<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

By not complying with the requirements laid out in NIST SP 800-171, your government contracts may be at risk. Even though the deadline for compliance was 12/31/17, it’s not too late to protect your business. Get started here

NIST Compliance - Are You Overdue? 00 : 00 : 00 : 00

Information technology blog, cybersecurity blog

Kelser Blog

The Kelser Blog covers technology and business topics such as Cybersecurity, IT Lifecycle Management, Modern Data Center, Workforce Enablement, and more.

Blog Feature

Cybersecurity

The Definition of Cybersecurity Training for Employees [In Under 100 Words]

By: Kelser
September 26th, 2018

Employees are the most critical component of your organization’s cybersecurity. Mistakes made by employees cause anywhere between 25%-40% of data breaches. 

Read More

Share

Blog Feature

Cybersecurity | Managed Services

The Definition of Managed Security Services (MSS) [In Under 100 Words]

By: Kelser
September 18th, 2018

Managed security services are network security services that have been outsourced to a service provider. This provider will administer outsourced monitoring and management of security devices and systems.

Read More

Share

Cybersecurity eBook Cover Image

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | Managed Services

The Definition of a Managed Security Service Provider (MSSP) [In Under 100 Words]

By: Kelser
September 5th, 2018

What Does a Managed Security Service Provider do? A managed security service provider (MSSP) provides outsourced monitoring and management of security devices and systems.

Read More

Share

Blog Feature

IT Lifecycle Management | Cybersecurity | Managed Services

IT Asset Lifecycle Management — What is the Optimal Refresh Cycle?

By: Kelser
August 29th, 2018

IT hardware, like cars, are depreciating assets. As soon as you drive them off the proverbial lot, they begin to lose value. The reason for this depreciation is twofold: the product will eventually wear down, and newer models will be released with greater specs. Keeping this in mind, how often should you refresh your IT assets? To understand the answer to this question, let’s look at the IT-asset lifecycle management. 

Read More

Share

Blog Feature

Cybersecurity | Disaster Recovery | Business Continuity

The Most Pressing Business IT Questions of the Day on Real Estate Radio

By: Matt Kozloski
August 16th, 2018

Last month, I was thrilled to be invited back to the 94.9 FM CBS Radio airwaves for another episode of Real Estate Radio (listen to my first appearance here). I actually love this radio show. It seems so random—a full hour about real estate—but the hosts Byron Lazine and Pat Kenny use real estate as a jumping off point to talk about a wide range of topics that affect quality of life and where people choose to live. This time around we focused on hot topics in the tech world including Facebook privacy and the GDPR, ransomware, and phishing following high-profile cyber attacks in Connecticut.

Read More

Share

Blog Feature

Cybersecurity | Networking

The Definition of Network Security Services [In Under 100 Words]

By: Kelser
August 15th, 2018

Network security services are designed to protect the usability and integrity of your network and data. This includes both hardware and software technologies. 

Read More

Share