How We Help
Category Archives: Blog
12 CRITICAL SECURITY CONTROLS: Email Filtering & Web Security
Follow these email filtering and web security best practices to safeguard your organization’s digital assets[...]
12 CRITICAL SECURITY CONTROLS: Password Multi-Factor Authentication
Multi-factor Authentication is one of the most effective and affordable security controls available to safeguard[...]
Choosing the Right Endpoint Detection and Response (EDR) Solution: A Comprehensive Guide
In the rapidly evolving landscape of endpoint security, selecting the right EDR solution is critical.[...]
Ensuring Network Security: Best Practices Guide
In the rapidly evolving landscape of the digital world, network security has become an indispensable[...]
Firewall Setup & Optimization: A Comprehensive Guide
In today’s digital age, where the internet plays a pivotal role in our daily lives,[...]
Remote Code Execution Vulnerability Affecting FortiOS and FortiProxy (CVE-2023-33308)
On July 11th, 2023, Fortinet published a security advisory detailing a remote code execution vulnerability affecting FortiOS[...]
Microsoft Critical & Actively Exploited Vulnerabilities – July 2023
On July 11, 2023, Microsoft published their July 2023 Security Update with patches for 130[...]
ISG Technology Recognized on CRN’s 2023 Security 100 List
Overland Park, KS, March 15, 2023 — ISG Technology, today announced that CRN®, a brand[...]
Why Your Medical Office Needs to Get Serious About HIPAA Compliance
It’s no secret that HIPAA (Health Insurance Portability and Accountability Act) is a highly important[...]
5 Cybersecurity Tips to Remember During the Holidays
The holidays are a time for family, friends, and celebration. But they are also a[...]