Networking

Dive into the basics of open-standards based networking along with benefits and drawbacks.
Blog

Benefits of Flexible Payment Plans

When it comes to renting your software via payment plans you have a wide variety of options, suited to your company's cash schedule.
Blog

Benefits of IT Consulting in Connecticut for Growing Businesses

Here are three main benefits that your business will get from an IT consulting firm in Connecticut.
Blog

Best Practices for Choosing a Managed Services Provider

It's crucial to take the MSP vetting process seriously. Here are best practices to follow when choosing a managed services provider.
Blog

Biggest Cybersecurity Challenges for 2017

The way we use technology is continuously changing, leading to new threats. Learn about the biggest cybersecurity challenges in 2017.
Blog

Biggest Takeaways from the Cisco 2017 Annual Cybersecurity Report

Every year Cisco releases a lengthy, and quite technical, industry report. Here are our takeaways from the Cisco 2017 Cybersecurity Report.
Blog

Building a Modern Distributed Workforce That's Connected

The transition of businesses to distributed teams is not easy, but Office 365 makes it a lot easier to adjust to this online workforce.
Blog

CFO.com publishes article by Kelser about financial decisions in cybersecurity

CFO.com publishes article by Kelser about financial decisions in cybersecurity.
Blog

Cisco Nexus 9000 Automation

Take a look at the Nexus 9000 (9K) and Nexus 9000 automation - an enterprise switch for the modern data center.
Blog

Cisco Nexus 9000 Automation, Part 2

Take a deeper dive into Cisco Nexus 9000 automation and learn how you can automate your switch using Python.
Blog

Cisco Security - an Overview

Cisco's security products offer an all-encompassing path to online security. While Cisco security is a broad topic, we offer this overview.
Blog

Cloud 101 by Kelser in the Hartford Business Journal

Kelser contributed an article to the Hartford Business Journal with the goal of helping readers understand a key concepts about the cloud.
Success Story

Cloud hosting frees up valuable time for customers and staff

VeraCore wanted an option other than a large capital investment for new hardware for its co-location site. Learn how Kelser increased their capital ...
Blog

Common Threats to Mobile Security and How to Combat Them

As mobile workforces grow, so do the cyber-attacks targeting remote workers. Learn about these threats and how you can combat them.
Assessment

Custom Fit No-Cost Storage Assessment

Predictive flash storage is smart enough to make 86% of problems disappear. See what it can do for your data center with a custom fit no-cost Storage ...
Interactive Tool

Cybersecurity Self-Assessment Checklist

Download the Cybersecurity Checklist and get on the path to effective cybersecurity today.
Blog

Cybersecurity Training for Employees: 6 Points To Cover

Learn six of the most important topics that should be part of any cybersecurity training.
Success Story

Cybersecurity-as-a-Service provides manufacturer's IT systems with efficient, continuous protection

Connecticut manufacturer Empire Industries had not upgraded its IT security since its initial installation. Learn how cybersecurity enhancements ...
Blog

Data Protection: Erasure Coding

We dive into data protection in regards to advanced erasure coding as well as what RAID-5 and RAID-6 really are.
Blog

Debunking The Top Myths About Microsoft Office 365

We debunk some of the top myths concerning Microsoft Office 365.
 
Blog | Video/Webinar

Defense in Depth: The Basic Essentials of IT Security

Defense in depth is a security approach that we believe in. We walk through its most essential layers and how they can protect your ...

Blog

Defense-in-Depth Cybersecurity on the Basketball Court

Watching so much basketball this time of year, we've noticed that the principles of a good cybersecurity defense are reflected on the court.
Blog

Desktop-as-a-Service Makes Tech Predictable

Desktop-as-a-service shifts technology hardware from a capital expense to an operating cost. Learn more in this post.
Blog

Differences, Similarities, and Solutions in Critical Cybersecurity Concerns for Small and Large Companies

Learn more about the differences in the cybersecurity considerations for small to medium businesses (SMB) compared to larger businesses.
Blog

Diligence in the Calm Before the Storm - Looking Back at Tropical Storm Irene

Kelser's VP of Operations Tom Sharp looks back at Tropical Storm Irene and the business lessons that can be learned from it
Blog

Disaster Recovery in the Cloud

Cloud-based Disaster Recovery is crucial for every company, especially SMBs. However, choosing a disaster recovery option can be challenging.
 
