<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Information technology blog, cybersecurity blog

Kelser Blog

The Kelser Blog covers technology and business topics such as Cybersecurity, Business Continuity, Disaster Recovery, Networking and Wireless, Managed Services, and more.

Blog Feature

Business Continuity | Disaster Recovery | Managed Services

By: Jonathan Stone
October 30th, 2018

From Hurricane Irene in 2011 to the “blizzard of 2013” that dumped two feet of snow across much of the state, Connecticut has seen its fair share of extreme weather. Not only do these natural disasters disrupt people’s daily lives and prevent them from coming into work, they also disable or damage critical business infrastructure and utilities such as power, electricity, and heating.

Blog Feature

Cybersecurity | Business Continuity | Disaster Recovery | Managed Services

By: Brian Mulligan
October 24th, 2018

With news of another cyber attack in the headlines every other week, it’s hardly surprising that businesses of all sizes and industries are growing more and more concerned. 68 percent of organizations believe that they are “very vulnerable” or “extremely vulnerable” to a data breach.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Managed Services | Cybersecurity | IT Lifecycle Management | Networking | Business Continuity | Disaster Recovery

By: Brian Mulligan
October 23rd, 2018

What Are Managed Services? Managed services are the IT operations, functions, and processes that an organization chooses to outsource to a third-party external managed services provider (MSP). The organization signs a contract with the MSP known as the service level agreement (SLA) that outlines the MSP’s roles and responsibilities when monitoring and managing your IT services.

Blog Feature

Cybersecurity | Disaster Recovery | Business Continuity

By: Matt Kozloski
August 16th, 2018

Last month, I was thrilled to be invited back to the 94.9 FM CBS Radio airwaves for another episode of Real Estate Radio (listen to my first appearance here). I actually love this radio show. It seems so random—a full hour about real estate—but the hosts Byron Lazine and Pat Kenny use real estate as a jumping off point to talk about a wide range of topics that affect quality of life and where people choose to live. This time around we focused on hot topics in the tech world including Facebook privacy and the GDPR, ransomware, and phishing following high-profile cyber attacks in Connecticut.

Blog Feature

Managed Services | Disaster Recovery | Business Continuity | Modern Data Center

By: Kelser
May 30th, 2018

There's no way around certain disastrous scenarios in terms of IT. With computer systems, the question of operational mismanagement or dissolution shouldn't be "if", it should be "when". When will systems collapse? And perhaps, how? Whether through user error, natural disaster, cybercriminal intrusion, or sabotage, there's a much higher likelihood operations will experience compromise predicating recovery from disaster. The key here is to hope for the best and expect the worst. If you expect the worst, in terms of disaster recovery, then you should have a protocol lined up so you can recover when that scenario arises. This is where virtualization can be a very important part of your operation's security. Here’s the explanation of IT services experts in CT why:

Blog Feature

Managed Services | Disaster Recovery | Business Continuity

By: Kelser
May 2nd, 2018

Before outsourcing your company’s IT in CT, you have to consider where you’re going to start. After all, transitioning all processes to the cloud in one go can be overwhelming and impractical. It’s best to ease into it slowly, beginning with an entry point before transferring everything.

Blog Feature

Managed Services | Cybersecurity | Business Continuity | Networking

By: Kelser
April 12th, 2018

Successful network attacks are enabled by poor network monitoring, and firms offering IT services in CT recommend the use of network monitoring software to secure corporate networks. Savvy business leaders realize the importance of network management and monitoring to keep their IT infrastructure at optimal performance.

Blog Feature

Managed Services | Disaster Recovery | Business Continuity

By: Kelser
March 22nd, 2018

When you outsource IT services in CT, you should work with a team that gives you the option of Disaster Recovery as a Service (DRaaS). This modern cloud-computing method of protecting data will bring you comfort in knowing that your business will be able to withstand any disaster. Here's a deeper look into the main benefits of using DRaaS: