<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Cybersecurity | Compliance

By: Karen Cohen
February 23, 2024

Organizations that work with the government are accustomed to the rules and regulations regarding information labeled secret, top secret, or classified.

Blog Feature

Cybersecurity | Managed Services | Compliance | IT Support

By: Patrick Martin
February 17, 2024

It goes without saying that the prime goal of the healthcare industry is to provide care for people and while a good bedside manner is essential, the industry would grind to a halt without technology.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | Compliance

By: Karen Cohen
November 04, 2023

As the government continues to tweak the requirements for Cybersecurity Maturity Model Certification (CMMC) 2.0, many business leaders are scratching their heads and wondering how they can prepare now so they aren’t playing catch up once the requirements are announced.

Blog Feature

Cybersecurity | Compliance

By: Karen Cohen
August 18, 2023

If you work as a contractor or subcontractor the U.S. government, you likely know that not all sensitive information is marked “secret” or “classified.”

Blog Feature

Cybersecurity | Compliance | IT Support

By: Patrick Martin
May 19, 2023

Healthcare organizations are subject to all kinds of regulatory requirements designed to protect private patient information also known as personally identifiable information (PII).

Blog Feature

Cybersecurity | Compliance

By: Tyler Thepsiri
November 15, 2022

If your organization relies on business with the Department of Defense (DoD), you may need to ensure that your IT infrastructure can pass a third-party assessment for cybersecurity readiness soon as part of the requirements for CMMC 2.0 compliance.

Blog Feature

Cybersecurity | Compliance

By: Tyler Thepsiri
October 18, 2022

Editor’s note: This article was originally published in 2021, but has been updated to reflect the latest CMMC information.

Blog Feature

Cybersecurity | Compliance

By: Tyler Thepsiri
October 11, 2022

Editor's note: This article was originally published in August 2019, but has been completely updated and revamped for accuracy and comprehensiveness.

Back to Top