Blog | Video/Webinar

Do We Really Need to Be Storing or Sharing this Data?

Kelser had the chance to help NBC Connecticut explore apps that collect 3-D images of your face and the implications of that data collection.

Blog

Do You Need to Outsource Your IT in Connecticut?

Have you ever thought about using a managed service provider or IT company in Connecticut to help you with your technology requirements?
Blog

Does My Computer Have a Virus?

Think your computer has a virus? Here are three symptoms to look for that may indicate an infection.
eBook

eBook: "10 Reasons Why Small and Midsized Businesses Choose Microsoft Office 365"

Read our Office 365 eBook to learn how Microsoft Office 365 can help small and midsize businesses achieve their goals and mobilize their workforces.
eBook

eBook: "10 Simple Things to Improve Your Company's Cybersecurity Posture"

Download this eBook and learn how to better protect your company from cybersecurity threats.
eBook

eBook: "4 Business Continuity Planning Essentials"

You can't create a business continuity plan without knowing what goes into one. Learn what you need in this eBook.
eBook

eBook: "Multicloud Storage for Dummies"

Not sure how to modernize your infrastructure? Nervous about migrating critical business information to the public cloud? This eBook has answers.
eBook

eBook: "Natural Disaster Survival Guide for Businesses: A Quick Reference Guide for Business Leaders"

Download the Disaster Survival Guide for Businesses eBook and get your business continuity plan started in the right direction.
eBook

eBook: "Tackle Business Challenges With Network-as-a-Service"

Learn how Network-as-a-Service can help companies increase security and reliability in today's digital landscape.
 
Blog | Video/Webinar

Everything We Know About the UConn Health Data Breach

UConn Health announced a large data breach. In the hours after the announcement, two local news stations turned to Kelser for insight.
Blog

Everything You Need to Know About NIST 800-171

From research to implementation, this is everything you need to know about NIST 800-171.
Blog

Finding an Alternative to Stagnant IT Support in Connecticut

While it isn't difficult to find IT support in CT, it's a bit more challenging to find a firm that stays up-to-date with new technology.
Blog

Five Ways You Can Lower Costs with Microsoft Office 365

Dive into the top five ways Microsoft Office 365 can help your small business save money.
Blog

Hartford Business Journal publishes article by Kelser about proactive cybersecurity

Kelser writes for the Hartford Business Journal about how companies need to be proactive about cybersecurity.
Blog

Hartford Business Journal publishes article on cybersecurity by Kelser COO & CTO Jonathan Stone

Hartford Business Journal publishes article on cybersecurity by Kelser COO & CTO Jonathan Stone
Blog

Hartford Courant Features Kelser's Hands-On Approach To Cybersecurity

Hartford Courant Features Kelser's Hands-On Approach To Cybersecurity
Blog

Has Your Firm Done Enough to Protect Your Network From a Data Breach?

This blog post discusses common data breach security holes found in networks and offers considerations to combat them.
Blog

How an IT Company in Connecticut Can Minimize Virtualization Security Threats

The use of cloud computing continues to expand, but an IT company can help minimize the risks of virtualization security threats.
Blog

How an IT Provider in Connecticut Can Help You Avoid Social Engineering Attacks

Partnering with an IT provider in Connecticut can help you avoid becoming the next victim of social engineering attacks.
Blog

How an IT Provider in CT Can Implement a Vulnerability Assessment for Your Business

It is essential to partner with an IT provider in CT that can provide vulnerability assessments for your organization.
Blog

How an IT Services Provider in CT Can Help You Prevent Social Engineering Attacks

Here are the three most common social engineering schemes and how an IT services provider in CT can help you avoid them.
Blog

How Can I Access My Documents From Anywhere?

