If you’re a supplier or manufacturer that relies on business with the Department of Defense (DoD) and the contracts they offer, you will need to ensure that your IT infrastructure can pass a third party certification for cybersecurity readiness over the coming months. This certification is referred to as CMMC or the Cybersecurity Maturity Model Certification. It is an initiative designed to help protect the data being shared within the Defense Industrial Base of the United States and the contract information necessary to produce the parts, systems, and components needed for our national defense.
A version of the following article ran in the August 10 edition of the Hartford Business Journal under the headline "What part of your pandemic business should you keep?" As your organization scrambled to adjust to COVID-19, you may have implemented temporary solutions that could continue to be of value to the business going forward. With restrictions lifting, companies can pause to identify any positives that came out of this experience that may lower expenses or boost revenues on a long-term basis. In doing so, it’s also important to assess if your business may have gotten by with technology practices in the short term that could pose cybersecurity risks if left in place permanently.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
Cybersecurity gets a lot of attention today. With remote work more prevalent than ever, there’s a renewed focus on securing our digital and virtual workspaces, data, and more from seemingly far-away threats like the cyber mafia. However, the physical access to your data center, data closet, or wherever you lock away the beating heart of your organization is just as important. But many businesses, especially those that have compliance requirements related to their physical security, are often not in line with best practices in their defenses.
With competition and practice on hold due to the COVID-19 pandemic, Kelser Corporation and Fitbit teamed up to provide Special Olympics Glastonbury track and field athletes with fitness trackers to help maintain training.
Glastonbury, CT – Kelser Corporation is proud to announce that CRN®, a brand of The Channel Company®, has named Kelser to its 2020 Fast Growth 150 list. Each year, CRN® recognizes the fastest-growing technology integrators, solution providers, and IT consultants across North America for the substantial growth and performance they’ve achieved over the previous two years. The elite group of companies named to this year’s list have generated a combined total revenue of more than $37.8 billion between 2018 and 2019.
Last fall, I had the amazing experience of being interviewed by Chion Wolf—a familiar voice and personality to anyone who listens to WNPR—for the Connecticut Voice Podcast. The podcast highlights LGBT individuals from different areas of expertise across Connecticut and I was honored to be included. Our conversation touched on everything from coming out to helicopters, to cybersecurity—including my favorite interview question I’ve ever been asked comparing working in IT to being a pilot. Pride Month seemed like a good time to share some highlights from this interview, so below are two moments that stood out to me as well as the full audio recording.
As businesses continue to struggle with the economic fallout of COVID-19, many leaders are looking for ways to reduce costs, including technology. When implemented strategically, technology is a business enabler—an investment, not an expense. However, it’s always good to eliminate inefficiencies or redundancies in the IT department whenever possible. I recently had the chance to contribute to a TechRepublic article called “CIOs: 8 ways to trim IT budgets”. My tip, which focuses on telecom costs, is number 6. Below is more detail on how companies can potentially find savings in the IT budget.
Cyberattacks are on the rise. It’s just a plain fact. Numerous studies, reports, and surveys have pointed to the findings that not only are cyberattacks on the rise but specifically ones designed around social engineering such as phishing attacks. Worse still – these attacks have seen an even bigger jump in frequency since remote work requirements have also increased. Cybercriminals see the amount of company devices outside the typical protections of their traditional offices being an opportunity to harvest data, lock up those devices, and make a quick buck (by the thousands). That’s why I wanted to talk to you about Umbrella (formally OpenDNS).