www.isgtech.com Open in urlscan Pro
151.101.194.159  Public Scan

Submitted URL: https://auth.isgtech.com/
Effective URL: https://www.isgtech.com/
Submission: On November 03 via automatic, source certstream-suspicious — Scanned from DE

Form analysis 1 forms found in the DOM

POST /#gf_2

<form method="post" enctype="multipart/form-data" target="gform_ajax_frame_2" id="gform_2" class="gplaceholder newsletter gform_legacy_markup" action="/#gf_2"> <input type="hidden" class="gforms-pum"
    value="{&quot;closepopup&quot;:false,&quot;closedelay&quot;:0,&quot;openpopup&quot;:false,&quot;openpopup_id&quot;:0}">
  <div class="gform_body gform-body">
    <ul id="gform_fields_2" class="gform_fields top_label form_sublabel_below description_below">
      <li id="field_2_2" class="gfield email-field gfield_contains_required field_sublabel_below field_description_below gfield_visibility_visible"><label class="gfield_label" for="input_2_2" style="display: none;">Email<span
            class="gfield_required"><span class="gfield_required gfield_required_asterisk">*</span></span></label>
        <div class="ginput_container ginput_container_email"> <input name="input_2" id="input_2_2" type="text" value="" class="medium" tabindex="74" aria-required="true" aria-invalid="false" placeholder="Email *"></div>
      </li>
      <li id="field_2_4" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible">
        <div class="ginput_container ginput_container_text"><input name="input_4" id="input_2_4" type="hidden" class="gform_hidden" aria-invalid="false" value="https://www.isgtech.com/"></div>
      </li>
      <li id="field_2_5" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible">
        <div class="ginput_container ginput_container_text"><input name="input_5" id="input_2_5" type="hidden" class="gform_hidden" aria-invalid="false" value="Newsletter"></div>
      </li>
      <li id="field_2_6" class="gfield gform_hidden field_sublabel_below field_description_below gfield_visibility_visible">
        <div class="ginput_container ginput_container_text"><input name="input_6" id="input_2_6" type="hidden" class="gform_hidden" aria-invalid="false" value=""></div>
      </li>
      <li id="field_2_7" class="gfield gform_validation_container field_sublabel_below field_description_below gfield_visibility_visible"><label class="gfield_label" for="input_2_7" style="display: none;">Email</label>
        <div class="ginput_container"><input name="input_7" id="input_2_7" type="text" value="" placeholder="Email"></div>
        <div class="gfield_description" id="gfield_description_2_7">This field is for validation purposes and should be left unchanged.</div>
      </li>
    </ul>
  </div>
  <div class="gform_footer top_label"> <button type="submit" id="gform_submit_button_2" class="gform_button button" tabindex="75" onclick="if(window[&quot;gf_submitting_2&quot;]){return false;}  window[&quot;gf_submitting_2&quot;]=true;  "
      onkeypress="if( event.keyCode == 13 ){ if(window[&quot;gf_submitting_2&quot;]){return false;} window[&quot;gf_submitting_2&quot;]=true;  jQuery(&quot;#gform_2&quot;).trigger(&quot;submit&quot;,[true]); }">Subscribe<i class="fa fa-refresh"></i></button>
    <input type="hidden" name="gform_ajax" value="form_id=2&amp;title=&amp;description=&amp;tabindex=74"> <input type="hidden" class="gform_hidden" name="is_submit_2" value="1"> <input type="hidden" class="gform_hidden" name="gform_submit" value="2">
    <input type="hidden" class="gform_hidden" name="gform_unique_id" value=""> <input type="hidden" class="gform_hidden" name="state_2" value="WyJbXSIsImUwNjMxZjAzNzIzNmZlOGMzZjMxMzI2YTRjZGIzM2VhIl0="> <input type="hidden" class="gform_hidden"
      name="gform_target_page_number_2" id="gform_target_page_number_2" value="0"> <input type="hidden" class="gform_hidden" name="gform_source_page_number_2" id="gform_source_page_number_2" value="1"> <input type="hidden" name="gform_field_values"
      value=""></div>
</form>

Text Content

 * About
   * People
   * Process
   * Careers
 * Solutions
    * * Consulting
      * Networks & Infrastructure
      * Professional Services
      * Hewlett Packard Enterprise
    * * Managed IT Services
      * Hosted Voice
      * Assessments
    * * Managed Security
      * Managed Backup & Replication
      * Business 365

 * News & Insights
   * News & Insights
   * Business Continuity
   * Cybersecurity
   * Managed Services
 * Industries
   * Education
   * Finance
   * Government
   * Healthcare
 * Contact
 * Search
 * Menu




WORLD-CLASS MANAGED IT SERVICES FOR YOUR BUSINESS


IT’S TIME TO UNLOCK WHAT’S POSSIBLE


Watch Video

X


REMOTE WORKFORCE & BUSINESS CONTINUITY HELP IS HERE

ISG has assembled a task force of subject matter experts to field questions and
concerns about maintaining business continuity and remote workforce
implementation. If you need help, please reach out.

