Service Update

Recently, ISG Technology became aware of an IT security incident involving unauthorized access to our environment. Upon discovery, we immediately initiated ISG Technology’s comprehensive incident response plan and engaged industry-leading cybersecurity specialists to help secure our systems, investigate the incident and further enhance security protocols.

Our priority is the security of our systems, and the safety of our customer’s data and operations. As part of our response plan, and out of an abundance of caution, we have disabled access to some services to ensure a safe, secure and protected environment for all customers.

This will impact some of the services we provide to our customers, including:

  • Veeam Backups and Replication – Offsite backups and restoration. Some monitoring and notifications will be impacted.
  • Enterprise Cloud virtual server hosting – Access to vCloud management console may be limited; as well as the ability to add, move or change the virtually hosted environment.
  • Access to the ticketing and portal system – Proactive external alerts will not be available

We are working to bring those systems back online as quickly and securely as possible to minimize the impact on customers.

We apologize for any inconvenience this may have caused, and will provide up-to-date information here as it becomes available. If you have questions, please contact our Service Desk at: servicedesk@isgtech.com or 866.915.1197.

UPDATE AUGUST 18, 12:00 P.M.

At this time, primary customer services are online. Some systems may be experiencing delays as they automate through backlogs, but services are functioning.

If you are continuing to experience system disruption or are unable to access services, please contact our Service Desk at: servicedesk@isgtech.com or 866.915.1197.

UPDATE AUGUST 15, 8:00 A.M.

Significant progress has been made on all ISG systems, and we intend to have most services restored this week. Please note the following about these services:

Veeam Backups & Replication – Starting Monday 8/15, some customers will experience successful backups as this system is brought back online. We will be in touch with customers as this occurs to ensure services are back to standard operations, including daily monitoring and remediation for managed customers.

Enterprise Cloud virtual server hosting – We intend to have vCloud management online this week, as well as access to the ticketing and portal system. Should you need any assistance with server management prior to vCloud access being restore, please reach out to the service desk.

Access to the ticketing and portal system – We intend to restore access to our ticketing portal and resume standard ticketing processes this week. Until further notice, please continue to contact our Service Desk at: servicedesk@isgtech.com or 866.915.1197.

We’d like to thank all of our customers for their patience through this experience. All of the work to date has been to ensure that environments have been secured before being restored.

With our cybersecurity partner, we have been thorough in examining the network and servers. According to our investigation, the unauthorized access was caught and removed before any customer data was lost, and all service interruption has been due to our proactive security approach.

As we proceed through this, we are making changes to improve customer experience and to enhance security protocols. If you experience any issues, please contact our Service Desk at: servicedesk@isgtech.com or 866.915.1197.

UPDATE AUGUST 10, 12:00 P.M.

ISG Engineering teams are continuing to work to ensure that impacted systems are secured and fully functional when brought back online and are taking additional time to further enhance security protocols. We will provide an updated estimate for restoration when the timeline is confirmed.

ISG Engineering teams are continuing to work to ensure that impacted systems are secured and fully functional when brought back online and are taking additional time to further enhance security protocols. We will provide an updated estimate for restoration when the timeline is confirmed.

For customers with managed backup systems, backups are being successfully stored locally but remote storage is not yet available.

UPDATE AUGUST 7, 9:00 P.M.

ISG Engineering teams have been working through the weekend and made significant progress to review and secure systems.

Veeam backups and replication, enterprise cloud virtual server hosting and access to the ticketing and portal system remain impacted. They are expected to have limited functionality for at least another 48 hours as we further enhance security protocols. No other services are expected to be affected at this time.

Thank you for your patience. If you experience any issues, please contact our Service Desk at: servicedesk@isgtech.com or 866.915.1197.

UPDATE AUGUST 5, 9:00 P.M.

In an exercise of caution as previously stated in the note above, we briefly restricted data center access around 7:00 p.m. this evening. We have addressed the situation, and brought services back to their previous state. We apologize for any inconvenience or disruption this may have caused. Our investigation into the situation continues. We will continue to update this post as we have information to share.

What’s the Difference between Co-Managed and Managed IT?

When it comes to managed IT services, there are two main options: co-managed and managed. So what’s the difference? In this blog post, we will discuss the advantages and disadvantages of both options, so you can make an informed decision about which type of service is best for your business.