Check out these three methods for accessing your documents, including the use of Microsoft Office 365.
Blog

How Can I Leverage Employee Productivity With Microsoft Office 365?

Check out these five tips for boosting employee productivity using Microsoft Office 365.
Blog

How Can Microsoft Office 365 Help My Business?

Learn how your business can benefit from implementing Microsoft Office 365 for work.
Blog

How Can My Business Cut Costs With Microsoft Office 365?

This post offers tips for cutting business costs with the adoption of Microsoft Office 365.
Blog

How Cisco and Kelser Are Revolutionizing the IT Industry With Cisco UCS

Cisco UCS can help businesses simplify operations and reduce costs. Kelser helps their clients get the most out of those benefits.
 
Blog | Video/Webinar

How Does Net Neutrality Affect Small Business?

The FCC has voted to end Net Neutrality. I talked about this issue on Fox61 and I've offered some more thoughts here.
Blog

How is IT and Cybersecurity Like Flying a Helicopter?

Kelser CTO Jon Stone was interviewed by Chion Wolf for the CT Voice Podcast. Check out highlights from their talk as well as the full audio.

Blog

How IT Can Sell Managed Services to the C-Suite

As an IT director, you're likely the first to see the need for managed services. Here's a step-by-step guide for presenting that to others.
Blog

How IT in CT Can Help with HIPAA Compliance

Privacy laws changed profoundly with the HIPAA, which has had a major impact on healthcare and IT in CT.
Blog

How IT Services in CT Can Help Your Business Fully Flourish Within its Intended Purview

IT services providers in CT can help your business concentrate on that which defines it at a core level.
Blog

How IT Services in CT Make Mobile Environments Secure

While a bring-your-own-device (BYOD) policy helps cut costs on hardware, it opens the door to vulnerabilities.
Blog

How much does cybersecurity cost? Maybe less than you think.

It's imperative that cybersecurity become part of your business strategy and it doesn't have to be as complicated or costly as you think.
Blog

How Much Does Microsoft Office 365 Cost?

Here are the costs for each version of Microsoft Office 365 as well as their accompanying specifications.
Blog

How Outsourcing IT Support in Connecticut Provides More Than Your Internal Staff

Companies offering IT support in CT can expedite workloads and give your company positive momentum towards success in many ways.
Blog

How Outsourcing Tech Work to an IT Support Firm in CT Will Catalyze Business Growth

An IT support firm in CT knows the ins and outs of networks, servers, computers, software, the cloud, and can help your business grow.
Blog

How Secure is Your Data Network?

How secure is your data network? Check out these 6 tips to secure your network.
Blog

How Startups Can Benefit from Companies That Provide IT Support in Connecticut

The best part of working with a company offering IT support in CT is having an expert team that will focus on all your startup's IT needs.
Blog

How to Assess the Effectiveness of Your Company's Network Security

Network assessments are a critical for determining the effectiveness of your network security. Here's a list of tips for a pro-grade network ...
Blog

How to Create an Effective Small Business Cybersecurity Policy

Cyber attacks on small business are up, and if you don't have a strong cybersecurity policy in place, you could be in trouble. Read more.
Blog

How to Get the Most Value from Your IT Department Budget

Learn 5 ways companies can make the most of their IT department budget, no matter how much they have available to spend.
Blog

How to Keep a Conference from Being Compromised

Many conferences and events have inadequate cybersecurity protections. Here are simple steps every event planner should take to protect attendees ...

