The Kelser Blog covers technology and business topics such as Cybersecurity, IT Lifecycle Management, Modern Data Center, Workforce Enablement, and more.
The malicious ransomware dubbed "WannaCry" has seized systems in over 150 countries since its discovery on May 12th, holding computers across all industries hostage. The program infects computers and encrypts their files, demanding $300 in Bitcoin or the files will be erased. This ransomware currently affects Microsoft Windows machines through an exploit known as EternalBlue. Given the severity of this attack and other ransomware variants following suit, it's time to make sure that your organization is protected. We've compiled this list of 9 resources that will help prepare your organization for malware attacks like WannaCry, so that you can ensure your files and information are safe.
Cybersecurity has become a mainstream point of discussion over the last five years. With notable attacks on Target, NASA, the United States Defense Department, and the WannaCry / WannaCrypt outbreak, the public now has a heightened sense of awareness (and fear) of cyber crime. Perhaps no industry needs a wake up call more than the healthcare industry.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
Nearly everyone has heard of the Software-as-a-Service (SaaS) business model, and technology has even gone so far to start labeling Everything-as-a-Service (XaaS), but how often do you hear of Wireless-as-a-Service (WaaS)? In this post, we’ll break down the top six reasons to consider WaaS as a practical option for implementing cutting edge networking for your business.
See if you notice the gap here: according to a recent report, 91% of cyberattacks start with a phishing email, yet cybersecurity training for employees is vastly underutilized in virtually every type of organization. How do you look at that statistic and not run immediately to human resources to make cybersecurity training mandatory for all employees? We can’t be totally sure, but we can offer some great background on the effect employees have on your company’s cybersecurity posture and tips for how to improve with training, and that’s exactly what we’re going to do in this blog post. If you want to act now to begin tightening up the security habits of your employees or coworkers, download our recent complimentary ebook, 10 Simple Things to Improve Your Company's Cybersecurity Posture.
The Cisco 2017 Annual Cybersecurity Report was released earlier this year. A few of the main topics the report focuses on are: How has the cybersecurity landscape changed in the past year? What are the latests threats to cybersecurity? How have behaviors from both attackers and defenders changed? As you’ve no doubt heard us discuss before, improving your company’s cybersecurity posture is a huge responsibility, and the data in this report can help.
“We’re really excited to start creating our disaster recovery plan!” Said no one, ever. Perhaps it’s not the most exciting project, but do you want to know what’s less fun than working on a disaster recovery plan? Working to fix a disaster that happened with no contingency in place. Just like having insurance, a disaster recovery plan is designed so that when the worst happens you have support, guidance and resources to correct the issue and move on. From a technology standpoint, this is essential for business continuity, and in some cases, compliance. One misconception about disaster planning is that it’s some huge gorilla of a project that requires significant effort and investment. The truth is it doesn’t have to be, and there are a lot of things you can do on a small scale that have a big effect.