What is Co-Managed IT?

Co-managed IT is a type of service where the client and IT service provider share responsibility for the management of the IT infrastructure. This can include tasks such as monitoring, patching, and incident response. 

These services are often used by businesses that have in-house IT staff, but lack the expertise or resources to effectively manage their IT infrastructure.

Advantages of Co-Managed IT

There are several advantages to this type of service:

  • Co-managed IT services can be customized to fit the needs of the client.
  • Co-managed IT services can be less expensive than managed IT services, since the client is sharing the cost of the service with the provider.
  • Co-managed IT services can provide a higher level of support than in-house IT staff, since the provider has more expertise and resources.

Disadvantages of Co-Managed IT

There are some disadvantages to co-managed services:

  • The client may have to share confidential information with the provider.
  • The provider may not be available 24 hours a day, which can be a problem if there is an issue with the IT infrastructure outside of normal business hours.

What is Managed IT?

Managed IT is a type of service where the IT service provider takes full responsibility for the management of the client’s IT infrastructure. Managed IT services are utilized by businesses that do not have any kind of professional IT systems in place.

Advantages of Managed IT

There are several advantages to managed IT services:

  • Managed IT services can provide a higher level of support than in-house IT staff, since the provider has more expertise and resources.
  • Managed IT services can be available 24 hours a day, which can be helpful if there is an issue with the IT infrastructure outside of normal business hours.
  • Managed IT services can take care of all the details of managing the IT infrastructure, so the client can focus on their business.

Disadvantages of Managed IT

There are some disadvantages to managed IT services:

  • Managed IT services can be more expensive than co-managed services, since the client is not sharing the cost of the service with the provider.
  • The provider may have to share confidential information with other clients.
  • The client may not have as much control over their IT infrastructure as they would with co-managed services.

Looking for Co-managed or Managed IT Services?

Both co-managed and managed IT services have their advantages and disadvantages. The best option for your business will depend on your needs and budget. If you need a high level of support but want to save money, co-managed IT services may be the best option.

Do you have any questions about co-managed or managed IT services? Reach out to ISG Technology today to learn more about the right options for your business.

The Benefits of Co-Managed IT Service for Healthcare Providers

Fast network speeds and a quality cybersecurity plan are probably not the first things that come to mind when you think about technology for healthcare. But these tools can be just as important as medical supplies when it comes to providing quality patient care.

That’s where co-managed IT services come in. By outsourcing your organization’s IT needs to a team of experts, you can focus on your core mission while a managed service provider takes care of the rest.

Why Does Your Organization Need Customized Healthcare IT Services?

There’s a lot that goes into keeping a healthcare facility up and running, from maintaining compliance with regulations to ensuring secure data storage. Here are some of the IT services that are essential for healthcare providers:

Cybersecurity: In the age of digital medical records, protecting patient data is more important than ever. A managed service provider can help you implement the latest cybersecurity tools and best practices to keep your data safe.

Network Management: Healthcare providers need fast, reliable network connections to access patient records, schedule appointments, and more. Managed IT services will redesign your network for maximum speed and efficiency.

Compliance: Healthcare organizations must comply with a variety of regulations, from HIPAA to the HITECH Act. Working with a managed service provider will help you stay up-to-date on the latest compliance requirements and ensure that your systems are compliant.

Data Storage: Healthcare providers generate a lot of data, from medical records to X-rays. A managed service provider can help you store this data securely and ensure that it is accessible when you need it.

Managed IT services can provide your healthcare organization with a wide range of benefits, from improved network speeds to secure data storage. By outsourcing your IT needs to a team of experts, you can focus on providing quality patient care instead of putting out IT fires. 

What Specialized IT Services Are Available for Healthcare?

As the world becomes increasingly digital, healthcare providers are finding that they need to upgrade their IT systems in order to keep up. While many organizations are turning to managed IT services to get the help they need, not all providers offer specialized services tailored specifically for healthcare providers.

A proactive managed IT provider for healthcare will offer:

  • Electronic health records (EHR)
  • Telemedicine
  • Revenue cycle management (RCM) software
  • Practice management software
  • EHR/EMR handling and processes
  • Support for medical interface problems

These days, it’s not enough to simply have an IT department. In order to keep up with the rapidly changing world of healthcare technology, you need a team of dedicated IT professionals who are up-to-date on the latest trends and developments.

