Author Archives: ISG Tech

Service Update

Recently, ISG Technology became aware of an IT security incident involving unauthorized access to our[...]

What’s the Difference between Co-Managed and Managed IT?

When it comes to managed IT services, there are two main options: co-managed and managed.[...]

The Benefits of Co-Managed IT Service for Healthcare Providers

Fast network speeds and a quality cybersecurity plan are probably not the first things that[...]

How to Become HIPAA Compliant

How to Become HIPAA Compliant HIPAA compliance is of utmost importance for any business that[...]

ISG Tech Maintains Effective Security Controls According to Recent SOC 2 Report

FOR IMMEDIATE RELEASE May 31st, 2022 ISG Tech Maintains Efective Security Controls According to Recent[...]

Recommendations for Mitigating Cyber Risks During Russia/Ukraine Conflict

The White House has warned about the potential for Russia to engage in malicious cyber[...]

Webinar: Cyber Insurance. And The War On Ransomware.

Cyber insurance is a must-have weapon for all organizations trying to mitigate modern security threats.[...]

How to create and document a backup policy

It’s important for all businesses, regardless of size or industry, to establish a strategy for data[...]

Your business really needs a disaster recovery plan—here’s why

According to FEMA, 40-60% of small businesses affected by disasters will never reopen their doors.[...]

Google Chrome Zero-Day Vulnerability Affects Billions, Here Is How To Fix It

Google Chrome Zero-Day Exploit This Forbes article has all the up to date information on[...]