<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

By not complying with the requirements laid out in NIST SP 800-171, your government contracts may be at risk. Even though the deadline for compliance was 12/31/17, it’s not too late to protect your business. Get started here

NIST Compliance - Are You Overdue? 00 : 00 : 00 : 00

Information technology blog, cybersecurity blog

Kelser Blog

The Kelser Blog covers technology and business topics such as Cybersecurity, IT Lifecycle Management, Modern Data Center, Workforce Enablement, and more.

Blog Feature

Cybersecurity | Business Continuity | BCDRaaS | Disaster Recovery | it ct | cyber security Connecticut | IT Connecticut | Connecticut cyber security

The Most Pressing Business IT Questions of the Day on Real Estate Radio

By: Matt Kozloski
August 16th, 2018

Last month, I was thrilled to be invited back to the 94.9 FM CBS Radio airwaves for another episode of Real Estate Radio (listen to my first appearance here). I actually love this radio show. It seems so random—a full hour about real estate—but the hosts Byron Lazine and Pat Kenny use real estate as a jumping off point to talk about a wide range of topics that affect quality of life and where people choose to live. This time around we focused on hot topics in the tech world including Facebook privacy and the GDPR, ransomware, and phishing following high-profile cyber attacks in Connecticut.

Read More

Share

Blog Feature

Cybersecurity | Wireless-as-a-Service | it ct | cyber security Connecticut | IT Connecticut | it support ct | Connecticut cyber security | managed services Connecticut | IT services CT

Is Wi-Fi Security Your Biggest Vulnerability?

By: Jonathan Stone
July 10th, 2018

Not too long ago, I was interviewed for a Comcast Business blog post and Inc.com article about Wi-Fi security. As long as the Wi-Fi is up and running, the security of it isn’t something the average person gives a lot of thought to, but improperly secured Wi-Fi networks present a number of unique vulnerabilities hackers can exploit to gain access to sensitive data. To understand Wi-Fi security, it helps to know about these strategies that hackers use.

Read More

Share

Cybersecurity eBook Cover Image

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

it ct | it services Connecticut | cyber security Connecticut | IT support Connecticut | IT Connecticut | it support ct | Connecticut cyber security | data center Connecticut | it consulting Connecticut | managed services Connecticut | IT partner Connecticut | IT services CT | it services ma | it support Massachusetts | it services Massachusetts | managed services ma | managed services ct

Keeping Your Mobile Devices Safe with IT Services in CT

By: Kelser
June 27th, 2018

Mobile devices have become so important to professional productivity--- they're the way you connect with others, maintain your schedule, and find important information on the go. However, they're also very easily hacked or compromised if you don't take steps to prevent this from happening. Here are some tips from IT services firms in CT that your company can use to help keep your phones safe:

Read More

Share

Blog Feature

it ct | it services Connecticut | cyber security Connecticut | IT support Connecticut | IT Connecticut | it support ct | Connecticut cyber security | data center Connecticut | it consulting Connecticut | managed services Connecticut | IT partner Connecticut | IT services CT | it services ma | it support Massachusetts | it services Massachusetts | managed services ma | managed services ct

How IT in CT Can Help with HIPAA Compliance

By: Kelser
June 26th, 2018

Privacy laws changed profoundly with the Health Insurance Portability and Accountability Act (HIPAA), which has had a major impact on the healthcare industry and IT in CT. Not only does a healthcare firm have to commit to protecting patient data--- it has to be very careful in how it uses social media.

Read More

Share

Blog Feature

it ct | it services Connecticut | cyber security Connecticut | IT support Connecticut | IT Connecticut | it support ct | Connecticut cyber security | data center Connecticut | it consulting Connecticut | managed services Connecticut | IT partner Connecticut | IT services CT | it services ma | it support Massachusetts | it services Massachusetts | managed services ma | managed services ct

Do You Need to Outsource Your IT in Connecticut?

By: Kelser
June 22nd, 2018

Have you ever thought about using a managed service provider (MSP) or IT company in Connecticut to help you with your technology requirements? Your business is undoubtedly similar to all companies these days in that you rely on your IT systems to function, and as technology gets more complex, this can take a toll on how many hours you have to dedicate to it. If any of the following factors resonate with you, it might be time to look into outsourcing some of your systems.

Read More

Share

Blog Feature

it ct | it services Connecticut | cyber security Connecticut | IT support Connecticut | IT Connecticut | it support ct | Connecticut cyber security | data center Connecticut | it consulting Connecticut | managed services Connecticut | IT partner Connecticut | IT services CT | it services ma | it support Massachusetts | it services Massachusetts | managed services ma | managed services ct

4 IT Services in CT for Your Business’ Cybersecurity

By: Kelser
June 21st, 2018

The internet has transformed life as we know it. From almost anywhere on the planet, you can get almost anything done, anywhere. But that global reach and high speed have drawbacks. Cybercrooks and their nefarious hacking tools can operate anywhere too, and they can reach deep into your IT systems, potentially causing terrible damage at the center of your organization. The good news is that tools and protocols for combating security breaches are evolving all the time, too. Here’s a quick summary of key IT services in CT for stopping security breaches:

Read More

Share