<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

By not complying with the requirements laid out in NIST SP 800-171, your government contracts may be at risk. Even though the deadline for compliance was 12/31/17, it’s not too late to protect your business. Get started here

NIST Compliance - Are You Overdue? 00 : 00 : 00 : 00

Information technology blog, cybersecurity blog

Kelser Blog

The Kelser Blog covers technology and business topics such as Cybersecurity, IT Lifecycle Management, Modern Data Center, Workforce Enablement, and more.

Blog Feature

Office 365 | Cybersecurity | WannaCry | cyber security Connecticut | Connecticut cyber security

Why Hackers Love Tax Season (And What You Can Do About It)

By: Matt Kozloski
March 6th, 2018

During tax season, personal information is being exchanged at a much higher rate than any other time of year. Documents like W2s with Social Security numbers on them are just par for the course. It’s also a time of year when employers and employees engage in tax-related tasks that aren’t routine to them. There’s often a bit of chaos getting everything in order and even a bit of anxiety over doing it right. For hackers and scammers who rely on human error and deception, all of this combines to create ideal conditions. I was recently on WTNH’s Good Morning Connecticut alongside Michelle Seagull, Commissioner of the CT Department of Consumer Protection talking about tax hacks and scams targeting companies in Connecticut. Commissioner Seagull and I were also guests on the MetroHartford Alliance’s “Pulse of the Region” radio show with Brian Newman from CohnReznick discussing this same topic.

Read More

Share

Blog Feature

Cybersecurity | WannaCry | it ct | cyber security Connecticut | IT Connecticut | it support ct | Connecticut cyber security

Takeaways from the Cyber Attack on Connecticut State Agencies

By: Adam Stahl
February 27th, 2018

Twelve Connecticut state agencies were impacted by a cyber attack over the weekend. According to reports, the cyber attack appeared to be the nefarious ransomware WannaCry that wreaked havoc worldwide in 2017. Officials say that even though approximately 160 computers across twelve agencies were affected, the outbreak was contained by Sunday night and there were no reports of encryption or data loss. Fortunately, it appears that the state was able to effectively mitigate ill effects from the attack. As we’ve discussed with Arthur House, Chief Cybersecurity Risk Officer for the State of Connecticut, our state is an international leader in cybersecurity. This was demonstrated in the state’s response to the attack.

Read More

Share

Cybersecurity eBook Cover Image

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | WannaCry | Business Continuity | BCDRaaS

What We Can Learn from Bad Rabbit – the Latest Ransomware Outbreak

By: Adam Stahl
October 30th, 2017

Last week the third major ransomware outbreak in 2017 was spreading through Eastern Europe and even starting to creep further across the globe. So far striking Russia and Ukraine the most, Bad Rabbit has disrupted industries ranging from media outlets to banks. Some reports even have the attack showing up right here in the U.S. Similar to the Petya/NotPetya ransomware outbreak earlier this year (so similar in fact that Bad Rabbit reportedly shares 2/3 of its code with variants of Petya), this ransomware encrypts a system, requests a ransom (the current rate is about $285 in bitcoin) to decrypt the victim’s files, and then attempts to spread itself across the network. With ransomware and cyberattacks commonplace in today’s world, what takeaways can come out of the Bad Rabbit outbreak to help prevent these types of attacks from derailing your organization?

Read More

Share

Blog Feature

Cybersecurity | WannaCry

9 Resources to Help Protect You From Ransomware Attacks Like WannaCry

By: Adam Stahl
May 24th, 2017

The malicious ransomware dubbed "WannaCry" has seized systems in over 150 countries since its discovery on May 12th, holding computers across all industries hostage. The program infects computers and encrypts their files, demanding $300 in Bitcoin or the files will be erased.  This ransomware currently affects Microsoft Windows machines through an exploit known as EternalBlue. Given the severity of this attack and other ransomware variants following suit, it's time to make sure that your organization is protected. We've compiled this list of 9 resources that will help prepare your organization for malware attacks like WannaCry, so that you can ensure your files and information are safe.

Read More

Share