What Are the Benefits of Specialized IT Services for Healthcare?

When a managed service provider creates a curated strategy just for you, you’re sure to see a return on your investment. Here are just a few of the benefits of having specialized IT services for healthcare:

  • Improved patient care: When you outsource your IT, you can focus on your core mission of providing quality patient care.
  • Increased efficiency: A managed service provider can help you streamline your processes and make better use of your time.
  • Compliance: Stay up to date on the latest compliance requirements with an IT technician who specializes in healthcare compliance.
  • Improved security: By outsourcing your IT, you can benefit from the latest cybersecurity tools and best practices.
  • Lower costs: With fixed-cost pricing, you can save money on infrastructure costs and avoid the need to hire additional staff.

A managed service provider can help you make the most of your time and resources so that you can focus on providing quality patient care. When you partner with an MSP, you can be confident that your IT needs are in good hands.

Avoid Costly IT Challenges with ISG Technology

When it comes to technology, healthcare is changing fast. In order to keep up with the latest trends and developments, you need a team of dedicated IT professionals who are up-to-date on the latest trends and developments.

At ISG Technology, we understand the unique challenges that healthcare organizations face. We’ve worked with hundreds of healthcare providers, from large hospitals to small specialty clinics and everything in between. We help take the IT burden off healthcare providers’ shoulders.

With our help, you can focus on providing quality patient care while we take care of your IT needs. Contact us today to learn more about our healthcare IT services.

How to Become HIPAA Compliant

How to Become HIPAA Compliant

HIPAA compliance is of utmost importance for any business that handles private health information (PHI). If you are not currently HIPAA compliant or are unsure of what steps to take to become compliant, this blog post is for you! We’ll discuss what HIPAA is, why compliance is important, and two different ways to go about becoming HIPAA compliant.

What is HIPAA?

HIPAA stands for Health Insurance Portability and Accountability Act, which began in 1996. This legislation protects sensitive health information by regulating security and data privacy measures.

Because of the increase in healthcare data breaches caused by ransomware assaults and cyber attacks, the need for compliance with HIPAA has become more drastically clear in recent years. Healthcare organizations must be familiar with and fully comply with each HIPAA rule to fully protect patient data and avoid fines and actions that put PHI at risk.

Why is HIPAA Important?

HIPAA compliance is important because it protects patients’ information and privacy. When patient data is breached, it affects not only the patients, but also the healthcare organization’s reputation. In some cases, patients may lose trust in the organization and seek treatment elsewhere.

There are also financial implications—if a healthcare organization is fined for non-compliance, total financial damages can number in the millions of dollars. The financial implications that can come from non-compliance with HIPAA are hefty, and with cyber criminals targeting healthcare as a vulnerable industry, it’s well worth it to take action to fully comply with HIPAA’s cybersecurity requirements.

How to Comply With HIPAA

It’s critical to understand how to comply with HIPAA regulations if you run a medical practice or have access to sensitive health-related data. The do-it-yourself approach and working with an experienced HIPAA consultant are the two most common methods for ensuring that you are completely compliant.

Do It Yourself

If you want to achieve HIPAA compliance on your own, you’ll need to be familiar with each of the six HIPAA Rules plus the HITECH Act, and their full list of standards. (This is a summary of just one of those rules, the HIPAA Security Rule.) Keep the following checklists and tools handy to ensure that you satisfy all criteria:

  • HIPAA Self-Assessment Checklist: This is a useful tool that has a complete list of HIPAA criteria and lets you tick things off as you’ve completed them. You should continue to utilize this checklist as a reference every time you check or update your compliance status.
  • Risk Assessment Tools: Risk assessment tools can help you find security flaws in your company’s security that could result in noncompliance. The National Coordinator for Health Information Technology’s risk assessment tool might assist you in determining where risks may apply to your company.
  • HIPAA Security Rule Toolkit: This NIST toolkit helps you comply with the Security Rule over time, and it’s especially useful for companies that have recently restructured their IT systems.

