<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Information technology blog, cybersecurity blog

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Cybersecurity | Compliance | IT Support

By: Tyler Thepsiri
September 06, 2024

If you are a defense contractor, subcontractor or your organization does business with the Department of Defense (DoD), you may be aware of the proposed deadline for Q1 2025 for CMMC certification.

Blog Feature

Cybersecurity | Compliance

By: Tyler Thepsiri
August 16, 2024

If you are a business leader working with the Department of Defense (DoD), you know all about the complex compliance requirements your organization needs to meet to maintain current contracts and secure future ones.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | Compliance

By: Tyler Thepsiri
August 08, 2024

Are you a government contractor or subcontractor who needs to be NIST 800-171 compliant? Although NIST 800-171 has been around for several years, many business leaders still aren’t certain whether they are doing the right things to be compliant.

Blog Feature

Cybersecurity | Compliance | IT Support

By: Tyler Thepsiri
July 31, 2024

If you are a contractor or subcontractor working with the Department of Defense (DoD), you’re likely aware of NIST Special Publication 800-171 (NIST SP 800-171) and the importance of protecting controlled unclassified information (CUI).

Blog Feature

Cybersecurity | Business Continuity | IT Support

By: Patrick Martin
July 11, 2024

If you manage or own an auto dealership you understand how vital technology is for your business. Not only do you use technology for managing vehicle inventory, creating sales orders or financing and processing loans, but you also use technology to safeguard your own sensitive information and that of your customers.

Blog Feature

Cybersecurity | Networking

By: Jorge Soriano-Garcia
July 03, 2024

Cybersecurity risks have been on the rise for years. As hackers and malicious actors develop new technologies and tools to infiltrate networks your business is at more risk now than ever. The good news is that the products and services designed to protect against these attacks have also continued to evolve.

Blog Feature

Cybersecurity | Information Security

By: Patrick Martin
June 25, 2024

If you own or manage a car dealership, you rely heavily on technology, from managing vehicle inventory, to creating sales orders and processing loans.

Blog Feature

Cybersecurity | Compliance

By: Tyler Thepsiri
June 07, 2024

If you are a business leader of an organization that works with the U.S Department of Defense (DoD), you understand that protecting sensitive information is a top priority. While you most likely already have a lot on your plate to run your business, throw compliance into the mix and it can become a constant journey to make sure you’re doing the right things.

Back to Top