 * ➞ Contact the Task Force
 * ➞ ISG Maintaining Business Continuity


YOU ARE THE KEY

The time has come to make technology and data the lifeblood of business. To
connect workforces, leverage the cloud and streamline processes. But most
importantly, it’s time to catapult the customer experience to a whole new level.
We’re ISG, Kansas’ leading technology consultancy and IT support provider. And
we’re on a mission – to unlock new possibilities and create a better future for
the communities we serve.




THE IT SUPPORT TO TAKE EVERYTHING TO THE NEXT LEVEL

IT resources are constantly under pressure to deliver more with less. We’re here
to help with that. When you partner with ISG, you get Fortune 500 solutions from
one of the best technical teams in Kansas and service levels that you’d expect
from the guys down the street. The result: your business taken to the next level
, faster than you ever thought possible. Check out how we do it.

 * World-class solutions





GENERATIONS ROOTED IN TECHNOLOGY

We have been unlocking possibilities for communities of people for over four
generations. But we’ve never strayed too far from our roots – using innovative
technology solutions and IT support to lift up the communities of people we
serve. And, most importantly, connecting with people who value relationships by
treating them like they are family.

 * About Us



FEATURED WEBINAR


WHEN RANSOMWARE STRIKES

In this Executive Panel Discussion, we’ve brought together members of the ISG
Incident response team with two experts from our trusted partners at Veeam and
Fortinet to talk about the importance of the first 48 hours after a ransomware
attack.

 * Watch Now






NEWS & INSIGHTS


7 TIPS FOR SAFE ONLINE MEETINGS AND COLLABORATION WITH MICROSOFT TEAMS

July 13, 2021/in Blog /by Jake B

Remote and hybrid work has become the new norm for many employees across the
globe as day-to-day collaboration continues to be accomplished virtually. With
this shift to online communication, how can you ensure that you’re collaborating
safely?  Queue Microsoft Teams! Whether you’re hosting virtual meetings,
carrying out daily group and 1:1 chat, sharing documents, or […]

Read more



https://www.isgtech.com/wp-content/uploads/2019/04/tfe-security.jpg 266 702 Jake
B /wp-content/uploads/2018/02/isg-logo.png Jake B2021-07-13 17:55:002021-06-16
16:01:487 tips for safe online meetings and collaboration with Microsoft Teams


7 KEY TAKEAWAYS FROM THE KASEYA RANSOMWARE ATTACK

July 7, 2021/in Blog /by wpengine

By now you’ve seen the headlines about the Kaseya cyberattack – one of the
largest ransomware events in history that unfolded over the 4th of July weekend.
This attack, which targeted Kaseya’s remote monitoring and management tool for
handling networks and endpoints, immediately caused a ripple effect across the
IT supply chain, affecting roughly 50 Managed IT Service […]

Read more



https://www.isgtech.com/wp-content/uploads/2021/07/shutterstock_1916985977-scaled.jpg
1440 2560 wpengine /wp-content/uploads/2018/02/isg-logo.png wpengine2021-07-07
17:25:062021-07-07 17:25:117 Key Takeaways From the Kaseya Ransomware Attack


THREE WAYS YOUR SMB CUSTOMERS ARE MORE SECURE WITH MICROSOFT 365 BUSINESS

July 6, 2021/in Blog /by Jake B

We all read about the big data breaches – the ones that hit major corporations,
with millions of personal records compromised. But today’s cybercriminals aren’t
picky. Their nets catch businesses of any size, from the newest garage startup
to well-established organizations with several hundred employees. Those are the
businesses with perhaps the most to lose […]

Read more



https://www.isgtech.com/wp-content/uploads/2020/12/shutterstock_1097651690-scaled.jpg
1707 2560 Jake B /wp-content/uploads/2018/02/isg-logo.png Jake B2021-07-06
15:24:002021-06-14 16:09:30Three ways your SMB customers are more secure with
Microsoft 365 Business