If you’re going to do the do-it-yourself route, make sure you have all the tools you’ll need to fully comply with HIPAA regulations. Even if you do have dedicated IT support staff, keeping all of your company’s systems up to speed may be difficult.

Work with a HIPAA Compliance Expert

If you want to ensure that you are compliant with HIPAA, working with an IT provider that’s experienced with helping organizations become HIPAA compliant is the best option. Your provider will be able to help you put all of the necessary safeguards in place and make sure that your systems are secure with minimal time and effort needed from you. 

The experience, tools, and knowledge that a healthcare-focused MSP has can help your company achieve HIPAA compliance. Your provider should be well-versed in HIPAA rules and regulations, as well as the technology required to keep your IT department functioning optimally and securely.

Get Help with Your HIPAA Compliance

HIPAA compliance can be daunting, but it’s important to ensure the privacy of your patients’ data and the continued success of your organization. ISG Technology is here to help you with all of your HIPAA compliance needs. We have a team of experts that will work with you to make sure that your systems are secure, compliant, and optimized for your organization’s needs. Contact us today to learn more about how we can help you!

Recommendations for Mitigating Cyber Risks During Russia/Ukraine Conflict

The White House has warned about the potential for Russia to engage in malicious cyber activity against the United States in response to the unprecedented economic sanctions we have imposed. To prepare, we recommend all organizations implement the following cybersecurity practices as soon as possible.

Improve Network Monitoring at Your Perimeter

Ensure you have visibility for incoming and outgoing traffic with appropriate safeguards.

  • Monitor and consider blocking high-risk outbound network traffic:
    • SSH (TCP 22)
    • MSRPC (TCP 135)
    • SMB (TCP 139, 445)
    • Unsecured LDAP (TCP 389)
    • Secured LDAP (TCP 636)
    • MSSQL (TCP 1433)
    • RDP (TCP/UDP 3389)
    • WinRM (TCP 5985, 5986)
  • Review your WAF configuration and set to blocking mode to mitigate zero-day attacks.
  • Log, correlate, and review events. Focus on threat intelligence, lower alerting thresholds if possible, and be aware of risk patterns associated with Russian actor tactics, techniques, and procedures (TTPs).

Create Contingency Plans to Disconnect High Risk External Connections

Preparedness, control, and proactiveness are key in a successful defense.

  • Inventory any unfiltered VPNs and other vendor/contractor connections. Make sure you have monitoring in place and understand access risks.
  • Limit traffic destinations for high-risk protocols wherever possible (see column to the left).
  • Watch for collateral damage and propagation via automation. NotPetya showed us that poorly monitored and unpatched interconnected systems provide reliable attack surfaces.
  • Perform tabletop exercises to ensure readiness during any disruptive event and at least annually. Ensure all your key resources have current contact information and can support business continuity on short notice.
  • Validate your backup and recovery processes.

Bolster Your Security Awareness Program

Educating end users will lower your risk from malware and social attack vectors.

  • Implement or execute a simulated phishing campaign. These attacks are usually carried out via email but now are frequently delivered via SMS, phone calls, and social
  • media. Ensure your employees are vigilant.
  • Reassess your password standard. Encourage pass phrases and strong passwords: easy to remember, hard to guess. Use a secure password manager to reduce call
  • center events due to users who use complex, hard-to-guess passwords.
  • Implement MFA on any external ingress points. Consider expanding scope to those that don’t store or transmit sensitive information. If they pose a risk by being able to pivot to other systems if compromised, assume the worst.
  • Timely and effective communication is paramount. Consider the human factor: most people are scared during conflicts. You’ll receive the best outcome by keeping your communications simple, actionable, and direct while delivering with calmness.

Improve Your Rigor Around Patching and Update Consistently

Poorly monitored, unpatched assets create additional risk.

  • Ensure your assets are patched and up to date (computer systems, mobile devices, applications, etc.). Automatic updates are strongly encouraged.
  • Ensure your endpoint detection and response agents are active, receiving threat intelligence feeds, and set to protect/block risks.
  • Enable an allow-listing policy on your EDR solution (which files can execute). Recent attacks have showed Russian actors have misused legitimate drivers from trusted vendors, such as EaseUS (Partition Master), to weaponize wiper attacks and in some cases bypass poorly configured or mismanaged EDR/MDR.
  • Look for behavioral evidence or network and host-based artifacts from known Russian state-sponsored TTPs. Table 1 from CISA’s Alert (AA22-011A) lists commonly observed TTPs.

