Kelser Blog, Media, and News
All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.
By:
Dave Bykowski
April 16, 2022
If you are a business leader for a manufacturer that is part of the U.S. Defense Industrial Base, you are likely awaiting word about the new CMMC 2.0 standards. You may be checking the internet every week to see if there is any news about when they will be released. You may be wondering what the new standards will require of your organization.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
IT Support | Information Security
By:
Tim Colby
April 15, 2022
In the old days, when people had important documents they wanted to keep secure, they would lock them in a filing cabinet. The only people who could access the files would have a key or would need to contact the file administrator.
By:
Karen Cohen
April 13, 2022
As a business leader, you understand that your IT infrastructure is important. You have invested in technology that positions your business for success. You’ve put security measures in place to keep your data safe. But, you know that risks still exist. You want to minimize them.
By:
Patrick Martin
April 11, 2022
See this article as it originally appeared in the New England Real Estate Journal.
By:
Lisa Carroll
April 08, 2022
You’ve made the initial decision. You need help. You’ve collected extensive information from several IT providers. At this point, you may be feeling overwhelmed by your options.
By:
Karen Cohen
April 07, 2022
As a business or technology leader, you are likely familiar with the term “phishing.” You may have a general idea of what it means and what it looks like. You (or one of your colleagues) may have even fallen prey to a phishing attack (and may not even know it yet).
By:
Patrick Martin
April 06, 2022
I see it all the time. A business gets hacked and comes to an IT provider for a solution. Unfortunately, once a breach occurs, the only solution is remediation. The best advice I can give any business is to put a cybersecurity plan in place before an incident happens.