<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Information technology blog, cybersecurity blog

Kelser Blog

The Kelser Blog covers technology and business topics such as Cybersecurity, Business Continuity, Disaster Recovery, Networking and Wireless, Managed Services, and more.

Blog Feature

Networking | Wireless | Managed Services

By: Mark Lepak
January 23rd, 2019

The “as a service” business model, in which third-party consulting firms provide IT services to customers on a subscription basis, has been nothing short of a revolution. In particular, network as a service (NaaS) has saved many companies from having to build their own networking infrastructure in-house. Configuring and operating devices such as routers, WAN optimizers, and firewalls is no easy task even for IT experts.

Blog Feature

Managed Services | IT Lifecycle Management

By: George W. Kudelchuk III
January 9th, 2019

Software used to be such an adventure. Your company would buy a new program and then essentially be on your own to install it and learn how to use it. It might work out great, or it might be a frustrating fiasco. You bought it—it’s your problem now. Wisely, software companies have largely switched to a software-as-a-service model in which customers pay a recurring fee for use of software that is maintained and supported with customer service. Hardware is undergoing a similar transition with desktop-as-a-service, also known as device-as-a-service, or DaaS. Desktop-as-a-service shifts technology hardware from a capital expense to an operating cost. Rather than buying new computers and other technology in one large, up-front expense and then burdening your IT department with the massive task of setting them all up and maintaining them, a technology partner or managed service provider (MSP) will manage the assets for the entire lifespan.


Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Managed Services

By: Matt Kozloski
November 20th, 2018

In the past few decades, the digital revolution has been a tremendous boon for business revenues, making companies of all sizes and industries more efficient, productive, and profitable. Yet the fact that technology has become more advanced also means that it has become more complicated to properly understand and manage.

Blog Feature

Business Continuity | Disaster Recovery | Managed Services

By: Jonathan Stone
October 30th, 2018

From Hurricane Irene in 2011 to the “blizzard of 2013” that dumped two feet of snow across much of the state, Connecticut has seen its fair share of extreme weather. Not only do these natural disasters disrupt people’s daily lives and prevent them from coming into work, they also disable or damage critical business infrastructure and utilities such as power, electricity, and heating.

Blog Feature

Cybersecurity | Business Continuity | Disaster Recovery | Managed Services

By: Brian Mulligan
October 24th, 2018

With news of another cyber attack in the headlines every other week, it’s hardly surprising that businesses of all sizes and industries are growing more and more concerned. 68 percent of organizations believe that they are “very vulnerable” or “extremely vulnerable” to a data breach.

Blog Feature

Managed Services | Cybersecurity | IT Lifecycle Management | Networking | Business Continuity | Disaster Recovery

By: Brian Mulligan
October 23rd, 2018

What Are Managed Services? Managed services are the IT operations, functions, and processes that an organization chooses to outsource to a third-party external managed services provider (MSP). The organization signs a contract with the MSP known as the service level agreement (SLA) that outlines the MSP’s roles and responsibilities when monitoring and managing your IT services.

Blog Feature

Cybersecurity | Managed Services

By: Matt Kozloski
October 2nd, 2018

In many ways, Connecticut is a state in search of an identity. Could we become known as the Cybersecurity state? In Europe, some already know us that way. After a very enlightening conversation with Art House, Chief Cybersecurity Risk Officer for the State of Connecticut toward the end of last year, he was gracious enough to come back to the Kelser offices this fall for a follow up interview to give us the latest on the global cybersecurity landscape and how Connecticut fits in.

Blog Feature

Cybersecurity | Managed Services

By: Matthew Butler
September 27th, 2018

A well-known Connecticut business recently hired Kelser to hack them. Here’s how we did it. Over the past year, we’ve been working with Hoffman Auto Group, one of Connecticut’s largest auto dealers, to strengthen their cybersecurity posture and make sure their customer data is as safe as possible. After putting all the latest technology in place, it came time to address employee awareness since most cyber-attacks involve human error.