Webinar: Cyber Insurance. And The War On Ransomware.

Cyber insurance is a must-have weapon for all organizations trying to mitigate modern security threats. But the exponential increase in ransomware has created an industry chain reaction – Insurance providers are leaving the market, premiums are on the rise, more security controls are being required, and organizations are left scrambling.

Prepare For The War On Ransomware

In this executive panel discussion, you’ll get actionable advice directly from an industry-leading cyber insurance provider as well as the technology/solution providers actively fighting the war on ransomware. View the full webinar here

What You’ll Learn:

  • The rise of ransomware and industry chain reaction
  • The role of cyber insurance in incident response plans
  • Evaluating your current policy (Good? Bad? Or Ugly?)
  • The increasing controls insurance providers are requiring
  • How business and IT leaders must partner together

Google Chrome Zero-Day Vulnerability Affects Billions, Here Is How To Fix It

Google Chrome Zero-Day Exploit

This Forbes article has all the up to date information on the zero-day vulnerability.

Earlier this month Google issued a warning on its official blog, revealing a new zero-day flaw on Windows, macOS, and Linux. Google is currently restricting information about the exploit to try and buy time for users to update their browser.

What makes this vulnerability more dangerous than others is that the number of users this can affect and it’s a zero-day flaw, meaning, the vulnerability is known to the threat actors before Google could fix it which makes every Chrome user vulnerable.

What You Can Do

Google has released an emergency update for Chrome and Edge to patch the vulnerability. Follow these steps to update your browser ASAP.

For Google Chrome:

  1. Open a Chrome browser and click the 3 dots in the upper right corner
  2. Click “Help”
  3. Click “About Chrome” this will open a new page and the update Version 99.0.4844.84 should begin automatically
  4. Once the update is complete click “refresh browser”

For Microsoft Edge:

  1. Open an Edge browser and click the 3 dots in the upper right corner
  2. Click “Help and Feedback”
  3. Click “About edge” this will open a new page and the update Version 99.0.1150.55 should begin automatically
  4. Once the update is complete restart your browser

ISG Technology Recognized on CRN’s 2022 Tech Elite 250 List

Overland Park, KS, March 8, 2022 — ISG Technology, today announced that CRN®, a brand of The Channel Company, will feature ISGTechnology on its 2022 Tech Elite 250 list. This list recognizes solution providers across the U.S. and Canada that have earned the highest level of technical certifications from leading technology suppliers such as Hewlett Packard Enterprise, Dell Technologies, Cisco and more. Companies chosen for the Tech Elite 250 list have distinguished themselves as dedicated and passionate solution providers willing to go above and beyond for their customers by ensuring they have the training and technical know-how necessary to provide expert-level service.

These solution providers know their customers depend on their training and expertise to help them overcome today’s IT challenges and achieve full digital transformation across the enterprise. In order to provide that expert service and care, solution providers must maintain consistently high levels of training and certification from IT vendors and achieve the highest tiers within those vendors’ partner programs.

“We continue to see increasing demand for our managed services, especially our managed security offering.” “Unfortunately, too many companies are experiencing breaches and then getting ahold of us to remediate the situation. It’s keeping our incident response team busy, but we’d prefer to help companies get proactive with their cybersecurity efforts and their overall IT operations.”

Jon Bierman, COO of ISG Technology

“CRN’s annual Tech Elite 250 list recognizes solution providers that have earned top-level certifications from key technology suppliers and proven their ability to consistently meet the high standards of their customers and partners, Solution providers featured on this list have maintained a consistent focus on innovation and have built a comprehensive understanding of the ever-evolving technologies and practices that enable ongoing success in the IT channel. We’re proud to honor them in this manner.”

Blaine Raddon, CEO of The Channel Company

Coverage of the Tech Elite 250 will be featured in the April issue of CRN Magazine and online at www.CRN.com/techelite250.

About ISG Technology

ISG Technology helps organizations unlock possibilities so they can realize their full business potential. They do it by providing a unique combination of managed IT services, technology consulting, professional services, and cloud/data center solutions.

