<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Information technology blog, cybersecurity blog

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Cybersecurity | Compliance

By: Dave Bykowski
July 02, 2022

Protecting data is vital for all organizations, including the federal government. 

Blog Feature

Cybersecurity | Compliance

By: Dave Bykowski
April 16, 2022

If you are a business leader for a manufacturer that is part of the U.S. Defense Industrial Base, you are likely awaiting word about the new CMMC 2.0 standards. You may be checking the internet every week to see if there is any news about when they will be released. You may be wondering what the new standards will require of your organization.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | Compliance

By: Dave Bykowski
April 06, 2022

I see it all the time. A business gets hacked and comes to an IT provider for a solution. Unfortunately, once a breach occurs, the only solution is remediation. The best advice I can give any business is to put a cybersecurity plan in place before an incident happens. 

Blog Feature

Compliance

By: Dave Bykowski
March 25, 2022

As a business leader, you have a lot on your plate. Financials, quality, security, compliance, and more! It can be overwhelming.

Blog Feature

Cybersecurity | Compliance

By: Dave Bykowski
November 11, 2021

If your company is a government contractor or subcontractor, you may be wondering what is going on with the Cybersecurity Maturity Model Certification (CMMC). 

Blog Feature

Cybersecurity | Compliance

By: Dave Bykowski
September 21, 2021

Congratulations! You’ve implemented NIST 800-171. You have probably begun to put in place the processes you need to ensure your organization’s cybersecurity. Bad news: that doesn’t mean your job is finished. 

Blog Feature

Cybersecurity | Compliance

By: Dave Bykowski
June 02, 2021

With more internet-connected devices in the hands of more people, and a larger chunk of the workforce doing their 9-to-5 from home, cybercriminals have targets and opportunities like never before. The state of Connecticut is responding to this tidal wave of cyberthreats with proposed legislation aimed at encouraging companies to increase their cybersecurity. In a nutshell, the proposed bill provides incentives for businesses to reach compliance with nationally recognized standards of cybersecurity. In case of a breach, a compliant company would be shielded from legal liability stemming from a cyber attack. The bill was unanimously approved in the state House on May 20 and now moves to the state Senate.

Blog Feature

Cybersecurity | Compliance

By: Dave Bykowski
April 28, 2021

I’ve been having many conversations with manufacturers about their need to get aligned with an interim rule put out by the Department of Defense (DoD) recently. The basic deliverables of that rule are to submit the score a supplier achieves following a gap analysis based on the controls listed in the NIST Special Publication 800-171 document. Sounds simple right? I can tell you from experience that the idea is not clearly defined within the rule.

Back to Top