Blog

How to Keep Your IT Department Secure and Efficient

The goal of IT security is to prevent the unauthorized access and use of your organization's computers, networks, files, and data.
Blog

How to Make Sure You Have Disaster-Ready Data Backups

No one expects a disaster to happen. But they do, and they will. The question is: is your data backed up properly and restorable?
Blog

How to Make Sure Your IT Partner in Connecticut is Worth Paying

Small businesses tend to grow gradually due to a lack of resources like IT support in Connecticut. Many don't even think about outsourcing,
 
Blog | Video/Webinar

How to Navigate Microsoft Teams

Whether you’re just starting to use Microsoft Teams or want to see what the interface is like, this video and article will give you a quick ...

Blog

How to Prevent a Data Breach at Your Company

Data breaches are rampant and costly. To help prevent a data breach at your organization, take these cybersecurity tips to heart.
Blog

How to Seamlessly Implement the Cloud with an IT Company in Connecticut

If you are hesitant to transition to the cloud, lean on our IT support team in Connecticut to facilitate the move.
 
Blog | Video/Webinar

How to Successfully Plan for and Recover from a Disaster

In this video and post, Andrew Tyler covers why you need a BCDR plan, how to test it, and how it can help you recover from a disaster.

Blog

How To Test Your IT Systems The Right Way Before Disaster Strikes

The importance of testing your plans for disaster recovery can't be understated. We discuss how to prepare and key areas to prepare for.
 
Blog | Video/Webinar

How To Video Chat More Securely

Kelser advises clients on how to use Zoom and other video conferencing software. I recently joined FOX 61 to discuss cybersecurity best practices ...

Blog

How You Can Ensure A Smooth Microsoft Office 365 Migration

Read this post if you want to learn what you can do to ensure a smooth migration and transition for Microsoft Office 365.
Blog

HPE 3PAR: The Smartest Storage System is Getting Even Smarter

HPE's announced that it will be bringing ground-breaking InfoSight technology to 3PAR, bringing clarity to their acquisition of Nimble.
Blog

ICYMI - Matt Kozloski Talks Cybersecurity on WNPR

Kelser was on WNPR's Where We Live talking cybersecurity along with FBI agent Judy Eide.
Blog

Important Data Breach Statistics You Need to Know

Data breaches are serious business that are increasing in frequency year after year. Here are 8 important statistics you need to know.
Blog

Improving I/O Performance with Violin Memory

Learn how you can improve I/O performance with Violin Memory.
Blog

Inc. Asks Kelser, “Who Will Get Hacked in 2017?”

Inc. Asks Kelser, "Who Will Get Hacked in 2017?"
Blog

Inc.com and Comcast Business Consult Kelser on Wi-Fi Security

This article explores the different types of wi-fi hacks in detail and recounts how Kelser demonstrates how 'evil twin' attacks work.
Blog

IndustryWeek Publishes Q&A with Kelser About NIST 800-171

IndustryWeek Publishes Q&A with Kelser About NIST 800-171
Assessment

INFINIDAT Total Cost of Ownership Assessment

Discover the cost savings you could see by consolidating your data center with an INFINIDAT Data Center TCO Assessment.
Blog

Infinidat's InfiniBox 4.0: Is All-Flash Just a Flash in the Pan?

Infinidat has released version 4.0 of its InfiniBox software, the brains behind its hybrid flash/hard-disk storage arrays.
Blog

Innovate Your Network Security with the Help of an IT Consultant in Connecticut!

Improving your network security is something that can be done with the guidance of an IT consultant in Connecticut.
Blog

Internal vs. Outsourced IT Services: An Honest Comparison

There are benefits to both internal or outsourced IT services, but the right decision comes down to your specific needs.
Blog

Is Microsoft's Office 365 Good For Small Businesses?

Check out this blog to get a better idea of whether or not office 365 is beneficial for your Connecticut small businesses.
Blog

Is My Data Really Secure In Microsoft Office 365?

Learn more about Microsoft Office 365's security, answering some of the most frequent security concerns.
Blog

Is Wi-Fi Security Your Biggest Vulnerability?

