Kelser Blog, Media, and News
All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.
By:
Tyler Thepsiri
April 11, 2024
Cyberattacks continue to be a growing threat for small businesses. According to estimates from Statista's Cybersecurity Outlook, the global cost of cybercrime is expected to surge in the next five years, rising from $8.44 trillion in 2022 to $23.84 trillion by 2027.
By:
Tyler Thepsiri
April 04, 2024
If you are considering implementing multi-factor authentication (MFA), you may be hesitant to move forward because you’ve heard bad reviews from other users. Many of these bad reviews are myths or inaccuracies.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
Cybersecurity | Information Security
By:
Patrick Martin
March 27, 2024
If you manage or own an auto dealership, you understand the need for data security. In addition to safeguarding your own sensitive information and that of your customers, there are regulatory obligations such as the Federal Trade Commission’s (FTC’s) Safeguards Rule to consider as well.
By:
Patrick Martin
March 20, 2024
Although they are not financial institutions, auto dealers handle sensitive information about their customers. From banking information to social security numbers, driver’s license numbers to credit information, this information can be used by criminals to steal a customer’s identity.
By:
Tyler Thepsiri
March 19, 2024
Although NIST 800-171 has been around for several years, many business leaders still aren’t certain whether they are doing the right things to be compliant. One of the areas of confusion is what to expect from a NIST 800-171 Gap Analysis.
By:
Patrick Martin
March 13, 2024
The Federal Trade Commission (FTC) Safeguards Rule has been amended to include non-banking institutions that handle consumer financial information; car dealerships fall into this category.
By:
James Tubby
March 11, 2024
Most people have done it…you leave your personal computer (PC) running…one day leads into the next and before you know it, it has been running for several days without a break. Or, you may think you are shutting it down and not actually be doing it.
Cybersecurity | Compliance | NIST
By:
Karen Cohen
March 09, 2024
If your organization works with the government as a contractor, subcontractor, or supplier, you are likely familiar with the rules and regulations regarding information labeled secret, top secret, or classified.