<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Certain nonfederal organizations need to be compliant with the requirements laid out in NIST SP 800-171 by this deadline. Learn more

NIST Compliance - Are You Ready? 00 : 00 : 00 : 00

Information technology blog, cybersecurity blog

Kelser Blog

The Kelser Blog covers technology and business topics such as Cybersecurity, IT Lifecycle Management, Modern Data Center, Workforce Enablement, and more.

Blog Feature

Cybersecurity | WannaCry

9 Resources to Help Protect You From Ransomware Attacks Like WannaCry

By: Adam Stahl
May 24th, 2017

The malicious ransomware dubbed "WannaCry" has seized systems in over 150 countries since its discovery on May 12th, holding computers across all industries hostage. The program infects computers and encrypts their files, demanding $300 in Bitcoin or the files will be erased.  This ransomware currently affects Microsoft Windows machines through an exploit known as EternalBlue. Given the severity of this attack and other ransomware variants following suit, it's time to make sure that your organization is protected. We've compiled this list of 9 resources that will help prepare your organization for malware attacks like WannaCry, so that you can ensure your files and information are safe.

Read More

Share

Blog Feature

Cybersecurity | Workforce Enablement

Top 3 Reasons Healthcare Providers Should Make Cybersecurity a Priority

By: Matt Kozloski
May 19th, 2017

Cybersecurity has become a mainstream point of discussion over the last five years. With notable attacks on Target, NASA, the United States Defense Department, and the WannaCry / WannaCrypt outbreak, the public now has a heightened sense of awareness (and fear) of cyber crime. Perhaps no industry needs a wake up call more than the healthcare industry.

Read More

Share

Cybersecurity eBook Cover Image

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Wireless-as-a-Service

6 Reasons You Need Wireless-as-a-Service

By: Matt Kozloski
May 9th, 2017

Nearly everyone has heard of the Software-as-a-Service (SaaS) business model, and technology has even gone so far to start labeling Everything-as-a-Service (XaaS), but how often do you hear of Wireless-as-a-Service (WaaS)? In this post, we’ll break down the top six reasons to consider WaaS as a practical option for implementing cutting edge networking for your business.

Read More

Share

Blog Feature

Cybersecurity

Why You Need Cybersecurity Training for Employees

By: Matt Kozloski
April 19th, 2017

See if you notice the gap here: according to a recent report, 91% of cyberattacks start with a phishing email, yet cybersecurity training for employees is vastly underutilized in virtually every type of organization. How do you look at that statistic and not run immediately to human resources to make cybersecurity training mandatory for all employees? We can’t be totally sure, but we can offer some great background on the effect employees have on your company’s cybersecurity posture and tips for how to improve with training, and that’s exactly what we’re going to do in this blog post. If you want to act now to begin tightening up the security habits of your employees or coworkers, download our recent complimentary ebook, 10 Simple Things to Improve Your Company's Cybersecurity Posture.

Read More

Share

Blog Feature

Cybersecurity

Biggest Takeaways from the Cisco 2017 Annual Cybersecurity Report

By: Matt Kozloski
April 13th, 2017

The Cisco 2017 Annual Cybersecurity Report was released earlier this year. A few of the main topics the report focuses on are: How has the cybersecurity landscape changed in the past year? What are the latests threats to cybersecurity? How have behaviors from both attackers and defenders changed? As you’ve no doubt heard us discuss before, improving your company’s cybersecurity posture is a huge responsibility, and the data in this report can help. 

Read More

Share

Blog Feature

Cybersecurity

Why You Need a Disaster Recovery Plan To Keep Your Business Safe

By: Matt Kozloski
March 23rd, 2017

“We’re really excited to start creating our disaster recovery plan!” Said no one, ever. Perhaps it’s not the most exciting project, but do you want to know what’s less fun than working on a disaster recovery plan? Working to fix a disaster that happened with no contingency in place. Just like having insurance, a disaster recovery plan is designed so that when the worst happens you have support, guidance and resources to correct the issue and move on. From a technology standpoint, this is essential for business continuity, and in some cases, compliance. One misconception about disaster planning is that it’s some huge gorilla of a project that requires significant effort and investment. The truth is it doesn’t have to be, and there are a lot of things you can do on a small scale that have a big effect.

Read More

Share