Financial Institutions Waging War on Ransomware

The content of this blog post is based on our recent webinar that you can watch here

Cybercriminals follow where the money is. With all the money involved in financial institutions, it is no surprise they are one of the most threatened organizations. 

It is vitally important to make sure your financial institution remains secure and compliant against cyber threats and has a security response plan in place in case you do suffer an attack.

Don’t Play the Blame Game

There is no room for passing blame when getting to the bottom of a security issue or vulnerability. Blaming discourages people from coming forward and getting all the information IT security professionals need to solve the problem. The person who is attacked is the victim, and the victim should never be blamed.

The Journey: Constant Patching and Configuration

Constantly patching and configuring vulnerabilities in your network is one way to keep your institution safe from attacks. New threats come along constantly, but so do new patches and protection procedures. Staying on top of it could be what saves your institution from an attack. 

It is a constant journey—there is no destination. Simple policies can go a long way for security preparation. Security awareness training for employees on a regular basis, phishing tests, audit firewalls, vulnerability tests, and risk assessments are all simple low-costing steps to take to better prepare, educate, and protect your institution. 

What you Should Look for in a Cyber Security Partner

Whether it is data, physical assets, or personal information—it is important to define what you are trying to secure when looking for a cybersecurity partner and where that information is. It is also helpful to contact their past or current clients and see what their experience was like. 

Cloud Data, Responsibility, and Cyber Insurance 

Cloud services are incredibly helpful for business. However, moving data to the cloud is moving your data to another data center—this does not mean you are no longer responsible for it. The same compliance and checks are expected. You are still liable for the security of your data.

When it comes to the cloud, it is important to know exactly what your cloud provider’s patch strategy is and know if there have been background checks on their employees. Your cyber insurance should not be your cyber response policy. 

It is also very important to name someone in your institution responsible for security. It has to be made a key responsibility and an organizational value and have someone be in charge of it. You could hire security staff, train everyone and make everyone responsible, or get managed security services

Common Threats to the Financial Industry 

There are many cybersecurity threats to financial institutions. SQL injection, credential phishing, credit card manipulation or theft, and remote employees’ login information are some of the most prevalent threats facing the financial industry. 

Credibility and Insurance when Breached 

Having IT security, executives, and public relations professionals involved in the conversation is vitally important when it comes to a response to a crisis. Having an outline and knowledge about what should be said to the customers and consumers to keep credibility after a disaster should be part of an insurance policy. 

It is important to publicly respond correctly when something happens. Cyber insurance has to be looked at from an executive and PR perspective as well as a technical one.  

The financial industry is a massive target for cybercriminals. ISG Technology has the proper security controls and preparation for cybersecurity attacks that are essential for your institution’s protection and can be your guard against cyber criminals. Contact us today for a consultation with our experts and see how we can help keep your institution safe. 

Educators Waging War on Ransomware

The content in this blog is based on a recent webinar hosted by ISG Technology that you can watch here.

With the development and innovation of technology that we see in our world today, there are dangerous innovations being developed as well—cyber attacks. As technology becomes more and more prominent, so do cybercriminals. 

No matter what industry you are in, every business needs to be prepared and have the right cybersecurity protocols and protections in place. Even those working in education. 

Though educators do not seem like targets to cyber criminals—no industry is safe from cyber-attacks unless the right measures are put in place. Everyone is a target. 

The Explosion of Online Education Resources

If you consider the spectrum of education from kindergarten to higher education, there is an incredible amount of educational resources out there. Though students have started to return to schools after the pandemic, the expansion of online resources has not stopped. 

Ransomware has also become very prevalent in the education space. There is a lot of sensitive information involved with education. In K-12 education, one in every three devices contains some kind of sensitive data. 

How Hackers Can Get in Through and Securing IoT

Ransomware attacks are happening everywhere and from every point. There are countless points of entry to your network. 

The network that the devices in your school are connected to, or the Internet of Things (IoT), is very important to consider. It could be a point of entry for ransomware attacks that is not secure. It can feel overwhelming, but there has to be a plan put in place and effective implementation to make sure your network is secure. 

Double Extortion

If you fall victim to ransomware, hackers lock up your data and force you to pay for the encryption. What’s happening now is hackers are copying our data—and once you pay for the encryption—they threaten to expose your sensitive data unless you pay more. This is called Double Extortion.

There are a lot of malware encounters in the education space as well. 5.5 million encounters were reported just from May to June this year.  

K-12 Cyber Security Act

The CISA (Cybersecurity and Infrastructure Security Agency) is coming out with guidelines and toolkits to address and prepare for cybersecurity issues schools are facing. However, the problem is so great that schools need to go deeper. 

Higher Education Institutions Have Unique Data

In higher education, there is a lot of data and research involved – sensitive information about students and teachers. A lot of this data can be very useful for cybercriminals.

Policy and Procedure and The Consequences of not Protecting Infrastructure

When it comes to vulnerability, it is important to find a security provider that exposes you to the holes in your system. With so many threats, the policy and its process is the key. Phishing simulation software can also be very helpful to stay on guard against attacks. 

Failing to protect your infrastructure is going to bring consequences. Whether that be at the cost of time, money, or reputation. It puts your people at risk. 

Fundamentals, Visibility, and Tracking – The Keys to Success

Setting up fundamental security measures can make a huge difference in protecting your network. Measures such as an active directory, MFA, and a password protection policy. Getting these elements down will allow you to focus on the larger issues facing your organization. 

Making your IT infrastructure 100% visible to those in charge of security operations and having the ability to track and gather the metrics can dramatically change your protection and security. The two most important metrics in security operations are the time it takes to detect an issue and the time it takes to remediate (response time). 

ISG Technology has the tools and expertise to work with your organization to make sure the proper controls are in place to protect and prepare your infrastructure against cyber attacks. 

To find out more about how to protect and prepare your organization and its students against cyber threats and ransomware, contact us today.

Power of Humans

In a recent webinar, we discussed why humans are so important to the IT world. And why it’s not just a tool discussion, but a human one.

Faulty Integrations

In the cybersecurity space, expertise is slim. Because of this, people try to integrate with systems, trying to find expertise through technology.

Unfortunately, it takes one faulty piece to bring the whole chain down. This is why humans are so important to technology: without them, the technology would falter and not be able to solve why for itself. That’s where we come in by implementing procedures on how to not only prevent but prepare.

Employee Training

Employees are often the weak link to a business when it comes to cybersecurity. While experts can spot faults, non-experts can create them.

According to Verizon’s 2022 Data Breaches Investigations Report, 82% of data breaches involved a human element. This includes incidents in which employees expose information directly (for example, by misconfiguring databases) or by making a mistake that enables cyber criminals to access the organization’s systems.

Your team isn’t trained in cybersecurity which puts your organization at great risk. A plan needs to be in place because preparing for when and not if a threat is going to occur puts you in a better place to mitigate any damage. Once you have your cybersecurity plan in place it’s vital that this is communicated to your entire team. 

Preparing for Disaster

Being in the cloud isn’t enough anymore, knowing how and where you’re backing up your data is important. Veeam took up a 3-2-1 principle for your data that is gaining traction. Because there is no one solution to data protection, taking this approach ensures you’re covering your bases.

This principle allows a foundation of rules that can be flexible for your specific needs:

  • Production copy
  • Local copy
  • Off-site copy

For extra security, an additional copy can be used: an immutable copy of that data. This ensures that if any component fails, you have that data copied in multiple places to be able to recover it.

On top of that, testing that backup is vital to ensure it’s doing it’s job. It could be corrupt so regularly testing it to make sure it’s not a waste of time and your backup isn’t faulty could save you an incredible amount of data.

IT Burnout

Companies often think one person can be their cybersecurity team and often, that person has other tasks outside of monitoring data. This is a common mistake companies make: putting that security on one person instead of assembling a team.

Often, when humans look at something for too long, they start to experience burnout. In this case, the employee handling the data and staring at it day in and day out can cause slip-ups. They will start letting things through because their guard isn’t up like it was at the beginning. This is why it’s important to have fresh eyes on the data and rotate employees through different tasks, as well as taking breaks.

60% of employees in data security jobs leave their position yearly for a new one due to this burnout. It is extremely hard to replace people in these kinds of positions and the rate will have to go up when experiencing that turnover.

