<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">
NIST Compliance - Are You Ready? 00 : 00 : 00 : 00

Information technology blog, cybersecurity blog

Kelser Blog

The Kelser Blog covers technology and business topics such as Cybersecurity, IT Lifecycle Management, Modern Data Center, Workforce Enablement, and more.

Blog Feature

Cybersecurity

Why You Need Cybersecurity Training for Employees

By: Matt Kozloski
April 19th, 2017

See if you notice the gap here: according to a recent report, 91% of cyberattacks start with a phishing email, yet cybersecurity training for employees is vastly underutilized in virtually every type of organization. How do you look at that statistic and not run immediately to human resources to make cybersecurity training mandatory for all employees? We can’t be totally sure, but we can offer some great background on the effect employees have on your company’s cybersecurity posture and tips for how to improve with training, and that’s exactly what we’re going to do in this blog post. If you want to act now to begin tightening up the security habits of your employees or coworkers, download our recent complimentary ebook, 10 Simple Things to Improve Your Company's Cybersecurity Posture.

Read More

Share

Blog Feature

Cybersecurity

Biggest Takeaways from the Cisco 2017 Annual Cybersecurity Report

By: Matt Kozloski
April 13th, 2017

The Cisco 2017 Annual Cybersecurity Report was released earlier this year. A few of the main topics the report focuses on are: How has the cybersecurity landscape changed in the past year? What are the latests threats to cybersecurity? How have behaviors from both attackers and defenders changed? As you’ve no doubt heard us discuss before, improving your company’s cybersecurity posture is a huge responsibility, and the data in this report can help. 

Read More

Share

Cybersecurity eBook Cover Image

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity

Why You Need a Disaster Recovery Plan To Keep Your Business Safe

By: Matt Kozloski
March 23rd, 2017

“We’re really excited to start creating our disaster recovery plan!” Said no one, ever. Perhaps it’s not the most exciting project, but do you want to know what’s less fun than working on a disaster recovery plan? Working to fix a disaster that happened with no contingency in place. Just like having insurance, a disaster recovery plan is designed so that when the worst happens you have support, guidance and resources to correct the issue and move on. From a technology standpoint, this is essential for business continuity, and in some cases, compliance. One misconception about disaster planning is that it’s some huge gorilla of a project that requires significant effort and investment. The truth is it doesn’t have to be, and there are a lot of things you can do on a small scale that have a big effect.

Read More

Share

Blog Feature

IT Lifecycle Management | Executive Consulting

Why You Need an IT Consultant

By: Matt Kozloski
February 20th, 2017

Why you need an IT consultant is the same reason why you need innovation at the workplace—the continued and sustained growth of your company. In a fast-paced world of increased consumer choice and quick-moving competitors, innovation through use of technology isn’t just a nice thing to have; it’s essential for growth. Many organizations don’t have the time or resources to achieve technological gains in house. They usually have other day-to-day responsibilities that consume their time leaving little left to think about innovative strategies. Technology, when applied properly, doesn’t just benefit the IT department—it helps every part of the business run more smoothly and achieve at a higher level.

Read More

Share

Blog Feature

Cybersecurity

Biggest Cybersecurity Challenges for 2017

By: Matt Kozloski
January 23rd, 2017

The way people work today is fundamentally different than it used to be. The workplace is dependent on technology, and most companies store their sensitive data in locations that are vulnerable to hackers. In addition, as more devices join the Internet of Things, possible points of attack multiply quickly. Cyber criminals have adapted to this new normal. They now have more opportunities to do what they do best, and they are taking advantage of every weakness. Even though cybersecurity tools and strategies are always improving, breaches are still occurring on a regular basis and the privacy of our information continues to be questioned.

Read More

Share

Blog Feature

Cybersecurity

How to Create an Effective Small Business Cybersecurity Policy

By: Matt Kozloski
January 11th, 2017

What’s the #1 reason to create (and enforce) a small business cybersecurity policy? Getting hacked poses a serious risk for your business, if it hasn't already happened. Hacking, viruses, phishing, malware, worms, Trojans—cyber attacks go by various names, but the common denominator is that everyone has the potential to be attacked. Seriously, everyone—from the well-publicized 2016 hacking of the Democratic National Committee to the daily cyber attacks of more than 25 million small businesses in the US, it happens to everyone. So what’s a small business owner to do—throw up his hands (and his customers’ financial info) and give up? Far from it.

Read More

Share