Kelser Blog, Media, and News
All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.
By:
Tyler Thepsiri
November 12, 2022
Organizations that work as contractors or subcontractors to the Department of Defense (DoD) are required to comply with the NIST 800-171 framework. Cybersecurity Maturity Model Certification (CMMC) 2.0 is the next iteration of this framework.
By:
Tim Colby
November 11, 2022
It’s happened to everyone. You are in the middle of an important project and your system crashes or your internet goes down or you can’t connect to the VPN.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
By:
Lisa Carroll
November 08, 2022
In the past few decades, the digital revolution has been a tremendous boon for business revenues, making companies of all sizes and industries more efficient, productive, and profitable. With those advances has also come a more complicated infrastructure to understand and manage.
Working with Kelser | IT Support
By:
Randi Schaeffer
November 05, 2022
Whether your organization has an internal IT staff or not, it’s important that your IT infrastructure is cared for and positioned to support your business goals and strategy.
By:
Randi Schaeffer
November 03, 2022
With the proliferation of mobile devices (like tablets, smartphones, and tablets) in the workplace, it has become more important than ever to be able to remotely and securely manage these devices. That’s where mobile device management (MDM) comes in.
By:
Karen Cohen
November 02, 2022
Editor’s note: This article was originally published in 2019, but has been updated to include the pros and cons of each option.
By:
Tyler Thepsiri
October 29, 2022
For years, the IT world has been focused on the importance of having strong passwords.
By:
Tyler Thepsiri
October 28, 2022
According to a quick internet search, the average person has 100 passwords. (That may be why 23 million people resort to the overused and not so safe “123456” password.)