HERE’S HOW IT PROFESSIONALS BECAME THE UNSUNG HEROES OF THE PANDEMIC

October 5, 2021/in Blog /by ISG Tech

COVID-19 has changed the world as we know it. Besides the immense impact on
healthcare, the pandemic has also challenged the way companies operate.  To keep
up with the times and address the need for continuity, many businesses have
transitioned from the traditional workplace to a remote or hybrid working
environment. In fact, 70% of […]

Read more



https://www.isgtech.com/wp-content/uploads/2021/10/colleagues-in-masks-near-the-computer-7VEYPQ2-scaled.jpg
1765 2560 ISG Tech /wp-content/uploads/2018/02/isg-logo.png ISG Tech2021-10-05
12:30:002021-10-12 22:47:15Here's How IT Professionals Became the Unsung Heroes
of the Pandemic


SMBS VS. ENTERPRISES: WHO GETS HACKED MORE?

September 7, 2021/in Blog /by ISG Tech

CNBC and Momentive recently conducted a survey of small businesses, revealing
that nearly 60% of small business owners are not concerned about becoming the
victim of a cyberattack. This is unfortunate, as hackers and cybercriminals are
targeting small businesses more frequently than ever before. The nonchalant
attitude about following basic cybersecurity protocols may be because […]

Read more



https://www.isgtech.com/wp-content/uploads/2021/09/stressed-business-executive-and-piles-of-paperwork-P4FDW7K-scaled.jpg
1792 2560 ISG Tech /wp-content/uploads/2018/02/isg-logo.png ISG Tech2021-09-07
09:00:002021-09-20 18:39:13SMBs vs. Enterprises: Who Gets Hacked More?


BUSINESS IT GUIDE: KEEPING USERS PRODUCTIVE & HAPPY

August 9, 2021/in Blog, Managed Services /by ISG Tech

IT solutions and software are essential for businesses to maximize productivity
and streamline operations. However, it is very common that new technologies
hinder productivity when not correctly implemented, and lagging, inefficient
systems can slow operations. Here’s how you can keep users happy and productive
by providing essential support, tools, and processes. The Critical Importance of
[…]

Read more



https://www.isgtech.com/wp-content/uploads/2021/08/AdobeStock_316504238-small.jpeg
853 1280 ISG Tech /wp-content/uploads/2018/02/isg-logo.png ISG Tech2021-08-09
20:25:002021-08-06 20:49:19Business IT Guide: Keeping Users Productive & Happy


CYBERSECURITY LINGO EVERY C-LEVEL EXECUTIVE SHOULD KNOW

August 6, 2021/in Blog, Security /by ISG Tech

Businesses face various security threats, including ransomware, phishing
attacks, computer viruses, and more. With these security threats increasing,
managed security services are no longer a luxury—they’re a necessity. Before
business owners and executives can fully understand the advantages of managed
security, they need to understand some basic IT security terms. Here’s our
glossary of basic […]

Read more



https://www.isgtech.com/wp-content/uploads/2021/08/security-protection-anti-virus-software-60504.jpeg
853 1280 ISG Tech /wp-content/uploads/2018/02/isg-logo.png ISG Tech2021-08-06
17:04:312021-08-06 17:05:05Cybersecurity Lingo Every C-Level Executive Should
Know


SKYROCKETING PRODUCTIVITY AND INNOVATION

August 4, 2021/in Blog /by ISG Tech

In 2020, Deloitte’s CIO Insider uncovered trends that point to a shift in the IT
operating model of successful companies. Instead of viewing IT services as a
line-item budget expense, they’ve started viewing managed IT services as
technology investments. By selecting the right MSP, executives drive ROI,
increase productivity and innovation, and reduce overall costs. […]

Read more



https://www.isgtech.com/wp-content/uploads/2021/08/sigmund-zBfBXHCaLmk-unsplash-scaled.jpg
1706 2560 ISG Tech /wp-content/uploads/2018/02/isg-logo.png ISG Tech2021-08-04
17:30:222021-08-04 21:16:04Skyrocketing Productivity and Innovation


MAKING DATA DISASTERS A THING OF THE PAST

July 28, 2021/in Blog /by ISG Tech

Be prepared for anything with managed IT services and data recovery. Many small
to medium-sized businesses don’t put a lot of emphasis on preparing for data
disasters, figuring it’s too much bother or that it’s unlikely a data disaster
will happen to them.  For the unprepared, a data disaster is a matter of if, not
[…]

