<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

By not complying with the requirements laid out in NIST SP 800-171, your government contracts may be at risk. Even though the deadline for compliance was 12/31/17, it’s not too late to protect your business. Get started here

NIST Compliance - Are You Overdue? 00 : 00 : 00 : 00

Information technology blog, cybersecurity blog

Kelser Blog

The Kelser Blog covers technology and business topics such as Cybersecurity, IT Lifecycle Management, Modern Data Center, Workforce Enablement, and more.

Blog Feature

Cybersecurity | Executive Consulting

13 Ways to Help Your Data Survive Cybersecurity Awareness Month

By: Adam Stahl
October 18th, 2018

It can be scary out there in the digital world. It seems like not a week goes by where we don’t hear about phishing emails, unpatched vulnerabilities, or the latest strain of ransomware exposing the data of millions of people and businesses to the prying eyes of malicious actors. Every person and every business are potential targets with some of the largest companies in the world susceptible to the same vulnerabilities as the average Joe at their home computer (phishing being a prime example).  But all is not lost as October is National Cybersecurity Awareness Month! What better time to review your cybersecurity practices, discover where you can make improvements, and seize the chance to make positive change? Consider it a fall “spring cleaning” for your digital life and business.

Read More

Share

Blog Feature

Cybersecurity | Managed Services

Why Connecticut Is A Leader in Cybersecurity

By: Matt Kozloski
October 2nd, 2018

In many ways, Connecticut is a state in search of an identity. Could we become known as the Cybersecurity state? In Europe, some already know us that way. After a very enlightening conversation with Art House, Chief Cybersecurity Risk Officer for the State of Connecticut toward the end of last year, he was gracious enough to come back to the Kelser offices this fall for a follow up interview to give us the latest on the global cybersecurity landscape and how Connecticut fits in.

Read More

Share

Cybersecurity eBook Cover Image

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | Managed Services

Anatomy of a Phishing Cyber Attack

By: Matthew Butler
September 27th, 2018

A well-known Connecticut business recently hired Kelser to hack them. Here’s how we did it. Over the past year, we’ve been working with Hoffman Auto Group, one of Connecticut’s largest auto dealers, to strengthen their cybersecurity posture and make sure their customer data is as safe as possible. After putting all the latest technology in place, it came time to address employee awareness since most cyber-attacks involve human error.

Read More

Share

Blog Feature

Cybersecurity

The Definition of Cybersecurity Training for Employees [In Under 100 Words]

By: Kelser
September 26th, 2018

Employees are the most critical component of your organization’s cybersecurity. Mistakes made by employees cause anywhere between 25%-40% of data breaches. 

Read More

Share

Blog Feature

Cybersecurity | Managed Services

The Definition of Managed Security Services (MSS) [In Under 100 Words]

By: Kelser
September 18th, 2018

Managed security services are network security services that have been outsourced to a service provider. This provider will administer outsourced monitoring and management of security devices and systems.

Read More

Share

Blog Feature

Cybersecurity | Managed Services

The Definition of a Managed Security Service Provider (MSSP) [In Under 100 Words]

By: Kelser
September 5th, 2018

What Does a Managed Security Service Provider do? A managed security service provider (MSSP) provides outsourced monitoring and management of security devices and systems.

Read More

Share