Kelser Blog, Media, and News
All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.
Eileen merges her extensive experience as an educator and professional journalist into her role as Kelser’s Content Manager. She brings a different perspective in translating complex technology ideas into easy-to-understand articles.
Cybersecurity | Modern Data Center
By:
Eileen Smith
May 22, 2025
Artificial intelligence is consistently ranked as the leading technology trend today. To some, its wonders represent a remarkable example of human ingenuity that will fuel business productivity, efficiency, and revenue into the future.
By:
Eileen Smith
May 21, 2025
As a Level 2 contractor or subcontractor within the Defense Industrial Base (DIB), you’re well aware by now that you will likely need to get audited by an outside assessment company in order to achieve final CMMC certification.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
By:
Eileen Smith
May 14, 2025
Whether you're still in the planning stages of your CMMC compliance journey, or you've already started preparing, you're probably wondering what you can expect during your CMMC assessment when the time comes.
Cybersecurity | Information Security
By:
Eileen Smith
May 06, 2025
You’ve already taken steps to protect your network and data from hackers by implementing security measures such as multi-factor authentication. But what if those security measures aren’t enough to keep threat actors at bay?
By:
Eileen Smith
April 30, 2025
You’ve spent months, even years, trying to decide if managed IT services was the right solution for your business. You finally took the plunge and signed on with a managed IT service provider (MSP) you were convinced could meet your strategic IT and business needs.
Cybersecurity | Compliance | Information Security
By:
Eileen Smith
April 17, 2025
Many businesses today are being whip-sawed by an onslaught of cyber incidents. Threat actors are using increasingly sophisticated maneuvers to slip into IT systems undetected to launch a potentially devastating cyberattack.