<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Kelser Blog

The Kelser Blog covers technology and business topics such as Cybersecurity, Business Continuity, Disaster Recovery, Networking and Wireless, Managed Services, and more.

Blog Feature

Cybersecurity | Managed Services

By: Kelser
September 18th, 2018

Managed security services are network security services that have been outsourced to a service provider. This provider will administer outsourced monitoring and management of security devices and systems.

Blog Feature

Cybersecurity | Managed Services

By: Kelser
September 5th, 2018

What Does a Managed Security Service Provider do? A managed security service provider (MSSP) provides outsourced monitoring and management of security devices and systems.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

IT Lifecycle Management | Cybersecurity | Managed Services

By: Kelser
August 29th, 2018

IT hardware, like cars, are depreciating assets. As soon as you drive them off the proverbial lot, they begin to lose value. The reason for this depreciation is twofold: the product will eventually wear down, and newer models will be released with greater specs. Keeping this in mind, how often should you refresh your IT assets? To understand the answer to this question, let’s look at the IT-asset lifecycle management. 

Blog Feature

Cybersecurity | Disaster Recovery | Business Continuity

By: Matt Kozloski
August 16th, 2018

Last month, I was thrilled to be invited back to the 94.9 FM CBS Radio airwaves for another episode of Real Estate Radio (listen to my first appearance here). I actually love this radio show. It seems so random—a full hour about real estate—but the hosts Byron Lazine and Pat Kenny use real estate as a jumping off point to talk about a wide range of topics that affect quality of life and where people choose to live. This time around we focused on hot topics in the tech world including Facebook privacy and the GDPR, ransomware, and phishing following high-profile cyber attacks in Connecticut.

Blog Feature

Cybersecurity | Networking

By: Kelser
August 15th, 2018

Network security services are designed to protect the usability and integrity of your network and data. This includes both hardware and software technologies. 

Blog Feature

Cybersecurity | Managed Services

By: Matt Kozloski
July 24th, 2018

See if you notice the gap here: according to a recent report, 91% of cyberattacks start with a phishing email, yet cybersecurity training for employees is vastly underutilized in virtually every type of organization. How do you look at that statistic and not run immediately to human resources to make cybersecurity training mandatory for all employees? We can’t be totally sure, but we can offer some great background on the effect employees have on your company’s cybersecurity posture and tips for how to improve with training, and that’s exactly what we’re going to do in this blog post. If you want to act now to begin tightening up the security habits of your employees or coworkers, download our recent complimentary ebook, 10 Simple Things to Improve Your Company's Cybersecurity Posture.

Blog Feature

Cybersecurity

By: Kelser
July 17th, 2018

Many organizations lack a dedicated IT security professional on staff. Implementing Cybersecurity as a Service (CSaaS) enables businesses to forgo hiring a costly, full-time security staff member allowing them to only pay for the services their unique organization requires.

Blog Feature

Wireless | Cybersecurity | Managed Services

By: Jonathan Stone
July 10th, 2018

Not too long ago, I was interviewed for a Comcast Business blog post and Inc.com article about Wi-Fi security. As long as the Wi-Fi is up and running, the security of it isn’t something the average person gives a lot of thought to, but improperly secured Wi-Fi networks present a number of unique vulnerabilities hackers can exploit to gain access to sensitive data. To understand Wi-Fi security, it helps to know about these strategies that hackers use.