We Need Humans

Humans are necessary to technology because they bring expertise, problem-solving skills, and a fresh perspective. Without them, technology would falter and fail. When it comes to cybersecurity in today’s threat landscape, humans need to be a top priority and treated as such with training, fresh perspectives, and teamwork. It’s not just about the technology, but the people behind it that make it run smoothly.

ISG Technology can work with your company to ensure you have the proper technology in place to proactively protect your organization.   Give our team a call today or visit our contact us page to schedule a consultation with one of our cybersecurity experts. 

Code Grey: The Evolving Threat Landscape of Healthcare IT

In our recent webinar, we discussed the evolving threat landscape of healthcare IT. Healthcare might be one of the most confidential industries in the world, which makes it one of the most targeted by cybercriminals.

From ransomware attacks to phishing emails and insider threats, healthcare organizations must be prepared for a multitude of potential security threats.

You can view the webinar in its entirety here. 

Evolution of IT in Healthcare

Prior to the last 3 years, the transition in healthcare technology has been somewhat gradual. The covid-19 pandemic not only amplified the gaps in current patient care but also sped up innovation to find more efficient and better solutions to deliver quality care.  The need for secure healthcare technology solutions has nearly affected every aspect of patient care. 

Healthcare organizations started seeing the value in online platforms and doctors started to become more available via phone which ultimately got more patients access. However, this opened the doors for new threats: cyber attacks. This shift required them to adapt to these new security challenges.

Healthcare providers are focused on patients whereas IT is focused on the cybersecurity of protected health information(PHI) stored. This new wave of technological importance meant there was a lot more training to be done in healthcare, the kind of training that IT support was responsible for.

Understandably so, the healthcare industry is fearful of ransomware. This is because they carry a high risk of experiencing it due to a recent survey where it was reported by HIPPA Journal that 66% of surveyed healthcare organizations said they had experienced a ransomware attack in 2021, up from 34% in 2020 and the volume of attacks increased by 69%, which was the highest of all industry sectors. Healthcare had the second-highest increase (59%) in the impact of ransomware attacks.

Additionally, they carry highly sensitive information including

  • Personal Health Information(PHI)
  • Financial data
  • Intellectual property

The healthcare sector is at such a high risk for cyber threats that now in order to get more advanced protective cybersecurity, prices have skyrocketed creating new challenges for smaller healthcare providers. 

Cybersecurity Threats and Ransomware Prevention

The ever-increasing cybersecurity threats are more prevalent than ever and the importance of knowing how to prevent them is insurmountable. 

According to HIPPA Journal, In 2018, healthcare data breaches of 500 or more records were being reported at a rate of around 1 per day. Fast forward 4 years and the rate has doubled. In 2021, an average of 1.95 healthcare data breaches of 500 or more records were reported each day. Healthcare organizations are targeted due to their high propensity of paying the ransom, the value of patient records, and the inadequate security measures they often have in place.

It is essential for healthcare organizations to have multiple security measures implemented. The following is a list of steps you can take to protect your data.

Multi-Factor Authentication

MFA solutions provide an additional layer of security and are a user-friendly and cost-effective solution for boosting your healthcare organization’s cyber hygiene.  MFA adds a second layer of security through the use of biometric technology, such as facial or voice recognition, or via an authorization code being sent to a user’s device.  As the threat landscape continues to grow, most cyber insurance policies will not cover your organization unless you have MFA enabled on all applications. 

Patch and Vulnerability Management

In the healthcare industry, this added layer of protection tends to take a back burner. The act of patch and vulnerability management is the process in which you apply security patches to systems and software. Your resources don’t always cover everything, this is one of those things that can cover the leaks your resources may miss.

Formulate an Incident Response Plan

A plan beyond calling your cyber insurance company must be implemented, in order to prevent these attacks before they happen. In fact, Comparitech reported that the average ransomware victim loses around 35 percent of their data.

Waiting until a breach occurs without a plan in place puts yourself in a position where you not only have to rely on an unlikely payout but may never fully recover your data.

Train Your Employees with Security Awareness Training 

Employees are your first line of defense against cyber threats.  Ensuring that your team is well-trained on the importance of proper cyber hygiene and is following security measures in place will help boost your cyber posture.  Training 

them repeatedly on password hygiene, phishing emails, and suspicious links is vital in preventing a breach.

