<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Information technology blog, cybersecurity blog

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Patrick Martin

As vice president, engineering services, Patrick tackles technical challenges on a daily basis. He enjoys working with customers to help them use technology effectively to achieve their strategic business goals and objectives.

Blog Feature

Cybersecurity | Business Continuity | Compliance

By: Patrick Martin
December 20, 2024

The rapidly changing automotive industry landscape will bring new considerations for dealerships of all sizes in 2025—and rising cybersecurity threats.

Blog Feature

Cybersecurity | Compliance | Information Security

By: Patrick Martin
December 20, 2024

The Department of Defense’s Cybersecurity Maturity Model Certification (CMMC) Program Final Rule is now live. This means that the DoD can start requiring defense contractors handling the most sensitive federal information to show compliance with the new regulations right now in order to continue doing business with the DoD.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | Compliance | IT Support | NIST

By: Patrick Martin
November 05, 2024

Now that the much-anticipated final rule establishing the U.S. Department of Defense (DoD) Cybersecurity Maturity Model Certification (CMMC) Program has cleared its last regulatory hurdle, you may have more questions than answers.

Blog Feature

Cybersecurity | Managed Services | Information Security

By: Patrick Martin
October 24, 2024

Are you a small or medium-sized business wondering if artificial intelligence (AI) can benefit your organization and how you can optimize the technology to propel your business?

Blog Feature

Cybersecurity

By: Patrick Martin
October 23, 2024

Are you struggling to figure out how best to protect your devices from a phishing scam or some other sophisticated cyber attack? Confused about which endpoint protection platform is the right one for your company?

Blog Feature

Cybersecurity

By: Patrick Martin
October 18, 2024

What is Zero Trust and what does it include? How will implementing a Zero Trust strategy strengthen my IT infrastructure security posture? Can Zero Trust be added to my existing systems seamlessly?

Blog Feature

Cybersecurity

By: Patrick Martin
October 17, 2024

Are you sure your IT network is safe from a ransomware attack or some other cyber incident? Do you have hidden gaps in your system that could be prime opportunities for malicious actors to infiltrate your network, possibly compromising your sensitive data? Are your employees aware of the latest cyber traps and how to avoid them?

Blog Feature

Cybersecurity

By: Patrick Martin
October 16, 2024

You may have heard of the term endpoint protection, but do you know what it is and why it is so important for your business? Endpoint protection is actually like a multifunction pocketknife, providing several different tools to safeguard your devices against cyber threats.

Back to Top