<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Information technology blog, cybersecurity blog

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Cybersecurity | Managed Services | Compliance | IT Support | Efficiency

By: Randi Schaeffer
May 23, 2024

When business leaders think about technology, it is often “out of sight, out of mind.” As long as their technology environment is operating smoothly, they usually don’t give much thought to their IT infrastructure.

Blog Feature

Compliance | IT Support | NIST

By: Tyler Thepsiri
May 21, 2024

If you work as a contractor or subcontractor to the U.S. government, you likely know that not all sensitive information is marked “secret,” “top secret,” or “classified.”

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | Compliance | Cost

By: Tyler Thepsiri
May 16, 2024

Business leaders have a lot to contend with. There’s the balance sheet, inventory, and IT resources to name just a few. Compliance requirements add a level of complexity to the mix. If you are a government contractor or subcontractor, you most likely are aware of the increasing emphasis on cybersecurity and NIST Special Publication 800-171 (NIST 800-171).

Blog Feature

Cybersecurity | Compliance

By: Tyler Thepsiri
April 25, 2024

As a business leader you have a lot on your plate. If you are an organization that works with the government, you most likely are aware that you are required to meet standards and guidelines to ensure that data and records are protected.

Blog Feature

Networking | Information Security

By: Jorge Soriano-Garcia
April 24, 2024

Firewalls often fall into that “out-of-sight, out-of-mind” category; quietly operating to keep your network safe without too much thought from business leaders or users. But, just like every other part of your network, firewalls need to be monitored and updated to ward off new threats.

Blog Feature

Cybersecurity | Compliance

By: Tyler Thepsiri
April 11, 2024

If you are a company that works with the government you are familiar with the rules and regulations that surround information labelled as sensitive, top secret or classified. You most likely know about the National Institute of Standards and Technology (NIST) Special Publication 800-171 and Cybersecurity Maturity Model Certification (CMMC).

Blog Feature

Cybersecurity

By: Tyler Thepsiri
April 11, 2024

Cyberattacks continue to be a growing threat for small businesses. According to estimates from Statista's Cybersecurity Outlook, the global cost of cybercrime is expected to surge in the next five years, rising from $8.44 trillion in 2022 to $23.84 trillion by 2027.

Blog Feature

Cybersecurity | Compliance

By: Tyler Thepsiri
April 05, 2024

Although NIST 800-171 has been around for several years, many business leaders still aren’t certain whether they are doing the right things to be compliant.

Back to Top