Read more



https://www.isgtech.com/wp-content/uploads/2021/08/farzad-nazifi-p-xSl33Wxyc-unsplash-scaled.jpg
1700 2560 ISG Tech /wp-content/uploads/2018/02/isg-logo.png ISG Tech2021-07-28
17:30:132021-08-04 21:15:51Making Data Disasters a Thing of the Past


INTRODUCING WEBINARS IN MICROSOFT TEAMS: EASY, PROFESSIONAL WEBINARS TO ENGAGE
CUSTOMERS

July 20, 2021/in Blog /by Jake B

Over the last year, we have found new ways to create engaging virtual
experiences at work. We’ve transformed spaces in our homes to offices, developed
new skillsets for remote collaboration, and in some cases, adopted new
technology to get work done. I often hear from our customers about the burden of
using different tools to […]

Read more



https://www.isgtech.com/wp-content/uploads/2021/06/meeting-5804167_1920.png 1280
1920 Jake B /wp-content/uploads/2018/02/isg-logo.png Jake B2021-07-20
17:30:002021-06-17 14:58:20Introducing Webinars in Microsoft Teams: Easy,
professional webinars to engage customers


7 TIPS FOR SAFE ONLINE MEETINGS AND COLLABORATION WITH MICROSOFT TEAMS

July 13, 2021/in Blog /by Jake B

Remote and hybrid work has become the new norm for many employees across the
globe as day-to-day collaboration continues to be accomplished virtually. With
this shift to online communication, how can you ensure that you’re collaborating
safely?  Queue Microsoft Teams! Whether you’re hosting virtual meetings,
carrying out daily group and 1:1 chat, sharing documents, or […]

Read more



https://www.isgtech.com/wp-content/uploads/2019/04/tfe-security.jpg 266 702 Jake
B /wp-content/uploads/2018/02/isg-logo.png Jake B2021-07-13 17:55:002021-06-16
16:01:487 tips for safe online meetings and collaboration with Microsoft Teams


7 KEY TAKEAWAYS FROM THE KASEYA RANSOMWARE ATTACK

July 7, 2021/in Blog /by wpengine

By now you’ve seen the headlines about the Kaseya cyberattack – one of the
largest ransomware events in history that unfolded over the 4th of July weekend.
This attack, which targeted Kaseya’s remote monitoring and management tool for
handling networks and endpoints, immediately caused a ripple effect across the
IT supply chain, affecting roughly 50 Managed IT Service […]

Read more



https://www.isgtech.com/wp-content/uploads/2021/07/shutterstock_1916985977-scaled.jpg
1440 2560 wpengine /wp-content/uploads/2018/02/isg-logo.png wpengine2021-07-07
17:25:062021-07-07 17:25:117 Key Takeaways From the Kaseya Ransomware Attack


THREE WAYS YOUR SMB CUSTOMERS ARE MORE SECURE WITH MICROSOFT 365 BUSINESS

July 6, 2021/in Blog /by Jake B

We all read about the big data breaches – the ones that hit major corporations,
with millions of personal records compromised. But today’s cybercriminals aren’t
picky. Their nets catch businesses of any size, from the newest garage startup
to well-established organizations with several hundred employees. Those are the
businesses with perhaps the most to lose […]

Read more



https://www.isgtech.com/wp-content/uploads/2020/12/shutterstock_1097651690-scaled.jpg
1707 2560 Jake B /wp-content/uploads/2018/02/isg-logo.png Jake B2021-07-06
15:24:002021-06-14 16:09:30Three ways your SMB customers are more secure with
Microsoft 365 Business


HERE’S HOW IT PROFESSIONALS BECAME THE UNSUNG HEROES OF THE PANDEMIC

October 5, 2021/in Blog /by ISG Tech

COVID-19 has changed the world as we know it. Besides the immense impact on
healthcare, the pandemic has also challenged the way companies operate.  To keep
up with the times and address the need for continuity, many businesses have
transitioned from the traditional workplace to a remote or hybrid working
environment. In fact, 70% of […]

Read more



https://www.isgtech.com/wp-content/uploads/2021/10/colleagues-in-masks-near-the-computer-7VEYPQ2-scaled.jpg
1765 2560 ISG Tech /wp-content/uploads/2018/02/isg-logo.png ISG Tech2021-10-05
12:30:002021-10-12 22:47:15Here's How IT Professionals Became the Unsung Heroes
of the Pandemic


SMBS VS. ENTERPRISES: WHO GETS HACKED MORE?

