<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

By not complying with the requirements laid out in NIST SP 800-171, your government contracts may be at risk. Even though the deadline for compliance was 12/31/17, it’s not too late to protect your business. Get started here

NIST Compliance - Are You Overdue? 00 : 00 : 00 : 00

Information technology blog, cybersecurity blog

Kelser Blog

The Kelser Blog covers technology and business topics such as Cybersecurity, IT Lifecycle Management, Modern Data Center, Workforce Enablement, and more.

Blog Feature

Cybersecurity | Executive Consulting | IT Connecticut | it ct | cyber security Connecticut | Connecticut cyber security

13 Ways to Help Your Data Survive Cybersecurity Awareness Month

By: Adam Stahl
October 18th, 2018

It can be scary out there in the digital world. It seems like not a week goes by where we don’t hear about phishing emails, unpatched vulnerabilities, or the latest strain of ransomware exposing the data of millions of people and businesses to the prying eyes of malicious actors. Every person and every business are potential targets with some of the largest companies in the world susceptible to the same vulnerabilities as the average Joe at their home computer (phishing being a prime example).  But all is not lost as October is National Cybersecurity Awareness Month! What better time to review your cybersecurity practices, discover where you can make improvements, and seize the chance to make positive change? Consider it a fall “spring cleaning” for your digital life and business.

Read More

Share

Blog Feature

Cybersecurity | Managed Services | IT Connecticut | it ct | Connecticut cyber security | cyber security Connecticut

Why Connecticut Is A Leader in Cybersecurity

By: Matt Kozloski
October 2nd, 2018

In many ways, Connecticut is a state in search of an identity. Could we become known as the Cybersecurity state? In Europe, some already know us that way. After a very enlightening conversation with Art House, Chief Cybersecurity Risk Officer for the State of Connecticut toward the end of last year, he was gracious enough to come back to the Kelser offices this fall for a follow up interview to give us the latest on the global cybersecurity landscape and how Connecticut fits in.

Read More

Share

Cybersecurity eBook Cover Image

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | cyber security Connecticut | Connecticut cyber security | it consulting Connecticut

Anatomy of a Phishing Cyber Attack

By: Matthew Butler
September 27th, 2018

A well-known Connecticut business recently hired Kelser to hack them. Here’s how we did it. Over the past year, we’ve been working with Hoffman Auto Group, one of Connecticut’s largest auto dealers, to strengthen their cybersecurity posture and make sure their customer data is as safe as possible. After putting all the latest technology in place, it came time to address employee awareness since most cyber-attacks involve human error.

Read More

Share

Blog Feature

Cybersecurity | Disaster Recovery | Business Continuity | BCDRaaS | IT Connecticut | it ct | cyber security Connecticut | Connecticut cyber security

The Most Pressing Business IT Questions of the Day on Real Estate Radio

By: Matt Kozloski
August 16th, 2018

Last month, I was thrilled to be invited back to the 94.9 FM CBS Radio airwaves for another episode of Real Estate Radio (listen to my first appearance here). I actually love this radio show. It seems so random—a full hour about real estate—but the hosts Byron Lazine and Pat Kenny use real estate as a jumping off point to talk about a wide range of topics that affect quality of life and where people choose to live. This time around we focused on hot topics in the tech world including Facebook privacy and the GDPR, ransomware, and phishing following high-profile cyber attacks in Connecticut.

Read More

Share

Blog Feature

Wireless-as-a-Service | Cybersecurity | IT services CT | managed services Connecticut | IT Connecticut | it ct | it support ct | cyber security Connecticut | Connecticut cyber security

Is Wi-Fi Security Your Biggest Vulnerability?

By: Jonathan Stone
July 10th, 2018

Not too long ago, I was interviewed for a Comcast Business blog post and Inc.com article about Wi-Fi security. As long as the Wi-Fi is up and running, the security of it isn’t something the average person gives a lot of thought to, but improperly secured Wi-Fi networks present a number of unique vulnerabilities hackers can exploit to gain access to sensitive data. To understand Wi-Fi security, it helps to know about these strategies that hackers use.

Read More

Share

Blog Feature

it services ma | IT services CT | IT partner Connecticut | managed services Connecticut | managed services ct | it consulting Connecticut | data center Connecticut | managed services ma | it services Massachusetts | it support Massachusetts | Connecticut cyber security | IT support Connecticut | cyber security Connecticut | it services Connecticut | it support ct | it ct | IT Connecticut

Keeping Your Mobile Devices Safe with IT Services in CT

By: Kelser
June 27th, 2018

Mobile devices have become so important to professional productivity--- they're the way you connect with others, maintain your schedule, and find important information on the go. However, they're also very easily hacked or compromised if you don't take steps to prevent this from happening. Here are some tips from IT services firms in CT that your company can use to help keep your phones safe:

Read More

Share