<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Information technology blog, cybersecurity blog

Kelser Blog

The Kelser Blog covers technology and business topics such as Cybersecurity, Business Continuity, Disaster Recovery, Networking and Wireless, Managed Services, and more.

Matthew Butler

Matthew Butler has his Master's Degree in Cybersecurity.

Blog Feature

Cybersecurity

By: Matthew Butler
November 15th, 2018

Each organization has its own approach to cybersecurity—some of them better than others. While many small businesses take a proactive role by working with third-party managed security service providers, others are content to employ “security through obscurity,” hoping that there will always be a bigger, more appealing target. Unfortunately, every business is a potential target for cyber criminals.

Blog Feature

Cybersecurity | Managed Services

By: Matthew Butler
September 27th, 2018

A well-known Connecticut business recently hired Kelser to hack them. Here’s how we did it. Over the past year, we’ve been working with Hoffman Auto Group, one of Connecticut’s largest auto dealers, to strengthen their cybersecurity posture and make sure their customer data is as safe as possible. After putting all the latest technology in place, it came time to address employee awareness since most cyber-attacks involve human error.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.