Kelser Blog, Media, and News
All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.
Cybersecurity | In the Media | Information Security
By:
Eileen Smith
January 08, 2025
The global digital transformation has not only helped organizations grow their business, but it’s also helped cybercriminals find new ways of scamming businesses and individuals.
Cybersecurity | Business Continuity | Information Security
By:
Mira Aslanova
December 24, 2024
Cyber thieves are increasingly setting their sights on new targets within businesses: C-suite executives and other high-profile employees.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
Cybersecurity | Business Continuity | Compliance
By:
Patrick Martin
December 20, 2024
The rapidly changing automotive industry landscape will bring new considerations for dealerships of all sizes in 2025—and rising cybersecurity threats.
Cybersecurity | Compliance | Information Security
By:
Patrick Martin
December 20, 2024
The Department of Defense’s Cybersecurity Maturity Model Certification (CMMC) Program Final Rule is now live. This means that the DoD can start requiring defense contractors handling the most sensitive federal information to show compliance with the new regulations right now in order to continue doing business with the DoD.
Cybersecurity | Compliance | NIST
By:
Eileen Smith
December 06, 2024
With only about a week to go before the Cybersecurity Maturity Model Certification (CMMC) is set to go into effect on December 16, if you’re among the businesses that haven’t started preparing for CMMC certification, you don’t have any more time to delay.
Cybersecurity | Compliance | IT Support
By:
Eileen Smith
November 20, 2024
Do you know what steps to take if your business is hacked? Have you developed a comprehensive incident response plan should your business get hit by a cybersecurity attack? Why do businesses need an incident response plan? How can an incident response plan improve your business cybersecurity?
By:
Randi Schaeffer
November 06, 2024
What’s the difference between a security key and a passkey? How do security keys and passkeys safeguard your businesses IT systems? Why are using a security key or passkey the safest multi-factor authentication (MFA) methods?
Cybersecurity | Compliance | IT Support | NIST
By:
Patrick Martin
November 05, 2024
Now that the much-anticipated final rule establishing the U.S. Department of Defense (DoD) Cybersecurity Maturity Model Certification (CMMC) Program has cleared its last regulatory hurdle, you may have more questions than answers.