Kelser Blog, Media, and News
All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.
Cybersecurity | Compliance | IT Support
By:
Tyler Thepsiri
September 06, 2024
If you are a defense contractor, subcontractor or your organization does business with the Department of Defense (DoD), you may be aware of the proposed deadline for Q1 2025 for CMMC certification.
Cybersecurity | Compliance | IT Support
By:
Tyler Thepsiri
July 31, 2024
If you are a contractor or subcontractor working with the Department of Defense (DoD), you’re likely aware of NIST Special Publication 800-171 (NIST SP 800-171) and the importance of protecting controlled unclassified information (CUI).
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
Cybersecurity | Business Continuity | IT Support
By:
Patrick Martin
July 11, 2024
If you manage or own an auto dealership you understand how vital technology is for your business. Not only do you use technology for managing vehicle inventory, creating sales orders or financing and processing loans, but you also use technology to safeguard your own sensitive information and that of your customers.
By:
Karen Cohen
June 03, 2024
Whether you are just considering external IT support for the first time or are trying to wrap your head around the stew of acronyms associated with it, it can be confusing.
Cybersecurity | Managed Services | Compliance | IT Support | Efficiency
By:
Randi Schaeffer
May 23, 2024
When business leaders think about technology, it is often “out of sight, out of mind.” As long as their technology environment is operating smoothly, they usually don’t give much thought to their IT infrastructure.
Compliance | IT Support | NIST
By:
Tyler Thepsiri
May 21, 2024
If you work as a contractor or subcontractor to the U.S. government, you likely know that not all sensitive information is marked “secret,” “top secret,” or “classified.”
By:
Tyler Thepsiri
April 04, 2024
If you are considering implementing multi-factor authentication (MFA), you may be hesitant to move forward because you’ve heard bad reviews from other users. Many of these bad reviews are myths or inaccuracies.
By:
James Tubby
March 11, 2024
Most people have done it…you leave your personal computer (PC) running…one day leads into the next and before you know it, it has been running for several days without a break. Or, you may think you are shutting it down and not actually be doing it.