<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Certain nonfederal organizations need to be compliant with the requirements laid out in NIST SP 800-171 by this deadline. Learn more

NIST Compliance - Are You Ready? 00 : 00 : 00 : 00

Information technology blog, cybersecurity blog

Kelser Blog

The Kelser Blog covers technology and business topics such as Cybersecurity, IT Lifecycle Management, Modern Data Center, Workforce Enablement, and more.

Blog Feature

Cybersecurity | Executive Consulting

How much does cybersecurity cost? Maybe less than you think.

By: Adam Stahl
November 14th, 2017

It seems like you can’t open a web browser, scroll through your LinkedIn timeline, or turn on the TV today without hearing about the latest data breach or threat to your cybersecurity. With high-profile breaches like Equifax and global ransomware outbreaks like Bad Rabbit, we’re in a very different world than just a few years ago. Perhaps you find that cyber threats and cybersecurity in general is annoying, overwhelming, or even frustrating but it’s imperative that cybersecurity protection become part of your business strategy. It doesn’t have to be as complicated or costly as you might think.

Read More

Share

Blog Feature

Cybersecurity

Overwhelmed or Annoyed by Cybersecurity? Cybersecurity-as-a-Service May Be for You

By: Matt Kozloski
November 2nd, 2017

Now that National Cyber Security Awareness Month has come to a close, we think it’s a good time to talk about what to actually do about cybersecurity. After all, awareness without action isn’t much use! Before we dive in, however, let’s talk about some thought patterns we often see that prevent companies from taking effective action on cybersecurity.

Read More

Share

Cybersecurity eBook Cover Image

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | WannaCry | Business Continuity | BCDRaaS

What We Can Learn from Bad Rabbit – the Latest Ransomware Outbreak

By: Adam Stahl
October 30th, 2017

Last week the third major ransomware outbreak in 2017 was spreading through Eastern Europe and even starting to creep further across the globe. So far striking Russia and Ukraine the most, Bad Rabbit has disrupted industries ranging from media outlets to banks. Some reports even have the attack showing up right here in the U.S. Similar to the Petya/NotPetya ransomware outbreak earlier this year (so similar in fact that Bad Rabbit reportedly shares 2/3 of its code with variants of Petya), this ransomware encrypts a system, requests a ransom (the current rate is about $285 in bitcoin) to decrypt the victim’s files, and then attempts to spread itself across the network. With ransomware and cyberattacks commonplace in today’s world, what takeaways can come out of the Bad Rabbit outbreak to help prevent these types of attacks from derailing your organization?

Read More

Share

Blog Feature

Cybersecurity | Disaster Recovery

Learn From Equifax's Most Recent Security Breach

By: Matt Kozloski
October 5th, 2017

Equifax made some serious mishaps lately, both technically and incident response. What’s really disturbing:  while this is the largest, this is not an isolated incident. We won’t cover the details here, since there are plenty of sources where you can find information about the breach, its consequences, and what has happened after that. What we will cover is some thoughts around what we can all learn from the events leading up to, during, and after the breach.  At Kelser, we don’t want any company to fall victim to the same incident and aftermath that Equifax did.  We match our recommendations to our clients’ business objectives, establishing a comprehensive and multi-layered strategy to manage risk before, during and after a cybersecurity incident.

Read More

Share

Blog Feature

Cybersecurity

Secure IT Asset Disposition: How to Keep Your Data Safe

By: Matt Kozloski
August 17th, 2017

As technology relentlessly pushes forward, you and your organization will undoubtedly need to upgrade your hardware. However, you can’t simply forget about your old hardware while reaping the benefits of replacing it with the latest and greatest. You should be excited about the upgrade, but how will you transfer data from your old equipment to the new? How will you erase data from the original hardware?

Read More

Share

Blog Feature

Cybersecurity | Executive Consulting

NIST 800-171 Implementation for Connecticut Companies

By: Matt Kozloski
August 10th, 2017

Trust can be a precarious thing. One mistake could ruin it forever. You spend so much time and energy building trust with your customers, vendors, contractors, and partners, that the last thing you want to do is lose it, particularly over non-compliance. Believe it or not, record keeping and data handling is critical to maintaining that trust.

Read More

Share