The dark web: An introduction

Regina Christensen Perspectives Leave a Comment

Have you come across the term, dark web, recently? As a business, you might have heard that you need to keep your data safe from the dark web. So, what is the dark web anyway? Read on to find out… What is the dark web? The cybercrime landscape is evolving fast. The “Nigerian” email scams are now old. Cybercriminals are …

Novel Corona Virus Update – March 23rd

Sebastian Abbinanti Perspectives Leave a Comment

A Note from our President… Novel Coronavirus Update – March 23rd I want to take a moment to inform our clients of changes to operations due to the Illinois Governor’s Shelter in Place Order.  The Isidore Group is an exempt organization in that we support first responders and healthcare workers.  Our clients can continue to expect: Our Service Desk is …

Local Managed IT Services Provider helps local school launch distance learning platform in three days.

Sebastian Abbinanti Press Releases Leave a Comment

FOR IMEDIATE RELEASE MEDIA CONTACT: Sebastian Abbinanti sabbinanti@isidoregroup.com Local Managed IT Services Provider helps local school launch distance learning platform in three days. BURR RIDGE, ILLINOIS, March 18, 2020–The Isidore Group has partnered with Everest Academy in Lemont, Illinois, a Pre-K3 through 8 Independent Private Catholic School, to provide a Distance Learning Solution. The Everest Academy E-Learning Program officially launched this …

Novel Corona Virus Update

The Isidore Group Perspectives Leave a Comment

A Note from our President… Novel Corona Virus Update Generally, when you receive e-mail notices from me, it’s not about this type of virus.   The Novel Corona Virus, now know technically as COVID-19, has been determined to be a pandemic by The World Health Organization. This determination has begun to affect our daily lives.  We wanted first to assure …

5 Important IT checklists that no SMB should miss: Part-1

Regina Christensen Perspectives Leave a Comment

IT checklists are a great way to analyze, understand and take the necessary steps to meet your IT requirements. In this blog, we discuss 2 of the 5 important IT checklists–Hardware/software and Cybersecurity. When creating a checklist for hardware/software purchase, use, and installation, answer the following questions. How do you determine what hardware/software is needed? What about installation? Who will …