Category Archives: Blog

The First 48 When Ransomware Strikes

The content of this blog post comes from our webinar that you can watch here.[...]

Cyber Insurance. And The War on Ransomware.

The content of this blog post is based on our recent webinar that you can[...]

Service Update

Recently, ISG Technology became aware of an IT security incident involving unauthorized access to our[...]

What’s the Difference between Co-Managed and Managed IT?

When it comes to managed IT services, there are two main options: co-managed and managed.[...]

The Benefits of Co-Managed IT Service for Healthcare Providers

Fast network speeds and a quality cybersecurity plan are probably not the first things that[...]

How to Become HIPAA Compliant

How to Become HIPAA Compliant HIPAA compliance is of utmost importance for any business that[...]

Recommendations for Mitigating Cyber Risks During Russia/Ukraine Conflict

The White House has warned about the potential for Russia to engage in malicious cyber[...]

Webinar: Cyber Insurance. And The War On Ransomware.

Cyber insurance is a must-have weapon for all organizations trying to mitigate modern security threats.[...]

Google Chrome Zero-Day Vulnerability Affects Billions, Here Is How To Fix It

Google Chrome Zero-Day Exploit This Forbes article has all the up to date information on[...]

ISG Technology Recognized on CRN’s 2022 Tech Elite 250 List

Overland Park, KS, March 8, 2022 — ISG Technology, today announced that CRN®, a brand[...]