<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Information technology blog, cybersecurity blog

Kelser Blog

The Kelser Blog covers technology and business topics such as Cybersecurity, Business Continuity, Disaster Recovery, Networking and Wireless, Managed Services, and more.

Jonathan Stone

Jon is the COO and CTO of Kelser Corporation and has over 20 years of industry experience.

Blog Feature

Business Continuity | Disaster Recovery | Managed Services

By: Jonathan Stone
October 30th, 2018

From Hurricane Irene in 2011 to the “blizzard of 2013” that dumped two feet of snow across much of the state, Connecticut has seen its fair share of extreme weather. Not only do these natural disasters disrupt people’s daily lives and prevent them from coming into work, they also disable or damage critical business infrastructure and utilities such as power, electricity, and heating.

Blog Feature

Wireless | Cybersecurity | Managed Services

By: Jonathan Stone
July 10th, 2018

Not too long ago, I was interviewed for a Comcast Business blog post and Inc.com article about Wi-Fi security. As long as the Wi-Fi is up and running, the security of it isn’t something the average person gives a lot of thought to, but improperly secured Wi-Fi networks present a number of unique vulnerabilities hackers can exploit to gain access to sensitive data. To understand Wi-Fi security, it helps to know about these strategies that hackers use.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | Executive Consulting | Networking | Wireless

By: Jonathan Stone
May 31st, 2018

Earlier this week, the FBI urged thousands of small business and home office internet users to reboot their routers to prevent the impact of VPNFilter, the latest malware threat to businesses and consumers. Hours after the story broke, I was invited to WTNH News 8's studios to do a Facebook live Q&A.

Blog Feature

Cybersecurity | Executive Consulting

By: Jonathan Stone
April 11th, 2018

Facebook is the latest highly recognizable company to make headlines for a data scandal with a staggering number attached. This time, it’s the profile data of 50 87 million users that was given without their consent to a third party who used their data to influence an election. In the cannon of major data breaches—Equifax, Target, Anthem, etc.—Facebook’s is a unique case with its own set of takeaways for businesses.

Blog Feature

Executive Consulting | Managed Services

By: Jonathan Stone
January 4th, 2018

If you’re the IT director at your organization, you’re likely the first one to see the need for managed services such as Cybersecurity-as-a-Service and Network-as-a-Service. However, it can be tricky to convince your boss, who may be the CEO, CFO, or COO, that outsourcing part of the company’s IT to an independent vendor will be more than merely a new expense. Here’s a step-by-step guide to organizing and presenting your thoughts on managed service providers.

Blog Feature

Executive Consulting | Modern Data Center | Workforce Enablement

By: Jonathan Stone
October 16th, 2015

Desktop Environment Managers share several concerns about the challenges of managing a company’s desktop and laptop environment. Chiefly, they struggle with the maintenance of the separate images used to support both hardware and users. The quandary of simultaneously supporting operating systems during an upgrade is also a challenge.  

Blog Feature

Modern Data Center | Managed Services

By: Jonathan Stone
October 14th, 2015

At the heart of many of today’s high-value business applications are large repositories of business data stored on rotating magnetic disk. Although CPU performance is critical to the performance of many of these applications, I/O performance, or the ability to read and write data to and from the disk, is frequently even more critical. The more time an application spends waiting for data to be read from or written to disk, the more its performance will improve if I/O can happen with less delay.