Kelser Blog, Media, and News
All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.
Eileen merges her extensive experience as an educator and professional journalist into her role as Kelser’s Content Manager. She brings a different perspective in translating complex technology ideas into easy-to-understand articles.
Cybersecurity | Information Security
By:
Eileen Smith
May 06, 2025
You’ve already taken steps to protect your network and data from hackers by implementing security measures such as multi-factor authentication. But what if those security measures aren’t enough to keep threat actors at bay?
By:
Eileen Smith
April 30, 2025
You’ve spent months, even years, trying to decide if managed IT services was the right solution for your business. You finally took the plunge and signed on with a managed IT service provider (MSP) you were convinced could meet your strategic IT and business needs.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
Cybersecurity | Compliance | Information Security
By:
Eileen Smith
April 17, 2025
Many businesses today are being whip-sawed by an onslaught of cyber incidents. Threat actors are using increasingly sophisticated maneuvers to slip into IT systems undetected to launch a potentially devastating cyberattack.
By:
Eileen Smith
April 14, 2025
Fluctuating markets and rapid technology advances today are giving businesses of all sizes more reasons than ever to make sure that their IT continue to run smoothly, securely, and efficiently.
In the Media | News | Foundation
By:
Eileen Smith
April 08, 2025
GLASTONBURY, CT — In a recent ceremony, Kelser Corporation presented the Hospital for Special Care's Center For Cognitive Health with a donation of $49,000, the proceeds from its Annual Kelser Charity Challenge.
Cybersecurity | Compliance | Information Security
By:
Eileen Smith
April 03, 2025
Creating an effective access control system to safeguard your IT network, data, and devices to only authorized users is considered a basic part of cyber hygiene.
By:
Eileen Smith
April 01, 2025
How do I submit a helpdesk ticket to Kelser Corporation? How are IT helpdesk service tickets assigned? I have multiple technical issues—do I need to submit a separate request for each one? How are helpdesk requests prioritized? How long can I expect to wait to get my IT problem resolved?