<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

By not complying with the requirements laid out in NIST SP 800-171, your government contracts may be at risk. Even though the deadline for compliance was 12/31/17, it’s not too late to protect your business. Get started here

NIST Compliance - Are You Overdue? 00 : 00 : 00 : 00

Information technology blog, cybersecurity blog

Kelser Blog

The Kelser Blog covers technology and business topics such as Cybersecurity, IT Lifecycle Management, Modern Data Center, Workforce Enablement, and more.

Blog Feature

Cybersecurity | Executive Consulting | Workforce Enablement | cyber security Connecticut | IT support Connecticut | Connecticut cyber security | IT partner Connecticut | IT services CT

Real Estate Cybersecurity: An In-Depth Conversation

By: Matt Kozloski
February 14th, 2018

As business operations are increasingly conducted online, businesses in all industries are becoming more susceptible to cybersecurity breaches. I was recently invited to discuss cybersecurity concerns and best practices for real estate agents on Real Estate Radio, a show broadcast on CBS Radio 94.9FM here in Connecticut and hosted by One and Company Real Estate’s Byron Lazine and financial planner Pat Kenny. Our discussion wound up being quite universal and applicable to almost any industry. Here are some of the highlights of my interview with Byron and Pat. Below, you’ll find the full transcript and audio of the conversation.

Read More

Share

Blog Feature

Executive Consulting | Workforce Enablement

How Does Net Neutrality Affect Small Business?

By: Matt Kozloski
December 20th, 2017

Last week, the FCC voted to end Net Neutrality. I was invited on Fox61 to talk about this issue. Since it's a lot to fit into a four-minute segment, I thought I'd offer some additional thoughts here.

Read More

Share

Cybersecurity eBook Cover Image

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | Workforce Enablement

Top 3 Reasons Healthcare Providers Should Make Cybersecurity a Priority

By: Matt Kozloski
May 19th, 2017

Cybersecurity has become a mainstream point of discussion over the last five years. With notable attacks on Target, NASA, the United States Defense Department, and the WannaCry / WannaCrypt outbreak, the public now has a heightened sense of awareness (and fear) of cyber crime. Perhaps no industry needs a wake up call more than the healthcare industry.

Read More

Share

Blog Feature

Cybersecurity | Workforce Enablement

Common Threats to Mobile Security and How to Combat Them

By: Matt Kozloski
May 19th, 2016

Securing today’s mobile workforce is becoming increasingly difficult. As the demand for remote productivity grows, so too does the sophistication of cyber-attacks aimed at road warriors. Some of today’s threats include mobile malware, eavesdropping, unauthorized access, and unlicensed or unmanaged applications. Let’s take a look at these threats and what can be done to combat them. 

Read More

Share

Blog Feature

Office 365 | Workforce Enablement

Building a Modern Distributed Workforce That’s Connected

By: Steve Machesney
May 11th, 2016

As the business world evolves, management has become more innovative. Top managers have begun employing creative strategies to attract and retain top talent, and improve productivity while keeping costs in check. These advancements have not been entirely voluntary, as businesses are often forced to respond to several day-to-day challenges to stay afloat. Here are some of these key challenges:

Read More

Share

Blog Feature

Office 365 | Cybersecurity | Workforce Enablement

Your Mobile Data - Secured by Microsoft

By: Adam Stahl
April 27th, 2016

With so many companies utilizing the cloud and mobile devices, data security should be a major concern for all businesses. Yet, despite numerous security breaches, distributed denial-of-service (DDoS), and security experts’ repeated warnings that businesses need to better protect their information, many companies remain unprepared or inadequately protected from various security threats. 

Read More

Share