Review Your RPD Policies

Your RPD (raw programming data) policies should be reviewed often to make sure they comply with HIPAA and HITECH regulations. This is a necessary step in preventing a breach as well as having proper documentation in the case of one.

Data Backup and Recovery

One of the most important steps in preventing a breach is having a solid backup and disaster recovery plan. This ensures that if something were to happen, you have a way to recover your data and continue operations smoothly.

Preparing for the Future of Healthcare

Because of the new technology debt in healthcare, it’s important to stay ahead of the game. This means keeping up with technology, staying educated on new threats, and constantly reviewing and updating your security measures.

When preparing for the future of healthcare, it’s important to take a look around and delegate expertise appropriately. CEOs don’t need to be IT experts – they just need to find IT support that is not only affordable but provides all of the benefits so your time is spent well in other places. With the right provider, there should be no worry that your IT is not in the right hands.

As healthcare IT continues to evolve, we must adapt and protect ourselves against these evolving threats in order to continue providing top-notch care for our patients. Partner with ISG Tech for our healthcare IT services.

Critical Fortinet Remote Authentication Bypass Vulnerability [CVE-2022-40684] – What it is & What to Action to Take

About CVE-2022-40684

On October 6, 2022, Fortinet disclosed a critical remote authentication bypass vulnerability impacting FortiOS, FortiProxy, and FortiSwitchManager – CVE-2022-40684 that could allow a remote unauthenticated threat actor to obtain access to the administrative interface and perform operations via specially crafted HTTP or HTTPS requests.

On October 10th, Fortinet became aware of an instance where this vulnerability was exploited and provided remediation guidance. At this time, it was added to CISA’s Known Exploited Vulnerabilities Catalog with a recommended due date for resolution of November 1, 2022.

On October 12th, our detection and response services observed threat actors begin exploiting CVE-2022-40684 on a widespread basis by:

  • Accessing and downloading the appliance’s configuration file.
    • We have observed threat actors leverage Node.js and Report Runner to download the file.
    • This includes and is not exclusive to cleartext rules, policies, filtering, usernames, routing configurations. As well as encrypted passwords encrypted via the private-encryption-key.
  • Creating privileged administrator accounts.
  • Uploading and running scripts.

Upon hearing this, ISG and our security partners are recommending prompt patching of all impacted systems, which are listed below.

ISG Managed Perimeter Security customers are being contacted to identify the ideal time to complete these patches and identify any potential impact. ISG has patched our internal systems and is working in lock-step with our security partners to stay appraised of the latest threat intelligence on this vulnerability.

Impacted Systems

  • FortiOS versions 5.x, 6.x are NOT impacted.
  • FortiOS version 7.2.0 through 7.2.1
  • FortiOS version 7.0.0 through 7.0.6
  • FortiProxy version 7.2.0
  • FortiProxy version 7.0.0 through 7.0.6
  • FortiSwitchManager version 7.2.0
  • FortiSwitchManager version 7.0.0

Recommended Actions to Take

  • Please upgrade to FortiOS version 7.2.2 or above
  • Please upgrade to FortiOS version 7.0.7 or above
  • Please upgrade to FortiProxy version 7.2.1 or above
  • Please upgrade to FortiProxy version 7.0.7 or above
  • Please upgrade to FortiSwitchManager version 7.2.1 or above

Additional Recommendations

As always, ISG recommends following change management best practices for applying upgrades, including:

  • Testing changes in a dev environment before deploying to production to avoid any operational impact
  • Do not expose administrative interfaces externally
  • Limit IP addresses that can reach the administrative interface using a local-in-policy
  • Implement multi-factor authentication (MFA) to make successful exploitation significantly more difficult

For more best practices around network access, reference Fortinet’s user authentication best practices document.

If you should need help applying patches or have any questions, contact us today.

The First 48 When Ransomware Strikes

The content of this blog post comes from our webinar that you can watch here.

Ransomware is an increasingly popular and dangerous threat to businesses and organizations around the world. As cybercriminals continue to advance their techniques, it’s up to businesses and IT professionals to do what they can to stop and mitigate attacks. 

The Security Landscape

There were more than 300 million ransomware attempts in the first half of 2021 alone. Since then, the number of ransomware attacks have only increased, and the resulting damage has been extremely costly.

