<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

By not complying with the requirements laid out in NIST SP 800-171, your government contracts may be at risk. Even though the deadline for compliance was 12/31/17, it’s not too late to protect your business. Get started here

NIST Compliance - Are You Overdue? 00 : 00 : 00 : 00

Information technology blog, cybersecurity blog

Kelser Blog

The Kelser Blog covers technology and business topics such as Cybersecurity, IT Lifecycle Management, Modern Data Center, Workforce Enablement, and more.

Matt Kozloski

Matt is the VP, Professional Services at Kelser as well as former leader of the CT VMUG. VCDX # 194, CISSP # 526947.

Blog Feature

Managed Services

Who Needs IT Managed Services?

By: Matt Kozloski
November 20th, 2018

In the past few decades, the digital revolution has been a tremendous boon for business revenues, making companies of all sizes and industries more efficient, productive, and profitable. Yet the fact that technology has become more advanced also means that it has become more complicated to properly understand and manage.

Read More

Share

Blog Feature

Modern Data Center

The Top 3 Data Center Storage Systems and Setups

By: Matt Kozloski
November 7th, 2018

The amount of information in the world today is almost unfathomable, and it’s increasing at a blistering pace. Analysts estimate that 90 percent of data in existence was created only in the last two years. What’s more, research group IDC predicts that by 2025, the world will be creating 163 zettabytes (163 trillion gigabytes) of data every year.

Read More

Share

Cybersecurity eBook Cover Image

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | Managed Services

Why Connecticut Is A Leader in Cybersecurity

By: Matt Kozloski
October 2nd, 2018

In many ways, Connecticut is a state in search of an identity. Could we become known as the Cybersecurity state? In Europe, some already know us that way. After a very enlightening conversation with Art House, Chief Cybersecurity Risk Officer for the State of Connecticut toward the end of last year, he was gracious enough to come back to the Kelser offices this fall for a follow up interview to give us the latest on the global cybersecurity landscape and how Connecticut fits in.

Read More

Share

Blog Feature

Cybersecurity | Disaster Recovery | Business Continuity

The Most Pressing Business IT Questions of the Day on Real Estate Radio

By: Matt Kozloski
August 16th, 2018

Last month, I was thrilled to be invited back to the 94.9 FM CBS Radio airwaves for another episode of Real Estate Radio (listen to my first appearance here). I actually love this radio show. It seems so random—a full hour about real estate—but the hosts Byron Lazine and Pat Kenny use real estate as a jumping off point to talk about a wide range of topics that affect quality of life and where people choose to live. This time around we focused on hot topics in the tech world including Facebook privacy and the GDPR, ransomware, and phishing following high-profile cyber attacks in Connecticut.

Read More

Share

Blog Feature

Cybersecurity | Managed Services

Why You Need Cybersecurity Training for Employees

By: Matt Kozloski
July 24th, 2018

See if you notice the gap here: according to a recent report, 91% of cyberattacks start with a phishing email, yet cybersecurity training for employees is vastly underutilized in virtually every type of organization. How do you look at that statistic and not run immediately to human resources to make cybersecurity training mandatory for all employees? We can’t be totally sure, but we can offer some great background on the effect employees have on your company’s cybersecurity posture and tips for how to improve with training, and that’s exactly what we’re going to do in this blog post. If you want to act now to begin tightening up the security habits of your employees or coworkers, download our recent complimentary ebook, 10 Simple Things to Improve Your Company's Cybersecurity Posture.

Read More

Share

Blog Feature

Modern Data Center

The New Standard of Data Center Storage

By: Matt Kozloski
June 7th, 2018

A revolution is upon us. For the first time in the history of computers, the speed of storage has caught up with the rate of the computing resources that use that storage. Up until this moment, storage has always been the bottleneck. Although your computer can store some information in its primary memory, known as RAM, this storage has a physical limit. Past that limit, you'll need to read data from a secondary storage device such as a hard disk, which is a much slower process. If you've ever tried to copy a file from an external device onto your computer, for example, you'll notice that it takes much more time than opening a file that's already stored in your computer's memory.

Read More

Share