<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

By not complying with the requirements laid out in NIST SP 800-171, your government contracts may be at risk. Even though the deadline for compliance was 12/31/17, it’s not too late to protect your business. Get started here

NIST Compliance - Are You Overdue? 00 : 00 : 00 : 00

Information technology blog, cybersecurity blog

Kelser Blog

The Kelser Blog covers technology and business topics such as Cybersecurity, IT Lifecycle Management, Modern Data Center, Workforce Enablement, and more.

Blog Feature

Cybersecurity | Executive Consulting | Workforce Enablement | cyber security Connecticut | IT support Connecticut | Connecticut cyber security | IT partner Connecticut | IT services CT

Real Estate Cybersecurity: An In-Depth Conversation

By: Matt Kozloski
February 14th, 2018

As business operations are increasingly conducted online, businesses in all industries are becoming more susceptible to cybersecurity breaches. I was recently invited to discuss cybersecurity concerns and best practices for real estate agents on Real Estate Radio, a show broadcast on CBS Radio 94.9FM here in Connecticut and hosted by One and Company Real Estate’s Byron Lazine and financial planner Pat Kenny. Our discussion wound up being quite universal and applicable to almost any industry. Here are some of the highlights of my interview with Byron and Pat. Below, you’ll find the full transcript and audio of the conversation.

Read More

Share

Blog Feature

Cybersecurity | Executive Consulting | Managed Services

What are Meltdown and Spectre and How Can You Protect Your Business from Them

By: Adam Stahl
January 5th, 2018

Just under a week into the New Year and the world is already experiencing the first critical vulnerability in 2018. Researchers have discovered two security vulnerabilities that collectively affect most modern chips made by Intel, AMD, and ARM. If exploited, a hacker could potentially steal data from the breached machine ranging from emails and browsing data to login credentials. So, what are these vulnerabilities and what steps can you take to protect your business network from them?

Read More

Share

Cybersecurity eBook Cover Image

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity

The State of Connecticut Cybersecurity: Q&A with Connecticut State Cybersecurity Czar Arthur House

By: Matt Kozloski
December 28th, 2017

This fall, the State of Connecticut announced a cybersecurity action plan. In order to learn more about this--and the state of cybersecurity in Connecticut in general--we reached out to Arthur House, Chief Cybersecurity Risk Officer for the State of Connecticut. He was gracious enough to fill us in on a wide variety of topics from how Connecticut’s towns and cities are battling hackers, to why countries like Ukraine are looking to CT for guidance on cybersecurity.

Read More

Share

Blog Feature

Cybersecurity | Executive Consulting

How much does cybersecurity cost? Maybe less than you think.

By: Adam Stahl
November 14th, 2017

It seems like you can’t open a web browser, scroll through your LinkedIn timeline, or turn on the TV today without hearing about the latest data breach or threat to your cybersecurity. With high-profile breaches like Equifax and global ransomware outbreaks like Bad Rabbit, we’re in a very different world than just a few years ago. Perhaps you find that cyber threats and cybersecurity in general is annoying, overwhelming, or even frustrating but it’s imperative that cybersecurity protection become part of your business strategy. It doesn’t have to be as complicated or costly as you might think.

Read More

Share

Blog Feature

Cybersecurity

Overwhelmed or Annoyed by Cybersecurity? Cybersecurity-as-a-Service May Be for You

By: Matt Kozloski
November 2nd, 2017

Now that National Cyber Security Awareness Month has come to a close, we think it’s a good time to talk about what to actually do about cybersecurity. After all, awareness without action isn’t much use! Before we dive in, however, let’s talk about some thought patterns we often see that prevent companies from taking effective action on cybersecurity.

Read More

Share

Blog Feature

Cybersecurity | WannaCry | Business Continuity | BCDRaaS

What We Can Learn from Bad Rabbit – the Latest Ransomware Outbreak

By: Adam Stahl
October 30th, 2017

Last week the third major ransomware outbreak in 2017 was spreading through Eastern Europe and even starting to creep further across the globe. So far striking Russia and Ukraine the most, Bad Rabbit has disrupted industries ranging from media outlets to banks. Some reports even have the attack showing up right here in the U.S. Similar to the Petya/NotPetya ransomware outbreak earlier this year (so similar in fact that Bad Rabbit reportedly shares 2/3 of its code with variants of Petya), this ransomware encrypts a system, requests a ransom (the current rate is about $285 in bitcoin) to decrypt the victim’s files, and then attempts to spread itself across the network. With ransomware and cyberattacks commonplace in today’s world, what takeaways can come out of the Bad Rabbit outbreak to help prevent these types of attacks from derailing your organization?

Read More

Share