To thoroughly understand Wi-Fi security, it helps to know about these strategies that hackers use. Learn about them here.
Assessment

IT Asset Disposition Challenge

Whether you're confident in your procedures or unsure of possible exposures, put them to the test with our secure IT Asset Disposition Challenge.
Blog

IT Asset Lifecycle Management — What is the Optimal Refresh Cycle?

Managing the lifecycle of your IT assets is about more than hardware refreshes - it's also about predicting its end of life.
Blog

IT in Connecticut: 3 Reasons to Choose Cloud Computing

An IT provider in Connecticut can enable your company to provide an extra layer of security with the help of cloud technology.
Blog

IT in Connecticut: 4 Benefits of IoT Technology

Here are four ways that using an IT provider in Connecticut that offers IoT technology can benefit your organization.
Blog

IT in Connecticut: 5 Benefits of Cloud Computing Solutions

IT providers in Connecticut are increasingly providing cloud computing support solutions for many reasons. Here are 5 of the main ones.
Blog

IT in Connecticut: Cyber Thieves are Now Zeroing in on Law Firms

The assistance of proven IT professionals in Connecticut is essential to preventing potentially crippling data loss at CT law firms.
Blog

IT in Connecticut: Implementing Secure BYOD Solutions

By allowing employees to bring devices from home, your IT provider in Connecticut could help costs and improve efficiency.
Blog

IT in Connecticut: Questions to Ask When Vetting Cloud Providers

If you don't ask the right questions, you will likely be disappointed with your cloud provider's quality of service.
Blog

IT in Connecticut: Why You Should Consider Outsourcing

The nature of outsourcing has transformed with time, especially when you consider IT in Connecticut. Learn more in this post.
Blog

IT in Connecticut: Wireless Network and Mobile Security Considerations

Wireless technology has grown into a dominating force, and organizations that don't incorporate it into regular business may lag behind.
Blog

IT in CT Can Help You Comprehensively Secure Your Business Through the Cloud

IT providers in CT are offering cloud computing solutions for the many mainstream uses for the cloud today.
Blog

IT in CT: What is the Cloud and Why Should You Care?

IT in CT has been changed forever because of cloud computing, so it's necessary to have some idea about what it's all about.
Blog

IT Providers in Connecticut: The Need to Set Aside Funds for IT Security

The fact that data breaches have become so rampant has made it a necessity to set funds aside for security services. Learn why in this post.
Blog

IT Services in Connecticut That Can Help Your Business Grow

IT services in Connecticut as supplied through MSP solutions can help you establish and expand your profit while reducing expenses.
Blog

IT Services in CT Can Prove Essential in Maintaining Compliance

IT services in CT must be up to date on compliance for themselves and their clients as technology continues to expand at an exponential rate.
Blog

IT Services in CT: Advantages of Network Monitoring

Successful network attacks are enabled by poor network monitoring, and firms offering IT services in CT recommend the use of network monitoring.
Blog

IT Services in CT: Best Cyber Security Solutions for Your Business

Some businesses opt for a single layer of cybersecurity. Many IT services experts in CT agree that a multi-layer approach is best.
Blog

IT Services in CT: Best Ways to Secure Your Financial Firm's IT

Many hackers have allied with one another to form hacking syndicates. However, IT services experts in CT can help you keep your data safe.
Blog

IT Services in CT: Identifying & Preventing Social Engineering Attacks

An IT services provider in CT can help you discern the difference between legitimate and illegitimate social media profiles.
Blog

IT Services in CT: Main Benefits of Using DRaaS

When you outsource IT services in CT, you should work with a team that gives you the option of Disaster Recovery-as-a-Service (DRaaS).
Blog

IT Services in CT: Offensive Approach to Tech Security

Where before IT security was primarily defensive, IT services providers in CT have adopted a new role in terms of technology security.
Blog

IT Services in CT: The Surprising Truth about Hackers

Learn about what motivates these four main types of hackers and how you can protect your data from them.
Blog

