<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Certain nonfederal organizations need to be compliant with the requirements laid out in NIST SP 800-171 by this deadline. Learn more

NIST Compliance - Are You Ready? 00 : 00 : 00 : 00

Information technology blog, cybersecurity blog

Kelser Blog

The Kelser Blog covers technology and business topics such as Cybersecurity, IT Lifecycle Management, Modern Data Center, Workforce Enablement, and more.

Blog Feature

Cybersecurity | Wireless-as-a-Service | Networking

What is Aruba ClearPass and How Does it Protect Your Network?

By: Matt Kozloski
July 14th, 2017

With the advent of smartphones, tablets, and other mobile devices, companies and IT departments are facing the challenge of managing the vast assortment of devices on their network. Which devices get which levels of network access? Which users get which levels of network access? How do you ensure that your network is secure?

Read More

Share

Blog Feature

Cybersecurity

Protecting Your IoT Devices and Wired or Wireless Networks

By: Matt Kozloski
June 30th, 2017

The internet has transformed the way people communicate. It also brought with it never-before-seen privacy issues. Now, the Internet of Things – known as IoT – is transforming how devices communicate. Using your wired or wireless network, these devices can all share information, helping to create smarter, more efficient systems.

Read More

Share

Cybersecurity eBook Cover Image

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | WannaCry

9 Resources to Help Protect You From Ransomware Attacks Like WannaCry

By: Adam Stahl
May 24th, 2017

The malicious ransomware dubbed "WannaCry" has seized systems in over 150 countries since its discovery on May 12th, holding computers across all industries hostage. The program infects computers and encrypts their files, demanding $300 in Bitcoin or the files will be erased.  This ransomware currently affects Microsoft Windows machines through an exploit known as EternalBlue. Given the severity of this attack and other ransomware variants following suit, it's time to make sure that your organization is protected. We've compiled this list of 9 resources that will help prepare your organization for malware attacks like WannaCry, so that you can ensure your files and information are safe.

Read More

Share

Blog Feature

Cybersecurity | Workforce Enablement

Top 3 Reasons Healthcare Providers Should Make Cybersecurity a Priority

By: Matt Kozloski
May 19th, 2017

Cybersecurity has become a mainstream point of discussion over the last five years. With notable attacks on Target, NASA, the United States Defense Department, and the WannaCry / WannaCrypt outbreak, the public now has a heightened sense of awareness (and fear) of cyber crime. Perhaps no industry needs a wake up call more than the healthcare industry.

Read More

Share

Blog Feature

Wireless-as-a-Service

6 Reasons You Need Wireless-as-a-Service

By: Matt Kozloski
May 9th, 2017

Nearly everyone has heard of the Software-as-a-Service (SaaS) business model, and technology has even gone so far to start labeling Everything-as-a-Service (XaaS), but how often do you hear of Wireless-as-a-Service (WaaS)? In this post, we’ll break down the top six reasons to consider WaaS as a practical option for implementing cutting edge networking for your business.

Read More

Share

Blog Feature

Cybersecurity

Why You Need Cybersecurity Training for Employees

By: Matt Kozloski
April 19th, 2017

See if you notice the gap here: according to a recent report, 91% of cyberattacks start with a phishing email, yet cybersecurity training for employees is vastly underutilized in virtually every type of organization. How do you look at that statistic and not run immediately to human resources to make cybersecurity training mandatory for all employees? We can’t be totally sure, but we can offer some great background on the effect employees have on your company’s cybersecurity posture and tips for how to improve with training, and that’s exactly what we’re going to do in this blog post. If you want to act now to begin tightening up the security habits of your employees or coworkers, download our recent complimentary ebook, 10 Simple Things to Improve Your Company's Cybersecurity Posture.

Read More

Share