MTG’s IT Blog

Fruitfly: the latest Apple malware

January 25th, 2017

For decades, Apple has enjoyed a reputation of being nearly invulnerable to threats of malware. That may be an exaggeration, but there is a bit of truth to it. However, if you’re using Apple devices in your organization, you can’t afford to take this exaggeration for granted.

G Suite launches new features

January 24th, 2017

Tech giant Google has always listened to customer feedback to make continuous improvements to its powerful suite of applications. And in the most recent case, Google Cloud’s G Suite has introduced five new updates. What do they include and are they worth getting excited about?
Basic Mobile Management
G Suite’s Basic Mobile Management offers an agentless way to manage iOS devices by allowing admins to mandate basic security on those devices without requiring users to install mobile device management profiles.

Utilizing Google’s Cloud Print service

January 23rd, 2017

When you picture cloud computing and printing devices, you might think of endless copies of clouds flying out of the printer. But that analogy wouldn’t quite apply for Google’s Cloud Print service, though. This cloud-computing hybrid allows you to access both regular and internet-enabled printers through the Internet.

An old virus gets a new shot at virtualization

January 20th, 2017

Virtualizing your desktops comes with a number of benefits, one of which is improved security. Unfortunately, nothing perfect lasts forever, and the virtualization industry is facing a frightening new form of malware. Although this threat is nothing more than a facelift on an old virus, it is just as dangerous as it was the first time it made headlines.

Simplify calendar sharing with Office 365

January 19th, 2017

Knowing your friend’s schedules comes in handy when you’re trying to arrange a reunion, and the same can be said for businesses. Through calendar sharing, employees can simultaneously arrange meetings, prioritize projects and set schedules for contacting customers.

How to protect against VoIP call hacking

January 17th, 2017

VoIP has become the ultimate communication tool for enterprises, but it has also become another vulnerability that hackers exploit. Because voice is essentially transferred as data, the risk of digitized messages being intercepted and heard by unauthorized ears increases.

Cyber security and managed services

January 12th, 2017

Cyber security is something you hear about a lot these days. Sometimes it’s thrown around to scare business owners, other times it has proven to be a cautionary tale, one that small businesses can learn from to fend themselves from online threats that can leave devastating impact.

Why consider disaster recovery for 2017

January 11th, 2017

The new year is well upon us, and with it comes an equally new IT budget. Judging by the advancements in computing technology, many 2017 business wish lists probably include powerful onsite servers, workstations, and the Internet of Things. But as tempting as these purchases may be, it’s important that you don’t dismiss an old yet essential IT resolution: disaster recovery.

Facebook’s group voice calling

January 10th, 2017

“What’s your Facebook name?” is not a question you’re often asked when someone needs your contact details. In the first place, Facebook messaging isn’t everyone’s voice call app of choice, especially for group conversations. As of now, Skype rules that arena, especially for business communications.

Flaw allows thieves to open locked iPads

January 9th, 2017

Have you ever worried about your tablet’s security? If not, you should. Networked gadgets are becoming increasingly interconnected every day, and just one social media account saved on a compromised iPad could lead to breaches on any number of other, more sensitive devices.