LinkedInFacebook 

News Room

Lost and Stolen Devices

Cyber Crime in Northern Michigan

December 8, 2015

Living up north, away from the hustle and bustle of larger cities, can give us here in Northern Michigan a false sense of security when it comes to cyber crime. A recent article published by The Traverse City Business News addresses this issue and the relevance of cyber liability.

Western Digital Drives Have Security Flaws

October 30, 2015

Western Digital My Passport hard drives have been found to come with a slew of security holes according to a recent study.

2015 Critical Access Hospital Conference at Shanty Creek

ISC will be exhibiting November 5 and 6 at this year's annual Critical Access Conference presented by Michigan State University Michigan Center for Rural Health. 

Cisco ISE: Visibility and Control

September 2, 2015

Cisco’s latest ISE platform, or Identity Services Engine, is one of three components to the Cisco Unified Access Solution and automates access control by accurately locating, identifying, and classifying devices on the network and allowing for self-service on-boarding. ISE provides businesses with a way of balancing accessibility with network security.

Developing Your IT Policy

July 24, 2015

Demystifying the Technology Adoption Process

July 17, 2015
By Camille Johnston

People inherently reject change. However, it’s people that determine the success – or failure – of your initiatives.

Pages