Part of the Twin Valley Family of Companies and a fourth-generation family business, ISG Technology has grown and evolved into the recognized leader in the Midwest by aligning its success with the long-term success of its clients. They are consistently recognized in CRN’s Top IT Providers in the nation, most recently as part of the Tech Elite 150 for excellence in managed IT services.

ISG is headquartered in Overland Park, KS, with 8 locations across the Midwest including a regional network of SOC II Certified data centers. For more information please contact Scott Strickler, Director of Marketing, ISG Technology, 913-826-6058.

About The Channel Company

The Channel Company enables breakthrough IT channel performance with our dominant media, engaging events, expert consulting and education, and innovative marketing services and platforms. As the channel catalyst, we connect and empower technology suppliers, solution providers and end users. Backed by more than 30 years of unequalled channel experience, we draw from our deep knowledge to envision innovative new solutions for ever-evolving challenges in the technology marketplace. www.thechannelco.com

© 2022 The Channel Company LLC. CRN is a registered trademark of The Channel Company, LLC. All rights reserved.

The Channel Company Contact:

Jennifer Hogan

The Channel Company

jhogan@thechannelcompany.com

ISG Technology Recognized on CRN’s 2022 MSP 500 List

Overland Park, KS, February 14, 2022 — ISG Technology, announced today that CRN®, a brand of The Channel Company, has named ISG Technology to its Managed Service Provider (MSP) 500 list in the Security category for 2022. CRN’s annual MSP 500 list identifies the leading service providers in North America whose forward-thinking approaches to managed services are changing the landscape of the IT channel, helping end users increase efficiency and simplify IT solutions, while maximizing their return on investment.

With many customers still recovering from the impact of the ongoing pandemic, MSPs have become a vital part of the success of businesses worldwide. MSPs not only empower organizations to leverage intricate technologies but also help them keep a strict focus on their core business goals without straining their budgets.

The annual MSP 500 list is divided into three sections: the MSP Pioneer 250, recognizing companies with business models weighted toward managed services and largely focused on the SMB market; the MSP Elite 150, recognizing large, data center-focused MSPs with a strong mix of on- and off-premises services; and the Managed Security 100, recognizing MSPs focused primarily on off-premises and cloud-based security services.

ISG Technology continues to be a fixture in this group of IT solution providers serving clients in the Midwest and across the nation with its IT ConsultingProfessional ServicesManaged Services, and its SOC2 audited data centers. The company was also recognized on CRN’s 2021 MSP 500 list last year in the Elite 150 category for their excellence in providing managed services to the mid-market.

“We continue to see increasing demand for our managed services, especially our managed security offering.” “Unfortunately, too many companies are experiencing breaches and then getting ahold of us to remediate the situation. It’s keeping our incident response team busy, but we’d prefer to help companies get proactive with their cybersecurity efforts and their overall IT operations.”

Jon Bierman, COO of ISG Technology

“In addition to having to adjust their own business operations to account for the changed conditions during the pandemic, MSPs have also seen increased demand for their managed communications, collaboration and security services.” “The solution providers on our 2022 MSP 500 list deserve credit for their innovative and game-changing approaches to managed services in these unpredictable times, as well as their ability to optimize operational efficiencies and systems without straining IT budgets.”

Blaine Raddon, CEO of The Channel Company

The MSP 500 list will be featured in the February 2022 issue of CRN and online at www.crn.com/msp500.

About ISG Technology

ISG Technology helps organizations unlock possibilities so they can realize their full business potential. They do it by providing a unique combination of managed IT services, technology consulting, professional services, and cloud/data center solutions.

Part of the Twin Valley Family of Companies and a fourth-generation family business, ISG Technology has grown and evolved into the recognized leader in the Midwest by aligning its success with the long-term success of its clients. They are consistently recognized in CRN’s Top IT Providers in the nation, most recently as part of the Tech Elite 150 for excellence in managed IT services.

ISG is headquartered in Overland Park, KS, with 8 locations across the Midwest including a regional network of SOC II Certified data centers. For more information please contact Scott Strickler, Director of Marketing, ISG Technology, 913-826-6058.

