Category Archives: Blog

Financial Institutions Waging War on Ransomware

The content of this blog post is based on our recent webinar that you can[...]

Educators Waging War on Ransomware

The content in this blog is based on a recent webinar hosted by ISG Technology[...]

Power of Humans

In a recent webinar, we discussed why humans are so important to the IT world.[...]

Code Grey: The Evolving Threat Landscape of Healthcare IT

In our recent webinar, we discussed the evolving threat landscape of healthcare IT. Healthcare might[...]

Critical Fortinet Remote Authentication Bypass Vulnerability [CVE-2022-40684] – What it is & What to Action to Take

About CVE-2022-40684 On October 6, 2022, Fortinet disclosed a critical remote authentication bypass vulnerability impacting[...]

The First 48 When Ransomware Strikes

The content of this blog post comes from our webinar that you can watch here.[...]

Cyber Insurance. And The War on Ransomware.

The content of this blog post is based on our recent webinar that you can[...]

Service Update

Recently, ISG Technology became aware of an IT security incident involving unauthorized access to our[...]

What’s the Difference between Co-Managed and Managed IT?

When it comes to managed IT services, there are two main options: co-managed and managed.[...]

The Benefits of Co-Managed IT Service for Healthcare Providers

Fast network speeds and a quality cybersecurity plan are probably not the first things that[...]