IT Services in CT: Utilizing Virtualization for Disaster Recovery

An IT services provider in CT can help you employ virtualized solutions that can facilitate swifter post-disaster recovery.
Success Story

IT strategy for staged implementation ensures virtually invisible email change

Connecticut-based Data-Mail was relying on an email system older than the original iPhone. Learn how Kelser helped cut costs and improve availability.
Blog

Keeping Your Mobile Devices Safe with IT Services in CT

Devices are very easily hacked or compromised if you don't take steps to prevent this from happening.
Blog

Kelser - Proud of Our Partners

We wanted to applaud the efforts of Datto, one of our valued Partners, for their recent efforts in a time of need.
Blog

Kelser Analyzes Facebook Data Breach on WTNH

Good Morning Connecticut on WTNH had Kelser on to unpack the Facebook data breach and offer predictions and tips for users.
Blog

Kelser Co-Authors Disaster Recovery Article for CFO.com with Webster Bank

Kelser Co-Authors Disaster Recovery Article for CFO.com with Webster Bank
 
Blog | Video/Webinar

Kelser Exec Gives TEDx Talk on Cybersecurity

At TEDxHartford, Kelser's VP, Professional Services spoke about cybersecurity. His goal is to change the way the we think about it.
Blog

Kelser Helps CIO.com Debunk Cloud Myths

Kelser had the chance to help break down some common misconceptions and assumptions about cloud in an article for CIO.com.
Blog

Kelser Helps Reader's Digest Promote Better Communication with IT Pros

Kelser recently contributed to a Reader's Digest article titled "11 Things IT Professionals Don't Want You To Know"
 
Blog | Video/Webinar

Kelser Offers Business Takeaways from Capital One Breach in Washington Post and More

Experts from Kelser provided perspective on the recent Capital One data breach for The Washington Post, and all four local Connecticut TV networks.
Blog

Kelser on WNPR to Talk About Equifax Data Breach

Kelser on WNPR to Talk About Equifax Data Breach.
 
Blog | Video/Webinar

Kelser Provides Context on CHET Breach for WFSB Eyewitness News

Kelser was interviewed for thoughts on the $1.4 million breach of Connecticut's state-sponsored college savings fund.
Blog

Kelser Quoted as Expert Source in InsideHigherEd Article on Ransomware

Kelser Quoted as Expert Source in InsideHigherEd Article on Ransomware
Blog

Kelser Talks Cybersecurity Basics on Real Estate Radio

Kelser returned to the 94.9 FM CBS Radio airwaves for another episode of Real Estate Radio.
Blog

Kelser Talks Disaster Recovery and Business Continuity on MetroHartford Alliance Radio Show

Kelser Talks Disaster Recovery and Business Continuity on MetroHartford Alliance Radio Show
 
Blog | Video/Webinar

Kelser Talks Google Chrome Vulnerability on NBC Connecticut

When the news emerged that there was a security issue in Google Chrome, Kelser provided NBC Connecticut with some expert perspective.
 
Blog | Video/Webinar

Kelser Talks Hotel Data Breach on FOX 61

Kelser went on FOX 61 to discuss the data breach that affects visitors of Starwood properties dating back to 2014.
Blog

Kelser Talks Net Neutrality on Fox61

After the FCC voted to end net neutrality, Fox61 invited Kelser to talk about what the vote means for businesses and consumers.
Blog

Kelser Talks Tax Fraud on WTNH and Pulse of the Region

Kelser is interviewed on 'Pulse of the Region' radio show to talk about tax scams and how businesses can avoid them.
Blog

Learn From Equifax's Most Recent Security Breach

We don't want any business to fall victim to the same types of vulnerabilities that Equifax did. Here's what you can learn this breach.
Blog

Lessons Learned from the NASCAR Team Ransomware Attack

A NASCAR team was victimized by ransomware early in the 2016 racing season. Here's some lessons we can learn from their survival story.
Success Story

Maintaining business flow during a major technology transition

Webster Bank was undertaking a large-scale hardware refresh. Learn how Kelser seamlessly transitioned Webster Bank to their new hardware without a ...
 
