How We Help
Category Archives: Blog
Remote Code Execution Vulnerability Affecting FortiOS and FortiProxy (CVE-2023-33308)
On July 11th, 2023, Fortinet published a security advisory detailing a remote code execution vulnerability affecting FortiOS[...]
Microsoft Critical & Actively Exploited Vulnerabilities – July 2023
On July 11, 2023, Microsoft published their July 2023 Security Update with patches for 130[...]
ISG Technology Recognized on CRN’s 2023 Security 100 List
Overland Park, KS, March 15, 2023 — ISG Technology, today announced that CRN®, a brand[...]
Why Your Medical Office Needs to Get Serious About HIPAA Compliance
It’s no secret that HIPAA (Health Insurance Portability and Accountability Act) is a highly important[...]
5 Cybersecurity Tips to Remember During the Holidays
The holidays are a time for family, friends, and celebration. But they are also a[...]
Financial Institutions Waging War on Ransomware
The content of this blog post is based on our recent webinar that you can[...]
Educators Waging War on Ransomware
The content in this blog is based on a recent webinar hosted by ISG Technology[...]
Power of Humans
In a recent webinar, we discussed why humans are so important to the IT world.[...]
Code Grey: The Evolving Threat Landscape of Healthcare IT
In our recent webinar, we discussed the evolving threat landscape of healthcare IT. Healthcare might[...]
Critical Fortinet Remote Authentication Bypass Vulnerability [CVE-2022-40684] – What it is & What to Action to Take
About CVE-2022-40684 On October 6, 2022, Fortinet disclosed a critical remote authentication bypass vulnerability impacting[...]