<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Information technology blog, cybersecurity blog

Kelser Blog

The Kelser Blog covers technology and business topics such as Cybersecurity, Business Continuity, Disaster Recovery, Networking and Wireless, Managed Services, and more.

Adam Stahl

Adam is a Biznologist who invites boundless creativity to achieve outcomes that inspire confidence.

Blog Feature

Cybersecurity

By: Adam Stahl
January 18th, 2019

It seems like large-scale data breaches that expose thousands upon millions of records are regrettably becoming commonplace today. Protecting your personal and business data should be a priority for anyone that has ever entered information into a web form. Without taking proper steps to secure your data like login credentials, you could make yourself vulnerable to anything from phishing attacks to full account takeover (or even worse). Even a single breach can cost a business upwards of $2.3 million per attack (not to mention the costs related to things like the damage to your reputation) and personal accounts risk losing personal finances, priceless memories (like photos and videos), and more. One of the most basic ways to improve cybersecurity is to make sure you're following best practices for your passwords.

Blog Feature

Cybersecurity | Executive Consulting

By: Adam Stahl
October 18th, 2018

It can be scary out there in the digital world. It seems like not a week goes by where we don’t hear about phishing emails, unpatched vulnerabilities, or the latest strain of ransomware exposing the data of millions of people and businesses to the prying eyes of malicious actors. Every person and every business are potential targets with some of the largest companies in the world susceptible to the same vulnerabilities as the average Joe at their home computer (phishing being a prime example).  But all is not lost as October is National Cybersecurity Awareness Month! What better time to review your cybersecurity practices, discover where you can make improvements, and seize the chance to make positive change? Consider it a fall “spring cleaning” for your digital life and business.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Modern Data Center | Executive Consulting

By: Adam Stahl
May 22nd, 2018

When HPE acquired 3PAR back in 2010, their Storage Array Network got a boost that made them a contender in data security, and storage against companies like Dell EMC and IBM. So far, this flash-optimized data security has successfully competed in the mid-range, and enterprise level storage arenas. 

Blog Feature

Cybersecurity

By: Adam Stahl
May 8th, 2018

If you're a supplier, contractor or subcontractor with the federal government, you or your colleagues have no doubt heard of NIST 800-171. If you haven't, check out "Everything You Need to Know About NIST 800-171." for all of the details, and how it may affect your business contracts.

Blog Feature

Cybersecurity

By: Adam Stahl
February 27th, 2018

Twelve Connecticut state agencies were impacted by a cyber attack over the weekend. According to reports, the cyber attack appeared to be the nefarious ransomware WannaCry that wreaked havoc worldwide in 2017. Officials say that even though approximately 160 computers across twelve agencies were affected, the outbreak was contained by Sunday night and there were no reports of encryption or data loss. Fortunately, it appears that the state was able to effectively mitigate ill effects from the attack. As we’ve discussed with Arthur House, Chief Cybersecurity Risk Officer for the State of Connecticut, our state is an international leader in cybersecurity. This was demonstrated in the state’s response to the attack.

Blog Feature

Cybersecurity | Executive Consulting | Managed Services

By: Adam Stahl
January 5th, 2018

Just under a week into the New Year and the world is already experiencing the first critical vulnerability in 2018. Researchers have discovered two security vulnerabilities that collectively affect most modern chips made by Intel, AMD, and ARM. If exploited, a hacker could potentially steal data from the breached machine ranging from emails and browsing data to login credentials. So, what are these vulnerabilities and what steps can you take to protect your business network from them?

Blog Feature

Cybersecurity | Executive Consulting

By: Adam Stahl
November 14th, 2017

It seems like you can’t open a web browser, scroll through your LinkedIn timeline, or turn on the TV today without hearing about the latest data breach or threat to your cybersecurity. With high-profile breaches like Equifax and global ransomware outbreaks like Bad Rabbit, we’re in a very different world than just a few years ago. Perhaps you find that cyber threats and cybersecurity in general is annoying, overwhelming, or even frustrating but it’s imperative that cybersecurity protection become part of your business strategy. It doesn’t have to be as complicated or costly as you might think.

Blog Feature

Cybersecurity

By: Adam Stahl
October 30th, 2017

Last week the third major ransomware outbreak in 2017 was spreading through Eastern Europe and even starting to creep further across the globe. So far striking Russia and Ukraine the most, Bad Rabbit has disrupted industries ranging from media outlets to banks. Some reports even have the attack showing up right here in the U.S. Similar to the Petya/NotPetya ransomware outbreak earlier this year (so similar in fact that Bad Rabbit reportedly shares 2/3 of its code with variants of Petya), this ransomware encrypts a system, requests a ransom (the current rate is about $285 in bitcoin) to decrypt the victim’s files, and then attempts to spread itself across the network. With ransomware and cyberattacks commonplace in today’s world, what takeaways can come out of the Bad Rabbit outbreak to help prevent these types of attacks from derailing your organization?