The current cybersecurity threat landscape for businesses and organizations is complex, with a wide variety of threats to consider. Without cybersecurity experts or even basic cyber hygiene practices, many organizations leave themselves vulnerable as easy victims for cyberattacks such as ransomware and phishing.

When Ransomware Strikes

Ransomware is a type of malware that encrypts a victim’s files and demands a ransom be paid in order to decrypt them. Once ransomware has encrypted a file, the only way to get the data back is through decryption, which can only be done with a special key.

Ransomware attacks can happen to any business or organization, no matter how big or small. In fact, smaller businesses are often targeted because they may not have the same level of security as larger organizations.

Once an organization has been owned by a ransomware attack, there’s little they can do to mitigate the loss unless they had previous protection measures in place such as a secure data backup. Additionally, even if a backup exists, the process of restoring data can be time-consuming and expensive.

The Importance of Managed Backups

In the event of a ransomware attack, having a secure backup is critical to mitigating loss. Backups should be stored offline and not connected to the network in order to prevent them from being encrypted by ransomware. Additionally, it’s important to have multiple backups in different locations in case one is lost or destroyed. As an ISG Backup client, we follow the best practice of a 3-2-1 solution. This means our team creates 3 copies of your data, in 2 different media formats, with 1 of those off-site.

The Remediation Process

Once a ransomware attack has occurred, the first step is to contain the spread of the malware. This can be done by disconnecting any infected devices from the network and taking them offline. Once the infection has been contained, the next step is to start the process of cleaning and rebuilding any infected systems.

Payments, Prevention, and Preparation

There are a few things businesses and organizations can do to prevent themselves from being targeted by ransomware attacks. The first is to have proper cybersecurity measures in places, such as firewalls, anti-virus software, and email filtering. Additionally, it’s important to educate employees on cybersecurity best practices and have an incident response plan in place in the event of an attack. 

For a thorough list of the controls, you should have in place, check this clip that speaks to the 12 Critical Controls Cyber Insurance providers are now required to qualify for cyber insurance. 

In the event that an organization is targeted by a ransomware attack, it’s important to not give in to the attacker’s demands. Paying a ransom only incentivizes cybercriminals to continue their attacks and doesn’t guarantee that files will be decrypted.

The best way to prepare for a ransomware attack is to have a comprehensive backup and disaster recovery plan in place. This will ensure that in the event of an attack, data can be quickly restored and business reducing the amount of downtime allowing business to continue as usual.  

Partnering With ISG Tech Mitigates Ransomware Risk

Ransomware attacks are becoming more and more common, and they can happen to any size business or organization within any industry. In order to protect yourself, it’s important to have proper cybersecurity measures in place and to educate employees on best practices. Additionally, having a secure backup is critical in the event of an attack.

If you do find yourself the victim of a ransomware attack, the best course of action is to not give in to the attacker’s demands and reach out to cybersecurity professionals such as ISG Technology.  By partnering with a managed service provider for IT security you are increasing your cybersecurity posture, give us a call today or visit our contact us page here to schedule a call with a security expert today. 

Cyber Insurance. And The War on Ransomware.

The content of this blog post is based on our recent webinar that you can watch here.

Cyber insurance is a must-have cyber defense weapon for all organizations trying to mitigate modern security threats. But the exponential increase in ransomware has created an industry chain reaction – Insurance providers are leaving the market, premiums are on the rise, more security controls are being required, and organizations are left scrambling.

As cyber criminals continually advance and develop new tactics to disrupt IT infrastructures, it’s critical that experts, businesses, and insurance companies work together to slow down the rise of cybercrime. 

The Rise of Ransomware and the Industry Chain Reaction

Ransomware attacks are rising at an alarming rate, and businesses of all kinds are threatened by this cybercrime. One reason for the recent growth of ransomware is that more and more businesses are digitizing their valuable data, which allows for more accessibility and therefore more opportunity for human error.

Essentially, this transition to digital business processes makes it easier for cybercriminals to gain access to company data. Another reason for the rise in ransomware attacks is that many businesses don’t have comprehensive cybersecurity measures in place to defend themselves against even basic hacking attempts. 