Blog | Video/Webinar

Meet the Cyber Mafia: Kelser Exposes the Business of Cybercrime

This year, a simple thought occurred to me. Hackers are the new mafia. Cybercrime is the newest part of the organized crime business model.
Success Story

Mentored platform implementation delivers peak efficiency for Connecticut-based medical device company

Beekley Corporation had IT challenges in the areas of performance, efficiencies, and infrastructure. Learn how a mentored IT consulting approach ...
Blog

Microsoft Office 365: An Overview

Looking to shed the cost of your aging Exchange infrastructure? You might be considering Office 365. Here's what it has to offer.
Blog

Microsoft Office 365: Meeting Your Workplace Challenges [Infographic]

Check out this blog post to view an infographic, which details how Microsoft Office 365 can help you overcome workplace challenges.
Blog

Microsoft Office 365: What Are The Benefits For Law Firms?

Learn about Microsoft Office 365 and how it can help small and midsized law firms.
Blog

Microsoft Office 365: What's The Cloud?

Check out these 3 main reasons to move to the cloud, specifically in regards to Microsoft Office 365.
Success Story

Minimizing the expense of meeting new security requirements

A Connecticut-based law firm recently updated their data center, but it wasn't meeting their security compliance needs. Learn how Kelser helped.
Blog

Mobility and Collaboration with Less IT Infrastructure? Microsoft Office 365.

Q: How can businesses provide file access regardless of their employees' location while still staying secure and on budget? A: Office 365.
Blog

Musing on Private Cloud for Virtual Servers

How and when should you leverage private cloud technologies for virtual workload hosting?
Success Story

Network design and onsite support keeps PGA event on track

The Travelers Championship needs reliable technology and IT expertise. Learn how Kelser has helped keep this prestigious PGA event on track for over ...
Blog

Network Security Services: 6 Excuses Why Business Owners Don't Think They Need Them

We've heard every excuse from companies who don't take a proactive approach to network security services. Learn why many of them don't hold.
Blog

New England Journal of Higher Education Publishes Article by Kelser

New England Journal of Higher Education Publishes Article by Kelser
Success Story

Next-gen technology provides global network security

A Connecticut-based global manufacturer was looking to improve their cybersecurity posture all around the world. Learn how Kelser hardened their ...
Blog

NIST 800-171 Implementation for Connecticut Companies

If you're a CT company that works anywhere in a government agency's supply chain, you'll want to know about NIST 800-171 guidelines.
Assessment

No-Cost Business Continuity/Disaster Recovery (BCDR) Assessment

Looking to implement a business continuity and disaster recovery solution or want to evaluate your current setup? Our BCDR Assessment can help.
Assessment

No-Obligation Budget Range for a Cybersecurity Program

Get a custom budget range for a cybersecurity program for your business within one business day. There's no obligation, and no cost to you.
Blog

Outsourcing IT Project Work vs. Managed IT Services

Outsourcing specific IT projects and having a fully managed IT services team are 2 options to meet your IT needs. Learn which is best for you.
Blog

Overwhelmed or Annoyed by Cybersecurity? Cybersecurity-as-a-Service May Be for You

We don't think cybersecurity has to be expensive or complicated, so we created a truly comprehensive Cybersecurity-as-a-Service offering.
Success Story

Pre-staging and testing eases manufacturer's move and technology change

Connecticut-based Atlantic Fasteners was relocating their data center and looking to upgrade their systems at the same time. Learn how Kelser eased ...
Blog

Preparing for a Workforce that Wants to Work Any Time, Anywhere, on Any Device

Mobility is now possible with cloud-based software like Microsoft Office 365. Learn how to prepare for your mobile workforce.
Blog

Pros and Cons of Local and Cloud Data Storage

Since the advent of cloud technology, you've had the option to replace local backups with off-site, cloud storage. But does it work for you?
Blog

Protecting Your IoT Devices and Wired or Wireless Networks

There will soon be more IoT devices in the world than people. How will you protect your devices and network? Learn how to take action.
Interactive Tool

Quiz: How Strong is Your Knowledge of Secure IT Asset Disposition?

