<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Cybersecurity

By: Tyler Thepsiri
November 12, 2022

Organizations that work as contractors or subcontractors to the Department of Defense (DoD) are required to comply with the NIST 800-171 framework. Cybersecurity Maturity Model Certification (CMMC) 2.0 is the next iteration of this framework.

Blog Feature

IT Support

By: Tim Colby
November 11, 2022

It’s happened to everyone. You are in the middle of an important project and your system crashes or your internet goes down or you can’t connect to the VPN.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Managed Services | IT Support

By: Lisa Carroll
November 08, 2022

In the past few decades, the digital revolution has been a tremendous boon for business revenues, making companies of all sizes and industries more efficient, productive, and profitable. With those advances has also come a more complicated infrastructure to understand and manage.

Blog Feature

Working with Kelser | IT Support

By: Randi Schaeffer
November 05, 2022

Whether your organization has an internal IT staff or not, it’s important that your IT infrastructure is cared for and positioned to support your business goals and strategy.

Blog Feature

Workforce Enablement

By: Randi Schaeffer
November 03, 2022

With the proliferation of mobile devices (like tablets, smartphones, and tablets) in the workplace, it has become more important than ever to be able to remotely and securely manage these devices. That’s where mobile device management (MDM) comes in.

Blog Feature

Managed Services

By: Karen Cohen
November 02, 2022

Editor’s note: This article was originally published in 2019, but has been updated to include the pros and cons of each option.

Blog Feature

Cybersecurity

By: Tyler Thepsiri
October 29, 2022

For years, the IT world has been focused on the importance of having strong passwords.

Blog Feature

Cybersecurity

By: Tyler Thepsiri
October 28, 2022

According to a quick internet search, the average person has 100 passwords. (That may be why 23 million people resort to the overused and not so safe “123456” password.)

Back to Top