FOR IMMEDIATE RELEASE May 31st, 2022 ISG Tech Maintains Efective Security Controls According to Recent SOC 2 Report Today, ISG Tech announced that the company has undergone a System and Organization Controls (SOC) 2 examination resulting in a CPA’s report stating that management of ISG Tech maintained effective controls over the security, availability, processing integrity, […]
About ISG Tech
ISG technology helps organizations unlock possibilities so they can realize their full business potential. They do it by providing a unique combination of managed IT services, technology consulting, professional services and cloud/data center solutions.
Part of the Twin Valley Family of Companies and a fourth-generation family business, ISG Technology has grown and evolved into the recognized leader in the area by aligning its success with the long-term success of its clients. They were recently recognized on CRN's Tech Elite 150 for excellence in managed IT services.
The company is headquartered in Overland Park, Kansas, with seven additional locations across the Midwest, as well as a regional network of data centers. ISG services clients throughout the region, nationally and internationally.
Entries by ISG Tech
The White House has warned about the potential for Russia to engage in malicious cyber activity against the United States in response to the unprecedented economic sanctions we have imposed. To prepare, we recommend all organizations implement the following cybersecurity practices as soon as possible. Improve Network Monitoring at Your Perimeter Ensure you have visibility […]
Cyber insurance is a must-have weapon for all organizations trying to mitigate modern security threats. But the exponential increase in ransomware has created an industry chain reaction – Insurance providers are leaving the market, premiums are on the rise, more security controls are being required, and organizations are left scrambling. Prepare For The War On […]
Google Chrome Zero-Day Exploit This Forbes article has all the up to date information on the zero-day vulnerability. Earlier this month Google issued a warning on its official blog, revealing a new zero-day flaw on Windows, macOS, and Linux. Google is currently restricting information about the exploit to try and buy time for users to […]
Overland Park, KS, March 8, 2022 — ISG Technology, today announced that CRN®, a brand of The Channel Company, will feature ISGTechnology on its 2022 Tech Elite 250 list. This list recognizes solution providers across the U.S. and Canada that have earned the highest level of technical certifications from leading technology suppliers such as Hewlett […]
Overland Park, KS, February 14, 2022 — ISG Technology, announced today that CRN®, a brand of The Channel Company, has named ISG Technology to its Managed Service Provider (MSP) 500 list in the Security category for 2022. CRN’s annual MSP 500 list identifies the leading service providers in North America whose forward-thinking approaches to managed […]
For immediate release WICHITA, Kan. (January 7, 2022) — In its commitment to lift up Kansas’ powerhouse technology industry, FlagshipKansas.Tech has appointed three new members and a slate of new officers to its board of directors. Among the new board members is Megan Harper, manager of marketing and sales for Twin Valley and SKT, the […]
12 Days of Cybersecurity The holidays are a time for celebration and spending time with family and friends. But they can also be a time when your cybersecurity is put to the test. During the holiday season, small and medium-sized businesses are often a target for cybercriminals, as they may be less likely to have […]
The onset of the Covid-19 pandemic meant a rapid shift to remote-based work environments for many organizations worldwide. However, while the explosion of remote work accelerated many companies’ digital transformation, it also brought new cybersecurity risks and threats. Luckily, with the help of tools like Virtual Private Networks (VPNs), businesses can keep their data secure […]
Effective workplace security is becoming more and more critical. With news of increased ransomware attacks dominating headlines, the threat couldn’t be clearer. The majority of the most devastating hacks in recent memory couldn’t have happened without negligent or ill-informed employees. The two most common attack methods used by ransomware bad actors are phishing attacks and […]