As a result, when a ransomware attack does occur, businesses are often left with no choice but to pay the ransom in order to get their data back. This only serves to encourage cybercriminals, who know that there’s a good chance they’ll be able to get away with their crimes.

According to the Global Insurance Market Index U.S., cyber insurance prices have increased by 79% from last year.  The cost of cyber insurance has soared due to the rise in cyber-attacks and threats.  Due to these circumstances, insurance companies are asking for more in-depth information about organizations’ cyber policies and procedures, and those that don’t have the level of security needed face higher premiums and less coverage. 

How Businesses and IT Partners Must Partner Together

In order to protect businesses from ransomware and other cyber threats, it’s important for businesses and their IT partners to work together. By collaborating, businesses can ensure that comprehensive cybersecurity measures are in place to defend against attacks.

IT partners can also help educate businesses about the importance of having a robust incident response plan in place in the event that an attack does occur. This plan should include information about how to contact the appropriate people, what data needs to be backed up, and what steps need to be taken to minimize the damage caused by an attack.

The Role of Cyber Insurance in Incident Response Plans

Cyber insurance can play a critical role in incident response plans. In the event of a ransomware attack, cyber insurance can help businesses recover lost data and get back up and running as quickly as possible.

Cyber insurance can also help businesses cover the costs of hiring a professional to clean up any malicious software that might have been installed on their systems as part of the attack. In some cases, and depending on your policy, cyber insurance may even cover the cost of the ransom itself.

The Increasing Controls Insurance Providers are Requiring

As the threat of ransomware and other cyber threats continues to grow, insurance providers are starting to require businesses to take more comprehensive security measures in order to qualify for coverage. 

For example, many insurance providers now require businesses to have incident response plans in place before they will provide coverage. This helps to ensure that businesses are prepared in the event of an attack and can take steps to minimize the damage caused.

Managed Security + Cyber Insurance Mitigates Cyber Risk

In the current cybersecurity threat landscape,  it’s important for businesses, IT partners, and insurance providers to work together to fight the war on ransomware. By taking comprehensive security measures and being prepared with incident response plans, businesses can minimize the damage caused by an attack and be ready to quickly recover lost data.

Cyber insurance can play a critical role in these plans, but insurance providers are increasingly requiring businesses to take more security measures before they will provide coverage. ISG Technology can work with your company to ensure you have the proper security controls in place to not only proactively protect your infrastructure but also prepare you in the event of an attack.  Give our team a call today or visit our contact us page to schedule a consultation with one of our cybersecurity experts. 

Service Update

Recently, ISG Technology became aware of an IT security incident involving unauthorized access to our environment. Upon discovery, we immediately initiated ISG Technology’s comprehensive incident response plan and engaged industry-leading cybersecurity specialists to help secure our systems, investigate the incident and further enhance security protocols.

Our priority is the security of our systems, and the safety of our customer’s data and operations. As part of our response plan, and out of an abundance of caution, we have disabled access to some services to ensure a safe, secure and protected environment for all customers.

This will impact some of the services we provide to our customers, including:

  • Veeam Backups and Replication – Offsite backups and restoration. Some monitoring and notifications will be impacted.
  • Enterprise Cloud virtual server hosting – Access to vCloud management console may be limited; as well as the ability to add, move or change the virtually hosted environment.
  • Access to the ticketing and portal system – Proactive external alerts will not be available

We are working to bring those systems back online as quickly and securely as possible to minimize the impact on customers.

We apologize for any inconvenience this may have caused, and will provide up-to-date information here as it becomes available. If you have questions, please contact our Service Desk at: or 866.915.1197.


This is an update to confirm that this incident has been resolved and all client services are restored and operational.

Throughout this process, our incident response plan prioritized the integrity of the ISG network, and the safety of the data and systems of our customers. The most significant service disruption was due to our proactive security approach – and a commitment to investigate every relevant system to ensure any access was identified and secured.

Based on our investigation, we are confident that systems are secure from the unauthorized access, and our enhanced security protocols will mitigate further risks associated with this incident. We thank our customers for their patience through this experience.

UPDATE AUGUST 18, 12:00 P.M.

At this time, primary customer services are online. Some systems may be experiencing delays as they automate through backlogs, but services are functioning.

