7 Characteristics of a Successful Cybersecurity Policy

October 18, 2016 / by Matt Kozloski posted in Security

How well-developed is your company's cybersecurity policy? Does it apply equally well to every area in which you do business, providing consistent protection from both interior and exterior threats without hindering productivity? How quickly can you recover from a data disaster? Cybersecurity can seem intimidating at first, but there are steps you can take to reduce your exposure, keeping in mind that it is an ongoing process.

Read More

ICYMI - Matt Kozloski Talks Cybersecurity on WNPR

October 17, 2016 / by Adam Stahl posted in cybersecurity

Matt Kozloski, Kelser's Vice President of Professional Services, was recently invited to speak as a cybersecurity expert on WNPR's Where We Live along with FBI Special Agent Judy Eide.    Where We Live is a regular segment that centers on Connecticut and New England, but also expands to the entire United States. Callers can phone in and speak with guests on the show directly - asking them questions about what it really means to them.

Read More

Malware: What It Is, How It Spreads, and How It Has Become an Epidemic

September 16, 2016 / by Matt Kozloski posted in Security

When an entry-level employee, perhaps a brand-new hire who just received database access, receives an important-looking email from the CEO of the company, what does that employee do? In the vast majority of cases, he or she opens that email up immediately—it must be important if it's coming all the way from the head of the company, right? After clicking a bogus link, nothing unusual happens and the email is quickly forgotten about. However, three weeks later, production grinds to a halt as every employee in the company, from entry-level to executive, discovers they've been locked out of the system. Until a Bitcoin payment is made to a secret address, the computers warn, access to the system will be made impossible.

Read More

10 Simple Things You Can Do to Improve Your Company’s Cybersecurity Posture

August 31, 2016 / by Matt Kozloski posted in Security

Technology is playing an increasingly important role in the world of business. As the days march on, business leaders are still not placing enough emphasis on cybersecurity and related issues. This perspective not only has negative effects on a company's overall security posture, but it also opens even the strongest organizations up to the types of digital threats from which they might not recover.

Read More

Lessons Learned from the NASCAR Team Ransomware Attack

July 7, 2016 / by Adam Stahl posted in Security

Circle Sport-Leavine Family Racing, a NASCAR racing team, was victimized by ransomware early on in the 2016 racing season. Their crew chief said that the data held for ransom was worth millions of dollars and that it would’ve taken about 1,500 man-hours to recreate the data. Under the gun, with another race just days away the team decided to pay the Bitcoin ransom.  

Read More

Stop Losing Data

June 1, 2016 / by Steve Machesney posted in Office 365

If your business relies on computer files and documents to do its job, you’ve likely worried about the risks of lost data at some point. Saving documents to your hard drive is not always enough to keep your business protected. For instance, if your business’s hard drive becomes damaged, all of your work, and the work of your employees, can be gone in the blink of an eye. Some businesses don’t think about data loss until they’ve experienced it firsthand. But, with all the challenges businesses face when data loss occurs, it’s beneficial to come up with a preventative strategy early on.

Read More

Common Threats to Mobile Security and How to Combat Them

May 19, 2016 / by Matt Kozloski posted in Mobile, Security

Securing today’s mobile workforce is becoming increasingly difficult. As the demand for remote productivity grows, so too does the sophistication of cyber-attacks aimed at road warriors. Some of today’s threats include mobile malware, eavesdropping, unauthorized access, and unlicensed or unmanaged applications. Let’s take a look at these threats and what can be done to combat them.    

Read More

Building a Modern Distributed Workforce That’s Connected

May 11, 2016 / by Steve Machesney posted in Office 365, Mobile

As the business world evolves, management has become more innovative. Top managers have begun employing creative strategies to attract and retain top talent, and improve productivity while keeping costs in check. These advancements have not been entirely voluntary, as businesses are often forced to respond to several day-to-day challenges to stay afloat. Here are some of these key challenges:

Read More

Your Mobile Data - Secured by Microsoft

April 27, 2016 / by Adam Stahl posted in Office 365, Security, Microsoft

With so many companies utilizing the cloud and mobile devices, data security should be a major concern for all businesses. Yet, despite numerous security breaches, distributed denial-of-service (DDoS), and security experts’ repeated warnings that businesses need to better protect their information, many companies remain unprepared or inadequately protected from various security threats. 

Read More

Mobility and Collaboration with Less IT Infrastructure? Microsoft Office 365.

April 20, 2016 / by Lisa Carroll posted in Office 365, Cloud Services, Mobile

The days of driving to the office, sitting behind a desk, and working from the same desktop computer for eight hours are becoming a thing of the past. Today’s managers and employees can work from the office, or a client’s location by using mobile devices and laptops. Unfortunately, the growing need for mobility has created new challenges for many business owners, particularly IT managers. How can businesses provide access to files and documents regardless of their employees’ physical location, while still ensuring security and sticking to budget?

Read More