<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

By not complying with the requirements laid out in NIST SP 800-171, your government contracts may be at risk. Even though the deadline for compliance was 12/31/17, it’s not too late to protect your business. Get started here

NIST Compliance - Are You Overdue? 00 : 00 : 00 : 00

Information technology blog, cybersecurity blog

Kelser Blog

The Kelser Blog covers technology and business topics such as Cybersecurity, IT Lifecycle Management, Modern Data Center, Workforce Enablement, and more.

Matt Kozloski

Matt is the VP, Professional Services at Kelser as well as former leader of the CT VMUG. VCDX # 194, CISSP # 526947.

Blog Feature

Modern Data Center | data center Connecticut

The New Standard of Data Center Storage

By: Matt Kozloski
June 7th, 2018

A revolution is upon us. For the first time in the history of computers, the speed of storage has caught up with the rate of the computing resources that use that storage. Up until this moment, storage has always been the bottleneck. Although your computer can store some information in its primary memory, known as RAM, this storage has a physical limit. Past that limit, you'll need to read data from a secondary storage device such as a hard disk, which is a much slower process. If you've ever tried to copy a file from an external device onto your computer, for example, you'll notice that it takes much more time than opening a file that's already stored in your computer's memory.

Read More

Share

Blog Feature

Modern Data Center | Executive Consulting

HPE 3PAR: The Smartest Storage System is Getting Even Smarter

By: Matt Kozloski
May 23rd, 2018

With Hewlett Packard Enterprise's recent announcement that it will soon be bringing the ground-breaking InfoSight technology to its 3PAR StoreServe, the value of HPE's recent acquisition of Nimble Software is more clear than ever. The move means InfoSight will soon be available across a full portfolio of HPE data solutions: from systems for small businesses all the way up to the largest enterprises. This makes HPE’s storage portfolio the most complete in the industry. Since InfoSight learns by analyzing data from its installed base, it's about to get a whole lot smarter.

Read More

Share

Cybersecurity eBook Cover Image

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | Managed Services | cyber security Connecticut | Connecticut cyber security

Defense-in-Depth Cybersecurity on the Basketball Court

By: Matt Kozloski
March 20th, 2018

Post-season college basketball is in full swing, and as a sponsor of UConn Athletics, it’s something we get very excited about. Of course, we also get pretty revved up about layered cybersecurity pretty much any day of the week. Watching so much hoops this time of year, we’ve noticed that the principles of a good cybersecurity defense are reflected on the basketball court.

Read More

Share

Blog Feature

Cybersecurity

Everything You Need to Know About NIST 800-171

By: Matt Kozloski
March 15th, 2018

Improving record keeping and data handling is critical to keeping the trust of partners, vendors, contractors, and customers. The importance is magnified when the federal government is involved, with the goal of creating a national culture of cybersecurity that protects the information of our businesses, citizens, and government. The National Institute of Standards and Technology (NIST) created Special Publication 800-171 to help protect Controlled Unclassified Information. But what does that actually look like? How will you know you’re meeting the standards laid out in NIST 800-171? What is CUI?

Read More

Share

Blog Feature

Office 365 | Cybersecurity | WannaCry | cyber security Connecticut | Connecticut cyber security

Why Hackers Love Tax Season (And What You Can Do About It)

By: Matt Kozloski
March 6th, 2018

During tax season, personal information is being exchanged at a much higher rate than any other time of year. Documents like W2s with Social Security numbers on them are just par for the course. It’s also a time of year when employers and employees engage in tax-related tasks that aren’t routine to them. There’s often a bit of chaos getting everything in order and even a bit of anxiety over doing it right. For hackers and scammers who rely on human error and deception, all of this combines to create ideal conditions. I was recently on WTNH’s Good Morning Connecticut alongside Michelle Seagull, Commissioner of the CT Department of Consumer Protection talking about tax hacks and scams targeting companies in Connecticut. Commissioner Seagull and I were also guests on the MetroHartford Alliance’s “Pulse of the Region” radio show with Brian Newman from CohnReznick discussing this same topic.

Read More

Share

Blog Feature

Cybersecurity | Executive Consulting | Workforce Enablement | cyber security Connecticut | IT support Connecticut | Connecticut cyber security | IT partner Connecticut | IT services CT

Real Estate Cybersecurity: An In-Depth Conversation

By: Matt Kozloski
February 14th, 2018

As business operations are increasingly conducted online, businesses in all industries are becoming more susceptible to cybersecurity breaches. I was recently invited to discuss cybersecurity concerns and best practices for real estate agents on Real Estate Radio, a show broadcast on CBS Radio 94.9FM here in Connecticut and hosted by One and Company Real Estate’s Byron Lazine and financial planner Pat Kenny. Our discussion wound up being quite universal and applicable to almost any industry. Here are some of the highlights of my interview with Byron and Pat. Below, you’ll find the full transcript and audio of the conversation.

Read More

Share