If you are continuing to experience system disruption or are unable to access services, please contact our Service Desk at: or 866.915.1197.


Significant progress has been made on all ISG systems, and we intend to have most services restored this week. Please note the following about these services:

Veeam Backups & Replication – Starting Monday 8/15, some customers will experience successful backups as this system is brought back online. We will be in touch with customers as this occurs to ensure services are back to standard operations, including daily monitoring and remediation for managed customers.

Enterprise Cloud virtual server hosting – We intend to have vCloud management online this week, as well as access to the ticketing and portal system. Should you need any assistance with server management prior to vCloud access being restore, please reach out to the service desk.

Access to the ticketing and portal system – We intend to restore access to our ticketing portal and resume standard ticketing processes this week. Until further notice, please continue to contact our Service Desk at: or 866.915.1197.

We’d like to thank all of our customers for their patience through this experience. All of the work to date has been to ensure that environments have been secured before being restored.

With our cybersecurity partner, we have been thorough in examining the network and servers. According to our investigation, the unauthorized access was caught and removed before any customer data was lost, and all service interruption has been due to our proactive security approach.

As we proceed through this, we are making changes to improve customer experience and to enhance security protocols. If you experience any issues, please contact our Service Desk at: or 866.915.1197.

UPDATE AUGUST 10, 12:00 P.M.

ISG Engineering teams are continuing to work to ensure that impacted systems are secured and fully functional when brought back online and are taking additional time to further enhance security protocols. We will provide an updated estimate for restoration when the timeline is confirmed.

ISG Engineering teams are continuing to work to ensure that impacted systems are secured and fully functional when brought back online and are taking additional time to further enhance security protocols. We will provide an updated estimate for restoration when the timeline is confirmed.

For customers with managed backup systems, backups are being successfully stored locally but remote storage is not yet available.


ISG Engineering teams have been working through the weekend and made significant progress to review and secure systems.

Veeam backups and replication, enterprise cloud virtual server hosting and access to the ticketing and portal system remain impacted. They are expected to have limited functionality for at least another 48 hours as we further enhance security protocols. No other services are expected to be affected at this time.

Thank you for your patience. If you experience any issues, please contact our Service Desk at: or 866.915.1197.


In an exercise of caution as previously stated in the note above, we briefly restricted data center access around 7:00 p.m. this evening. We have addressed the situation, and brought services back to their previous state. We apologize for any inconvenience or disruption this may have caused. Our investigation into the situation continues. We will continue to update this post as we have information to share.

What’s the Difference between Co-Managed and Managed IT?

When it comes to managed IT services, there are two main options: co-managed and managed. So what’s the difference? In this blog post, we will discuss the advantages and disadvantages of both options, so you can make an informed decision about which type of service is best for your business.

What is Co-Managed IT?

Co-managed IT is a type of service where the client and IT service provider share responsibility for the management of the IT infrastructure. This can include tasks such as monitoring, patching, and incident response. 

These services are often used by businesses that have in-house IT staff, but lack the expertise or resources to effectively manage their IT infrastructure.

Advantages of Co-Managed IT

There are several advantages to this type of service:

  • Co-managed IT services can be customized to fit the needs of the client.
  • Co-managed IT services can be less expensive than managed IT services, since the client is sharing the cost of the service with the provider.
  • Co-managed IT services can provide a higher level of support than in-house IT staff, since the provider has more expertise and resources.

Disadvantages of Co-Managed IT

There are some disadvantages to co-managed services:

  • The client may have to share confidential information with the provider.
  • The provider may not be available 24 hours a day, which can be a problem if there is an issue with the IT infrastructure outside of normal business hours.

What is Managed IT?

Managed IT is a type of service where the IT service provider takes full responsibility for the management of the client’s IT infrastructure. Managed IT services are utilized by businesses that do not have any kind of professional IT systems in place.

Advantages of Managed IT

There are several advantages to managed IT services:

  • Managed IT services can provide a higher level of support than in-house IT staff, since the provider has more expertise and resources.
  • Managed IT services can be available 24 hours a day, which can be helpful if there is an issue with the IT infrastructure outside of normal business hours.
  • Managed IT services can take care of all the details of managing the IT infrastructure, so the client can focus on their business.

