<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Cybersecurity | Compliance

By: Dave Bykowski
November 11, 2021

If your company is a government contractor or subcontractor, you may be wondering what is going on with the Cybersecurity Maturity Model Certification (CMMC). 

Blog Feature

Cybersecurity | Compliance

By: Dave Bykowski
June 02, 2021

With more internet-connected devices in the hands of more people, and a larger chunk of the workforce doing their 9-to-5 from home, cybercriminals have targets and opportunities like never before. The state of Connecticut is responding to this tidal wave of cyberthreats with proposed legislation aimed at encouraging companies to increase their cybersecurity. In a nutshell, the proposed bill provides incentives for businesses to reach compliance with nationally recognized standards of cybersecurity. In case of a breach, a compliant company would be shielded from legal liability stemming from a cyber attack. The bill was unanimously approved in the state House on May 20 and now moves to the state Senate.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | Compliance

By: Dave Bykowski
April 28, 2021

I’ve been having many conversations with manufacturers about their need to get aligned with an interim rule put out by the Department of Defense (DoD) recently. The basic deliverables of that rule are to submit the score a supplier achieves following a gap analysis based on the controls listed in the NIST Special Publication 800-171 document. Sounds simple right? I can tell you from experience that the idea is not clearly defined within the rule.

Blog Feature

Cybersecurity | Compliance

By: Dave Bykowski
March 10, 2021

Following the interim rule passed down in the document DFARS Case 2019-D041 on September 29, 2020, there’s a growing number of subcontractors in the Department of Defense (DoD) supply base selling into the “Primes” who are receiving urgent requests from their customers to comply with this new requirement. Regardless how long the DFARS 252.204-7012 has been a stated requirement for DoD contract awards, this new urgency is driving a lot of activity in the Defense Industrial Base (DiB). As such, you have likely heard from a range of vendors that have offered to help you reach that goal.

Blog Feature

Cybersecurity | Compliance

By: Dave Bykowski
May 08, 2019

If you're a supplier, contractor or subcontractor with the federal government, you or your colleagues have no doubt heard of NIST 800-171. If you haven't, check out "Everything You Need to Know About NIST 800-171." for all of the details, and how it may affect your business contracts.

Blog Feature

Cybersecurity | Compliance

By: Dave Bykowski
August 10, 2018

Trust can be a precarious thing. One mistake could ruin it forever. You spend so much time and energy building trust with your customers, vendors, contractors, and partners, that the last thing you want to do is lose it, particularly over non-compliance. Believe it or not, record keeping and data handling is critical to maintaining that trust.

Blog Feature

Cybersecurity | Managed Services | Compliance

By: Kelser
June 26, 2018

Privacy laws changed profoundly with the Health Insurance Portability and Accountability Act (HIPAA), which has had a major impact on the healthcare industry and IT in CT. Not only does a healthcare firm have to commit to protecting patient data--- it has to be very careful in how it uses social media.

Blog Feature

Cybersecurity | Managed Services | Compliance

By: Kelser
April 26, 2018

IT services in CT must remain as cutting-edge as possible for any kind of cohesive competitiveness. The truth is, technology continues to expand at a near-exponential pace. Innovation is statistically predictable in accordance with Moore's Law. About every 18 months, the capacity for computation doubles on itself. Accordingly, new innovations carry out a domino effect away from that computational increase.

Back to Top