<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Information technology blog, cybersecurity blog

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

Cybersecurity | Compliance

By: Tyler Thepsiri
April 25, 2024

As a business leader you have a lot on your plate. If you are an organization that works with the government, you most likely are aware that you are required to meet standards and guidelines to ensure that data and records are protected.

Blog Feature

Cybersecurity | Compliance

By: Tyler Thepsiri
April 11, 2024

If you are a company that works with the government you are familiar with the rules and regulations that surround information labelled as sensitive, top secret or classified. You most likely know about the National Institute of Standards and Technology (NIST) Special Publication 800-171 and Cybersecurity Maturity Model Certification (CMMC).

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity

By: Tyler Thepsiri
April 11, 2024

Cyberattacks continue to be a growing threat for small businesses. According to estimates from Statista's Cybersecurity Outlook, the global cost of cybercrime is expected to surge in the next five years, rising from $8.44 trillion in 2022 to $23.84 trillion by 2027.

Blog Feature

Cybersecurity | Compliance

By: Tyler Thepsiri
April 05, 2024

Although NIST 800-171 has been around for several years, many business leaders still aren’t certain whether they are doing the right things to be compliant.

Blog Feature

Cybersecurity | IT Support

By: Tyler Thepsiri
April 04, 2024

If you are considering implementing multi-factor authentication (MFA), you may be hesitant to move forward because you’ve heard bad reviews from other users. Many of these bad reviews are myths or inaccuracies.

Blog Feature

Cybersecurity | Information Security

By: Patrick Martin
March 27, 2024

If you manage or own an auto dealership, you understand the need for data security. In addition to safeguarding your own sensitive information and that of your customers, there are regulatory obligations such as the Federal Trade Commission’s (FTC’s) Safeguards Rule to consider as well.

Blog Feature

Cybersecurity | Compliance

By: Tyler Thepsiri
March 19, 2024

Although NIST 800-171 has been around for several years, many business leaders still aren’t certain whether they are doing the right things to be compliant. One of the areas of confusion is what to expect from a NIST 800-171 Gap Analysis.

Blog Feature

Cybersecurity | Compliance | NIST

By: Karen Cohen
March 09, 2024

If your organization works with the government as a contractor, subcontractor, or supplier, you are likely familiar with the rules and regulations regarding information labeled secret, top secret, or classified.

Back to Top