Category Archives: Blog

Webinar: Cyber Insurance. And The War On Ransomware.

Cyber insurance is a must-have weapon for all organizations trying to mitigate modern security threats.[...]

Google Chrome Zero-Day Vulnerability Affects Billions, Here Is How To Fix It

Google Chrome Zero-Day Exploit This Forbes article has all the up to date information on[...]

ISG Technology Recognized on CRN’s 2022 Tech Elite 250 List

Overland Park, KS, March 8, 2022 — ISG Technology, today announced that CRN®, a brand[...]

ISG Technology Recognized on CRN’s 2022 MSP 500 List

Overland Park, KS, February 14, 2022 — ISG Technology, announced today that CRN®, a brand[...]

Twin Valley & SKT to Help Boost Kansas Tech Industry FlagshipKansas.Tech Announces Board of Directors, Officers

For immediate release WICHITA, Kan. (January 7, 2022) — In its commitment to lift up[...]

12 Days of Chri… We Mean Cybersecurity

12 Days of Cybersecurity The holidays are a time for celebration and spending time with[...]

Log4J – What it is. And What You Need to Know.

What is Log4J? Log4j2, also known as Log4Shell, is a vulnerability that exploits Apache Log4j[...]

A Beginner’s Guide to VPNs: What are They, and How Can They Help My Business?

The onset of the Covid-19 pandemic meant a rapid shift to remote-based work environments for[...]

Employee Security Tips That All Businesses Should Use

Effective workplace security is becoming more and more critical. With news of increased ransomware attacks[...]

What to Expect from the Windows 11 Update

The newest version of Microsoft Windows is here, but many aren’t sure about the new[...]