<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Information technology blog, cybersecurity blog

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Cybersecurity | Compliance

By: Tom Sharp
April 28th, 2021

I’ve been having many conversations with manufacturers about their need to get aligned with an interim rule put out by the Department of Defense (DoD) recently. The basic deliverables of that rule are to submit the score a supplier achieves following a gap analysis based on the controls listed in the NIST Special Publication 800-171 document. Sounds simple right? I’ve been working with hundreds of DoD suppliers as an outside consultant to guide them towards NIST 800-171 and CMMC compliance. I can tell you from experience that the idea is not clearly defined within the rule.

Blog Feature

Cybersecurity | Compliance

By: Tom Sharp
March 10th, 2021

Following the interim rule passed down in the document DFARS Case 2019-D041 on September 29, 2020, there’s a growing number of subcontractors in the Department of Defense (DoD) supply base selling into the “Primes” who are receiving urgent requests from their customers to comply with this new requirement. Regardless how long the DFARS 252.204-7012 has been a stated requirement for DoD contract awards, this new urgency is driving a lot of activity in the Defense Industrial Base (DiB). As such, you have likely heard from a range of vendors that have offered to help you reach that goal.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | Compliance

By: Tom Sharp
September 25th, 2020

If you’re a supplier or manufacturer that relies on business with the Department of Defense (DoD) and the contracts they offer, you will need to ensure that your IT infrastructure can pass a third party certification for cybersecurity readiness over the coming months. This certification is referred to as CMMC or the Cybersecurity Maturity Model Certification. It is an initiative designed to help protect the data being shared within the Defense Industrial Base of the United States and the contract information necessary to produce the parts, systems, and components needed for our national defense.

Blog Feature

Cybersecurity | Compliance

By: Tom Sharp
August 5th, 2019

Improving record keeping and data handling is critical to keeping the trust of partners, vendors, contractors, and customers. The importance is magnified when the federal government is involved, with the goal of creating a national culture of cybersecurity that protects the information of our businesses, citizens, and government. The National Institute of Standards and Technology (NIST) created Special Publication 800-171 to help protect Controlled Unclassified Information. But what does that actually look like? How will you know you’re meeting the standards laid out in NIST 800-171? What is CUI?

Blog Feature

Cybersecurity | Compliance

By: Tom Sharp
May 8th, 2019

If you're a supplier, contractor or subcontractor with the federal government, you or your colleagues have no doubt heard of NIST 800-171. If you haven't, check out "Everything You Need to Know About NIST 800-171." for all of the details, and how it may affect your business contracts.

Blog Feature

Cybersecurity | Compliance

By: Tom Sharp
August 10th, 2018

Trust can be a precarious thing. One mistake could ruin it forever. You spend so much time and energy building trust with your customers, vendors, contractors, and partners, that the last thing you want to do is lose it, particularly over non-compliance. Believe it or not, record keeping and data handling is critical to maintaining that trust.

Blog Feature

Cybersecurity | Managed Services | Compliance

By: Kelser
June 26th, 2018

Privacy laws changed profoundly with the Health Insurance Portability and Accountability Act (HIPAA), which has had a major impact on the healthcare industry and IT in CT. Not only does a healthcare firm have to commit to protecting patient data--- it has to be very careful in how it uses social media.

Blog Feature

Cybersecurity | Managed Services | Compliance

By: Kelser
April 26th, 2018

IT services in CT must remain as cutting-edge as possible for any kind of cohesive competitiveness. The truth is, technology continues to expand at a near-exponential pace. Innovation is statistically predictable in accordance with Moore's Law. About every 18 months, the capacity for computation doubles on itself. Accordingly, new innovations carry out a domino effect away from that computational increase.

Back to Top