Equipment and devices may present a risk to your business AFTER you're done using them. See if you're securely disposing your IT assets.
Interactive Tool

Quiz: Is Your Company Cybersecure?

Get an idea of how cybersecure your organization is with our quick 2-minute quiz.
Interactive Tool

Quiz: NIST 800-171 Self-Assessment

NIST 800-171 will apply to contractors and sub-contractors of the federal government - do you know if your business will be affected?
Interactive Tool

Quiz: SD-WAN Self-Assessment

Companies that use SD-WAN usually see lower costs, improved performance, increased bandwidth, and greater ease of use compared to traditional WAN.
Blog

Real Estate Cybersecurity: An In-Depth Conversation

Here are the highlights of our interview on Real Estate Radio about cybersecurity for the real estate industry and companies of all sizes.
Interactive Tool

Recovery Time (RTO) & Downtime Cost Calculator

Evaluate your recovery time and recovery point objectives and determine the cost of downtime.
Success Story

Remote access solution puts builder's office at the jobsite

A Connecticut-based construction management firm was being held back by their aging IT infrastructure. Learn how Kelser revolutionized their IT ...
Assessment

SD-WAN Cost Benefit Analysis

See how much money a SD-WAN solution can save you with our cost benefit analysis.
Blog

Secure IT Asset Disposition: How to Keep Your Data Safe

With so many components of IT security, it's easy to make asset disposal an afterthought. That could be a costly mistake. Learn more here.
Blog

Security Audits: Two Unique Perspectives

Independent security audits, such as a penetration test or vulnerability assessment, are critical to cybersecurity. Learn more here.
Blog

Should Your Company Introduce Mobile Devices to Do Business and Office Work?

Here are a few points to consider when introducing mobile devices to your workplace.
Success Story

Simplifying and supporting remote medical work

Connecticut-based Jefferson Radiology needed a secure, compliant way for their staff to work remotely with all the same capabilities of working from ...
Blog

So You Missed the NIST 800-171 Deadline: Now What?

If you're a supplier, contractor or subcontractor with the federal government, you or your colleagues have no doubt heard of NIST 800-171.
 
Blog | Video/Webinar

Starling Physicians Data Breach: What You Need To Know

CT-based Starling Physicians disclosed a data breach this month. Kelser joined NBC CT to help explain how the victims can protect themselves.
Blog

Stop Losing Data

If your business relies on computer files and documents to do its job, you've likely worried about the risks of lost data at some point.
Blog

Takeaways from the Cyber Attack on Connecticut State Agencies

Connecticut state agencies were impacted by a cyber attack. Find out what happened and how you can protect your company from similar attacks.
Blog

Talking the Next Big Cyber Attack on the Brad Davis Show

We recently joined the Brad Davis Show to break down the latest Windows and Intel vulnerabilities as well as vulnerabilities in general.
Blog

The 10 Cybersecurity Tools You Need to Stay Secure

There are 10 essential tools and services that any organization needs in its cybersecurity toolbox to face down ever-evolving threats.
Blog

The 7 Deadly Security Sins - Could You be Committing These All-Too-Common Mistakes?

We've seen the same cybersecurity sins being committed over and over, so we put together a list of some of the worst and most surprising.
Blog

The 7 Types of Virtualization

There are 7 primary types of virtualization, and each one differs according to the element it is used on. Learn more about each.
Blog

The Changing Role of Technology Executives

Kelser was quoted by two major technology news outlets about the role of technology executives in the success of their organizations.
Blog

The Definition of a Managed Security Service Provider (MSSP) [In Under 100 Words]

Learn what managed security service providers do in under 100 words.