September 7, 2021/in Blog /by ISG Tech

CNBC and Momentive recently conducted a survey of small businesses, revealing
that nearly 60% of small business owners are not concerned about becoming the
victim of a cyberattack. This is unfortunate, as hackers and cybercriminals are
targeting small businesses more frequently than ever before. The nonchalant
attitude about following basic cybersecurity protocols may be because […]

Read more



https://www.isgtech.com/wp-content/uploads/2021/09/stressed-business-executive-and-piles-of-paperwork-P4FDW7K-scaled.jpg
1792 2560 ISG Tech /wp-content/uploads/2018/02/isg-logo.png ISG Tech2021-09-07
09:00:002021-09-20 18:39:13SMBs vs. Enterprises: Who Gets Hacked More?


BUSINESS IT GUIDE: KEEPING USERS PRODUCTIVE & HAPPY

August 9, 2021/in Blog, Managed Services /by ISG Tech

IT solutions and software are essential for businesses to maximize productivity
and streamline operations. However, it is very common that new technologies
hinder productivity when not correctly implemented, and lagging, inefficient
systems can slow operations. Here’s how you can keep users happy and productive
by providing essential support, tools, and processes. The Critical Importance of
[…]

Read more



https://www.isgtech.com/wp-content/uploads/2021/08/AdobeStock_316504238-small.jpeg
853 1280 ISG Tech /wp-content/uploads/2018/02/isg-logo.png ISG Tech2021-08-09
20:25:002021-08-06 20:49:19Business IT Guide: Keeping Users Productive & Happy


CYBERSECURITY LINGO EVERY C-LEVEL EXECUTIVE SHOULD KNOW

August 6, 2021/in Blog, Security /by ISG Tech

Businesses face various security threats, including ransomware, phishing
attacks, computer viruses, and more. With these security threats increasing,
managed security services are no longer a luxury—they’re a necessity. Before
business owners and executives can fully understand the advantages of managed
security, they need to understand some basic IT security terms. Here’s our
glossary of basic […]

Read more



https://www.isgtech.com/wp-content/uploads/2021/08/security-protection-anti-virus-software-60504.jpeg
853 1280 ISG Tech /wp-content/uploads/2018/02/isg-logo.png ISG Tech2021-08-06
17:04:312021-08-06 17:05:05Cybersecurity Lingo Every C-Level Executive Should
Know


SKYROCKETING PRODUCTIVITY AND INNOVATION

August 4, 2021/in Blog /by ISG Tech

In 2020, Deloitte’s CIO Insider uncovered trends that point to a shift in the IT
operating model of successful companies. Instead of viewing IT services as a
line-item budget expense, they’ve started viewing managed IT services as
technology investments. By selecting the right MSP, executives drive ROI,
increase productivity and innovation, and reduce overall costs. […]

Read more



https://www.isgtech.com/wp-content/uploads/2021/08/sigmund-zBfBXHCaLmk-unsplash-scaled.jpg
1706 2560 ISG Tech /wp-content/uploads/2018/02/isg-logo.png ISG Tech2021-08-04
17:30:222021-08-04 21:16:04Skyrocketing Productivity and Innovation


MAKING DATA DISASTERS A THING OF THE PAST

July 28, 2021/in Blog /by ISG Tech

Be prepared for anything with managed IT services and data recovery. Many small
to medium-sized businesses don’t put a lot of emphasis on preparing for data
disasters, figuring it’s too much bother or that it’s unlikely a data disaster
will happen to them.  For the unprepared, a data disaster is a matter of if, not
[…]

Read more



https://www.isgtech.com/wp-content/uploads/2021/08/farzad-nazifi-p-xSl33Wxyc-unsplash-scaled.jpg
1700 2560 ISG Tech /wp-content/uploads/2018/02/isg-logo.png ISG Tech2021-07-28
17:30:132021-08-04 21:15:51Making Data Disasters a Thing of the Past


INTRODUCING WEBINARS IN MICROSOFT TEAMS: EASY, PROFESSIONAL WEBINARS TO ENGAGE
CUSTOMERS

July 20, 2021/in Blog /by Jake B

Over the last year, we have found new ways to create engaging virtual
experiences at work. We’ve transformed spaces in our homes to offices, developed
new skillsets for remote collaboration, and in some cases, adopted new
technology to get work done. I often hear from our customers about the burden of
using different tools to […]