About The Channel Company

The Channel Company enables breakthrough IT channel performance with our dominant media, engaging events, expert consulting and education, and innovative marketing services and platforms. As the channel catalyst, we connect and empower technology suppliers, solution providers and end users. Backed by more than 30 years of unequalled channel experience, we draw from our deep knowledge to envision innovative new solutions for ever-evolving challenges in the technology marketplace. www.thechannelco.com

© 2022 The Channel Company LLC. CRN is a registered trademark of The Channel Company, LLC. All rights reserved.

The Channel Company Contact:

Jennifer Hogan

The Channel Company

jhogan@thechannelcompany.com

Twin Valley & SKT to Help Boost Kansas Tech Industry FlagshipKansas.Tech Announces Board of Directors, Officers

For immediate release

WICHITA, Kan. (January 7, 2022) — In its commitment to lift up Kansas’ powerhouse technology industry, FlagshipKansas.Tech has appointed three new members and a slate of new officers to its board of directors. Among the new board members is Megan Harper, manager of marketing and sales for Twin Valley and SKT, the state’s largest independent broadband and communications company. She joins technology industry leaders in furthering the nonprofit’s mission to raise awareness, attract and retain technology talent, and support technology workforce training and education initiatives in the state.

“Supporting technology companies, tech innovation, and education is vital in elevating our state’s profile to attract and retain businesses and creating a next generation workforce,” Harper said. “Twin Valley and SKT have been advocating for cutting-edge communications and connectivity in rural Kansas for more than 75 years, giving individuals, businesses, and communities the tools to succeed in a digital world. Supporting FlagshipKansas.Tech’s mission is an important part of fulfilling our Pledge to create meaningful community outreach initiatives on a broader scale.”

Technology companies continue to find themselves accelerating to meet current market needs and position themselves for the future. According to CompTIA, the tech industry makes a

$10 billion impact on the Kansas economy, and FlagshipKansas.Tech looks to gain even more momentum to help propel the industry forward in 2022.

In addition to Harper, Rick Ehresman, President of Spectrum, Inc., and Scott Sproul, President and CEO of Northwest Kansas Economic Innovation Center, Inc., have also joined the FlagshipKansas.Tech board of directors. Each will serve an initial three-year term.

FlagshipKansas.Tech 2022 board officers will include:

  • Chair – Luis Rodriguez, President of Keycentrix
  • Vice-Chair – Ben Sebree, Vice President of R&D and Technology for Civic Plus
  • Treasurer – Amanda Duncan, Vice President & Chief Development Officer for Workforce Alliance of South Central Kansas
  • Secretary – Rick Ehresman, President of Spectrum, Inc.

“We, of course, love to help attract new tech companies to Kansas, but we are even more eager to champion the amazing technology companies that are already here,” said Luis Rodriguez, President of Keycentrix and FlagshipKansas.Tech Board Chair. “Our state is a place where tech companies can thrive. We will do all we can to support the growth of technology companies in Kansas.”

“The diverse experience from our new board members will enhance our commitment to amplifying Kansas as a top priority for tech companies, talent, and education,” said Ashley Scheideman, Executive Director of FlagshipKansas.Tech. “I look forward to our board members contributing their leadership gifts and ability to get the job done to help Kansas technology reach new heights in 2022,” Rodriguez added.

About FlagshipKansas.Tech

FlagshipKansas.Tech raises awareness, attracts and retains technology talent, and supports technology workforce training and education initiatives in Kansas. Those interested in learning more about FlagshipKansas.Tech’s mission, membership, and/or collaboration opportunities can contact Executive Director Ashley Scheideman at ashley@flagshipkansas.tech or (316) 469- 6800. The FlagshipKansas.Tech office is located in Suite 351 of Groover Labs, 334 N. St. Francis Avenue, Wichita.

About the Twin Valley Family of Companies

Twin Valley is a fourth-generation family business that has 75 years of experience providing cutting-edge technology and connectivity throughout the central U.S. Together with ISG Technology and SKT, Twin Valley helps customers unlock possibilities to realize their full potential by providing a unique combination of broadband, managed IT services, technology consulting, professional services, and cloud/data center solutions for both residential and business. Twin Valley and SKT are committed to providing customers and communities with the most reliable broadband network, internet options at the best value, quality hometown customer service, and meaningful community outreach initiatives. Learn more at twinvalley.net, SKTC.net, and isgtech.com.