Disadvantages of Managed IT

There are some disadvantages to managed IT services:

  • Managed IT services can be more expensive than co-managed services, since the client is not sharing the cost of the service with the provider.
  • The provider may have to share confidential information with other clients.
  • The client may not have as much control over their IT infrastructure as they would with co-managed services.

Looking for Co-managed or Managed IT Services?

Both co-managed and managed IT services have their advantages and disadvantages. The best option for your business will depend on your needs and budget. If you need a high level of support but want to save money, co-managed IT services may be the best option.

Do you have any questions about co-managed or managed IT services? Reach out to ISG Technology today to learn more about the right options for your business.

The Benefits of Co-Managed IT Service for Healthcare Providers

Fast network speeds and a quality cybersecurity plan are probably not the first things that come to mind when you think about technology for healthcare. But these tools can be just as important as medical supplies when it comes to providing quality patient care.

That’s where co-managed IT services come in. By outsourcing your organization’s IT needs to a team of experts, you can focus on your core mission while a managed service provider takes care of the rest.

Why Does Your Organization Need Customized Healthcare IT Services?

There’s a lot that goes into keeping a healthcare facility up and running, from maintaining compliance with regulations to ensuring secure data storage. Here are some of the IT services that are essential for healthcare providers:

Cybersecurity: In the age of digital medical records, protecting patient data is more important than ever. A managed service provider can help you implement the latest cybersecurity tools and best practices to keep your data safe.

Network Management: Healthcare providers need fast, reliable network connections to access patient records, schedule appointments, and more. Managed IT services will redesign your network for maximum speed and efficiency.

Compliance: Healthcare organizations must comply with a variety of regulations, from HIPAA to the HITECH Act. Working with a managed service provider will help you stay up-to-date on the latest compliance requirements and ensure that your systems are compliant.

Data Storage: Healthcare providers generate a lot of data, from medical records to X-rays. A managed service provider can help you store this data securely and ensure that it is accessible when you need it.

Managed IT services can provide your healthcare organization with a wide range of benefits, from improved network speeds to secure data storage. By outsourcing your IT needs to a team of experts, you can focus on providing quality patient care instead of putting out IT fires. 

What Specialized IT Services Are Available for Healthcare?

As the world becomes increasingly digital, healthcare providers are finding that they need to upgrade their IT systems in order to keep up. While many organizations are turning to managed IT services to get the help they need, not all providers offer specialized services tailored specifically for healthcare providers.

A proactive managed IT provider for healthcare will offer:

  • Electronic health records (EHR)
  • Telemedicine
  • Revenue cycle management (RCM) software
  • Practice management software
  • EHR/EMR handling and processes
  • Support for medical interface problems

These days, it’s not enough to simply have an IT department. In order to keep up with the rapidly changing world of healthcare technology, you need a team of dedicated IT professionals who are up-to-date on the latest trends and developments.

What Are the Benefits of Specialized IT Services for Healthcare?

When a managed service provider creates a curated strategy just for you, you’re sure to see a return on your investment. Here are just a few of the benefits of having specialized IT services for healthcare:

  • Improved patient care: When you outsource your IT, you can focus on your core mission of providing quality patient care.
  • Increased efficiency: A managed service provider can help you streamline your processes and make better use of your time.
  • Compliance: Stay up to date on the latest compliance requirements with an IT technician who specializes in healthcare compliance.
  • Improved security: By outsourcing your IT, you can benefit from the latest cybersecurity tools and best practices.
  • Lower costs: With fixed-cost pricing, you can save money on infrastructure costs and avoid the need to hire additional staff.

A managed service provider can help you make the most of your time and resources so that you can focus on providing quality patient care. When you partner with an MSP, you can be confident that your IT needs are in good hands.

Avoid Costly IT Challenges with ISG Technology

When it comes to technology, healthcare is changing fast. In order to keep up with the latest trends and developments, you need a team of dedicated IT professionals who are up-to-date on the latest trends and developments.

At ISG Technology, we understand the unique challenges that healthcare organizations face. We’ve worked with hundreds of healthcare providers, from large hospitals to small specialty clinics and everything in between. We help take the IT burden off healthcare providers’ shoulders.

With our help, you can focus on providing quality patient care while we take care of your IT needs. Contact us today to learn more about our healthcare IT services.