<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Cybersecurity | Information Security

By: Patrick Martin
March 27, 2024

If you manage or own an auto dealership, you understand the need for data security. In addition to safeguarding your own sensitive information and that of your customers, there are regulatory obligations such as the Federal Trade Commission’s (FTC’s) Safeguards Rule to consider as well.

Blog Feature

Cybersecurity | Compliance

By: Tyler Thepsiri
March 19, 2024

Although NIST 800-171 has been around for several years, many business leaders still aren’t certain whether they are doing the right things to be compliant. One of the areas of confusion is what to expect from a NIST 800-171 Gap Analysis.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | Compliance | NIST

By: Karen Cohen
March 09, 2024

If your organization works with the government as a contractor, subcontractor, or supplier, you are likely familiar with the rules and regulations regarding information labeled secret, top secret, or classified.

Blog Feature

Cybersecurity | IT Support

By: Patrick Martin
March 08, 2024

Protecting customer data is crucial for any business. Car dealerships are no exception. This information is so important that the Federal Trade Commission (FTC) has amended its Safeguards Rule to strengthen the requirements for data security for dealerships.

Blog Feature

Cybersecurity

By: Tyler Thepsiri
March 07, 2024

If you haven’t implemented a multi-factor authentication (MFA) solution and are wondering what all the buzz is about but don’t want to dive deep into all of the technical details, this article is for you!

Blog Feature

Cybersecurity | IT Support

By: Karen Cohen
February 27, 2024

There are so many technology tools that it can be tough to keep them all straight. As a business leader or technology consumer, you don’t need to be an expert in the nitty gritty technology details, but it can be helpful to have a working knowledge and understanding of the tools you use to do your job.

Blog Feature

Cybersecurity | Compliance

By: Karen Cohen
February 23, 2024

Organizations that work with the government are accustomed to the rules and regulations regarding information labeled secret, top secret, or classified.

Blog Feature

Cybersecurity | Healthcare

By: Tyler Thepsiri
February 22, 2024

Protecting patient data and ensuring efficiency are important aspects of healthcare organizations. As these organizations increasingly rely on technology, healthcare organizations face the growing possibility that they may fall victim to cyber threats.

Back to Top