Read more



https://www.isgtech.com/wp-content/uploads/2021/06/meeting-5804167_1920.png 1280
1920 Jake B /wp-content/uploads/2018/02/isg-logo.png Jake B2021-07-20
17:30:002021-06-17 14:58:20Introducing Webinars in Microsoft Teams: Easy,
professional webinars to engage customers


7 TIPS FOR SAFE ONLINE MEETINGS AND COLLABORATION WITH MICROSOFT TEAMS

July 13, 2021/in Blog /by Jake B

Remote and hybrid work has become the new norm for many employees across the
globe as day-to-day collaboration continues to be accomplished virtually. With
this shift to online communication, how can you ensure that you’re collaborating
safely?  Queue Microsoft Teams! Whether you’re hosting virtual meetings,
carrying out daily group and 1:1 chat, sharing documents, or […]

Read more



https://www.isgtech.com/wp-content/uploads/2019/04/tfe-security.jpg 266 702 Jake
B /wp-content/uploads/2018/02/isg-logo.png Jake B2021-07-13 17:55:002021-06-16
16:01:487 tips for safe online meetings and collaboration with Microsoft Teams


7 KEY TAKEAWAYS FROM THE KASEYA RANSOMWARE ATTACK

July 7, 2021/in Blog /by wpengine

By now you’ve seen the headlines about the Kaseya cyberattack – one of the
largest ransomware events in history that unfolded over the 4th of July weekend.
This attack, which targeted Kaseya’s remote monitoring and management tool for
handling networks and endpoints, immediately caused a ripple effect across the
IT supply chain, affecting roughly 50 Managed IT Service […]

Read more



https://www.isgtech.com/wp-content/uploads/2021/07/shutterstock_1916985977-scaled.jpg
1440 2560 wpengine /wp-content/uploads/2018/02/isg-logo.png wpengine2021-07-07
17:25:062021-07-07 17:25:117 Key Takeaways From the Kaseya Ransomware Attack


THREE WAYS YOUR SMB CUSTOMERS ARE MORE SECURE WITH MICROSOFT 365 BUSINESS

July 6, 2021/in Blog /by Jake B

We all read about the big data breaches – the ones that hit major corporations,
with millions of personal records compromised. But today’s cybercriminals aren’t
picky. Their nets catch businesses of any size, from the newest garage startup
to well-established organizations with several hundred employees. Those are the
businesses with perhaps the most to lose […]

Read more



https://www.isgtech.com/wp-content/uploads/2020/12/shutterstock_1097651690-scaled.jpg
1707 2560 Jake B /wp-content/uploads/2018/02/isg-logo.png Jake B2021-07-06
15:24:002021-06-14 16:09:30Three ways your SMB customers are more secure with
Microsoft 365 Business




GET IT INSIGHTS FROM ISG TECHNOLOGY

 * Email*
   
 * 
 * 
 * 
 * Email
   
   This field is for validation purposes and should be left unchanged.

Subscribe

IT SolutionsManaged IT Services
Professional Services
Infrastructure
Consulting

IndustriesEducation
Finance
Government
Healthcare
more

News & InsightsResources
Blog

AboutPeople
Process
Careers

2020 All Rights Reserved Privacy Policy | Sitemap

Contact Support
Scroll to top




CLOSE

Notifications



0:54









×
We Value Your Privacy
Settings
NextRoll, Inc. ("NextRoll") and our advertising partners use cookies and similar
technologies on this site and around the web to collect and use personal data
(e.g., your IP address). If you consent, the cookies, device identifiers, or
other information can be stored or accessed on your device for the purposes
described below. You can click "Allow All" or "Decline All" or click Settings
above to customize your consent.
NextRoll and our advertising partners process personal data to: ● Store and/or
access information on a device; ● Create a personalized content profile; ●
Select personalised content; ● Personalized ads, ad measurement and audience
insights; ● Product development. For some of the purposes above, our advertising
partners: ● Use precise geolocation data. Some of our partners rely on their
legitimate business interests to process personal data. View our advertising
partners to see the purposes they believe they have a legitimate interest for
and how you can object to such processing.
Your changes on this site will be applied across the internet on any digital
property you visit using NextRoll's technology. If you select Decline All, you
will still be able to view content on this site and you will still receive
advertising, but the advertising will not be tailored for you. You may change
your setting whenever you see
Decline All
Allow All