Kelser Blog, Media, and News
All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.
By:
Dave Bykowski
November 11, 2021
If your company is a government contractor or subcontractor, you may be wondering what is going on with the Cybersecurity Maturity Model Certification (CMMC).
By:
Dave Bykowski
June 02, 2021
With more internet-connected devices in the hands of more people, and a larger chunk of the workforce doing their 9-to-5 from home, cybercriminals have targets and opportunities like never before. The state of Connecticut is responding to this tidal wave of cyberthreats with proposed legislation aimed at encouraging companies to increase their cybersecurity. In a nutshell, the proposed bill provides incentives for businesses to reach compliance with nationally recognized standards of cybersecurity. In case of a breach, a compliant company would be shielded from legal liability stemming from a cyber attack. The bill was unanimously approved in the state House on May 20 and now moves to the state Senate.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
By:
Dave Bykowski
March 10, 2021
Following the interim rule passed down in the document DFARS Case 2019-D041 on September 29, 2020, there’s a growing number of subcontractors in the Department of Defense (DoD) supply base selling into the “Primes” who are receiving urgent requests from their customers to comply with this new requirement. Regardless how long the DFARS 252.204-7012 has been a stated requirement for DoD contract awards, this new urgency is driving a lot of activity in the Defense Industrial Base (DiB). As such, you have likely heard from a range of vendors that have offered to help you reach that goal.
By:
Dave Bykowski
May 08, 2019
If you're a supplier, contractor or subcontractor with the federal government, you or your colleagues have no doubt heard of NIST 800-171. If you haven't, check out "Everything You Need to Know About NIST 800-171." for all of the details, and how it may affect your business contracts.
By:
Dave Bykowski
August 10, 2018
Trust can be a precarious thing. One mistake could ruin it forever. You spend so much time and energy building trust with your customers, vendors, contractors, and partners, that the last thing you want to do is lose it, particularly over non-compliance. Believe it or not, record keeping and data handling is critical to maintaining that trust.
Cybersecurity | Managed Services | Compliance
By:
Kelser
June 26, 2018
Privacy laws changed profoundly with the Health Insurance Portability and Accountability Act (HIPAA), which has had a major impact on the healthcare industry and IT in CT. Not only does a healthcare firm have to commit to protecting patient data--- it has to be very careful in how it uses social media.
Cybersecurity | Managed Services | Compliance
By:
Kelser
April 26, 2018
IT services in CT must remain as cutting-edge as possible for any kind of cohesive competitiveness. The truth is, technology continues to expand at a near-exponential pace. Innovation is statistically predictable in accordance with Moore's Law. About every 18 months, the capacity for computation doubles on itself. Accordingly, new innovations carry out a domino effect away from that computational increase.
Cybersecurity | In the Media | News | Compliance
By:
Adam Stahl
October 06, 2017
IndustryWeek, one of the largest trade publications in the country serving the manufacturing sector, published a detailed article about the new NIST 800-171 cybersecurity guidelines, the bulk of which is an extensive Q&A with Kelser VP of Professional Services Matt Kozloski.