Kelser Blog, Media, and News
All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.
Cybersecurity | Compliance | IT Support
By:
Patrick Martin
May 19, 2023
Healthcare organizations are subject to all kinds of regulatory requirements designed to protect private patient information also known as personally identifiable information (PII).
By:
Tyler Thepsiri
November 15, 2022
If your organization relies on business with the Department of Defense (DoD), you may need to ensure that your IT infrastructure can pass a third-party assessment for cybersecurity readiness soon as part of the requirements for CMMC 2.0 compliance.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
By:
Tyler Thepsiri
October 21, 2022
Business leaders have a lot on their plate. There’s the balance sheet, inventory, and IT resources to name just a few. Compliance requirements add to the mix.
By:
Tyler Thepsiri
October 18, 2022
Editor’s note: This article was originally published in 2021, but has been updated to reflect the latest CMMC information.
By:
Tyler Thepsiri
October 11, 2022
Editor's note: This article was originally published in August 2019, but has been completely updated and revamped for accuracy and comprehensiveness.
By:
Patrick Martin
September 06, 2022
Editor’s note: This article was originally published in 2020 but has been updated to reflect the latest information.
By:
Dave Bykowski
April 16, 2022
If you are a business leader for a manufacturer that is part of the U.S. Defense Industrial Base, you are likely awaiting word about the new CMMC 2.0 standards. You may be checking the internet every week to see if there is any news about when they will be released. You may be wondering what the new standards will require of your organization.
By:
Patrick Martin
April 06, 2022
I see it all the time. A business gets hacked and comes to an IT provider for a solution. Unfortunately, once a breach occurs, the only solution is remediation. The best advice I can give any business is to put a cybersecurity plan in place before an incident happens.