News & Insights 

Featured Business Guides

IT specialist working on a server

Business Continuity Resources

Whether you’re a backup and disaster recovery expert or just getting your business continuity plan started, this page contains many useful resources to help you understand how to protect your data and keep your business up and running.

Learn More
cybersecurity protecting a computer

Cybersecurity Handbook

Most business owners today know the importance of cybersecurity, yet many just don’t know how to get started. The first step is understanding the threat landscape we find ourselves in and the tools and resources that are available to mitigate those threats.

Learn More
IT specialist working on a server

Get the Most out of Managed Services

With this guide, we aim to provide business executives with the baseline information they need to have regarding managed services in order to make strategic decisions about how to best address their IT needs.

Learn More

News & Insights

ISG Technology Recognized on CRN’s 2023 Security 100 List

Overland Park, KS, March 15, 2023 — ISG Technology, today announced that CRN®, a brand[...]

Why Your Medical Office Needs to Get Serious About HIPAA Compliance

It’s no secret that HIPAA (Health Insurance Portability and Accountability Act) is a highly important[...]

5 Cybersecurity Tips to Remember During the Holidays

The holidays are a time for family, friends, and celebration. But they are also a[...]

The CIO’s guide to lowering IT costs and boosting performance

There’s one question that haunts every single business leader, regardless of industry, business size, mission[...]

Financial Institutions Waging War on Ransomware

The content of this blog post is based on our recent webinar that you can[...]

Educators Waging War on Ransomware

The content in this blog is based on a recent webinar hosted by ISG Technology[...]

Power of Humans

In a recent webinar, we discussed why humans are so important to the IT world.[...]

Code Grey: The Evolving Threat Landscape of Healthcare IT

In our recent webinar, we discussed the evolving threat landscape of healthcare IT. Healthcare might[...]

GLBA Compliance

The tech world is full of rules and regulations and the long acronyms that go[...]

Critical Fortinet Remote Authentication Bypass Vulnerability [CVE-2022-40684] – What it is & What to Action to Take

About CVE-2022-40684 On October 6, 2022, Fortinet disclosed a critical remote authentication bypass vulnerability impacting[...]