The Kelser Blog covers technology and business topics such as Cybersecurity, IT Lifecycle Management, Modern Data Center, Workforce Enablement, and more.
Not too long ago, I was interviewed for a Comcast Business blog post and Inc.com article about Wi-Fi security. As long as the Wi-Fi is up and running, the security of it isn’t something the average person gives a lot of thought to, but improperly secured Wi-Fi networks present a number of unique vulnerabilities hackers can exploit to gain access to sensitive data. To understand Wi-Fi security, it helps to know about these strategies that hackers use.
Earlier this week, the FBI urged thousands of small business and home office internet users to reboot their routers to prevent the impact of VPNFilter, the latest malware threat to businesses and consumers. Hours after the story broke, I was invited to WTNH News 8's studios to do a Facebook live Q&A.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
Facebook is the latest highly recognizable company to make headlines for a data scandal with a staggering number attached. This time, it’s the profile data of 50 87 million users that was given without their consent to a third party who used their data to influence an election. In the cannon of major data breaches—Equifax, Target, Anthem, etc.—Facebook’s is a unique case with its own set of takeaways for businesses.
If you’re the IT director at your organization, you’re likely the first one to see the need for managed services such as Cybersecurity-as-a-Service and Network-as-a-Service. However, it can be tricky to convince your boss, who may be the CEO, CFO, or COO, that outsourcing part of the company’s IT to an independent vendor will be more than merely a new expense. Here’s a step-by-step guide to organizing and presenting your thoughts on managed service providers.
Desktop Environment Managers share several concerns about the challenges of managing a company’s desktop and laptop environment. Chiefly, they struggle with the maintenance of the separate images used to support both hardware and users. The quandary of simultaneously supporting operating systems during an upgrade is also a challenge.
At the heart of many of today’s high-value business applications are large repositories of business data stored on rotating magnetic disk. Although CPU performance is critical to the performance of many of these applications, I/O performance, or the ability to read and write data to and from the disk, is frequently even more critical. The more time an application spends waiting for data to be read from or written to disk, the more its performance will improve if I/O can happen with less delay.