Author Archives: ISG Tech

Code Grey: The Evolving Threat Landscape of Healthcare IT

In our recent webinar, we discussed the evolving threat landscape of healthcare IT. Healthcare might[...]

GLBA Compliance

The tech world is full of rules and regulations and the long acronyms that go[...]

Critical Fortinet Remote Authentication Bypass Vulnerability [CVE-2022-40684] – What it is & What to Action to Take

About CVE-2022-40684 On October 6, 2022, Fortinet disclosed a critical remote authentication bypass vulnerability impacting[...]

The quick-start cybersecurity handbook

When leadership teams talk IT concerns, cybersecurity is a consistent topic. Few things will give a CIO[...]

The First 48 When Ransomware Strikes

The content of this blog post comes from our webinar that you can watch here.[...]

Cyber Insurance. And The War on Ransomware.

The content of this blog post is based on our recent webinar that you can[...]

How Co-Managed IT Services Improve Your Patients’ Experience

Maximizing patient experience is one of the top priorities of healthcare businesses. In fact, it’s[...]

Business VPN: What are your options?

How and why businesses use VPN is a fascinating topic. If you know what VPN[...]

Business continuity: a crash course

We usually aren’t given much notice before a disaster strikes. Even with a little forewarning,[...]

Managed cybersecurity: The only way to stay ahead of the threat landscape

Cybersecurity is a concern for any modern business, no matter the size of the organization.[...]