<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Cybersecurity

By: Karen Cohen
January 20, 2023

As a business leader, you work hard and diligently pay attention to the details of running your business. You understand the importance of protecting your data and keeping customer information.

Blog Feature

Cybersecurity

By: Tim Colby
January 06, 2023

If you are considering implementing multi-factor authentication (MFA), you’ve likely heard three common concerns: it’s expensive, it’s difficult to implement, and it negatively affects productivity.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity

By: Tyler Thepsiri
December 13, 2022

When it comes to cybersecurity, the most important thing you can do is stay vigilant. This requires ongoing attention to the details of your IT environment.

Blog Feature

Cybersecurity

By: Karen Cohen
December 10, 2022

Once they understand the value, business leaders often want to provide security awareness training for employees. Many times, they don’t know their options for and the pros and cons of each.

Blog Feature

Cybersecurity

By: Tyler Thepsiri
December 09, 2022

If you are a business or IT leader for a government contractor or subcontractor, you are likely well aware of the requirement to be NIST 800-171 certified.

Blog Feature

Cybersecurity | Managed Services

By: Karen Cohen
December 08, 2022

Editor’s note: This article was originally published in 2018, but has been updated to reflect the latest advances in security awareness training.

Blog Feature

Cybersecurity

By: Tyler Thepsiri
December 02, 2022

We've been hearing about Cybersecurity Maturity Model Certification (CMMC) for years. With CMMC 2.0 on the horizon, you likely have an understanding of what the requirements will look like, but what's the best way for you to implement the 14 control families and achieve the level of certification your contracts require?

Blog Feature

Cybersecurity | Compliance

By: Tyler Thepsiri
November 15, 2022

If your organization relies on business with the Department of Defense (DoD), you may need to ensure that your IT infrastructure can pass a third-party assessment for cybersecurity readiness soon as part of the requirements for CMMC 2.0 compliance.

Back to Top