MTG’s IT Blog

No ransom: A place for free decryption

September 3rd, 2019

Although a ransomware attack may seem targeted, you’re not the only one who’s been infected. Ransomware is spreading at an alarming rate, and the further it goes, the more resources are allocated to fighting it. If your data is held hostage, refer to this list of free decryptors you can use.

4 Common misconceptions about virtualization

August 30th, 2019

Small businesses can accomplish a lot by implementing virtualization in their office IT network. Unfortunately, many SMBs shy away from it because of various misconceptions. Here are four myths about virtualization you should stop believing.
Myth #1 – Virtualization is too expensive for SMBs
Many people assume that the more advanced an IT solution is, the more expensive it is to install and maintain.

How to make the most out of your Time Machine

August 28th, 2019

If you’re a Mac user, you probably know that macOS has a built-in feature called Time Machine. This backup application is used to keep an up-to-date copy of all the files on your Mac. What’s unique about it is that it captures exactly what was on your Mac any day in the past, making it easy to recover files, emails, or media that may have been inadvertently deleted.

How to keep your data safe and secure

August 27th, 2019

Data security and privacy should be every small business owner’s top priority in this day when cybercriminals are on the loose. The good news is you don’t have to be a tech genius to make it happen. Here are practical ways to shield your company from cyberattacks.

What does the lifespan of a business phone system look like?

August 26th, 2019

Although digital communication tools let businesses connect with customers and other stakeholders in an efficient manner, telephones are still used to communicate with important business stakeholders. And for many organizations, determining whether to use internet phones or legacy systems remains a concern.

Tweak your mindset to achieve success on the cloud

August 23rd, 2019

The cloud is not like some magic beans that’ll sprout sky-high stalks overnight and lead you to a castle full of riches. Don’t be misled by shiny words such as “increased productivity” and “collaboration” — your organization won’t realize these benefits unless everyone actually puts in the work to make the cloud work. If you want to use the cloud successfully, you might have to change your mind about a thing or two before you migrate to the cloud.

Smartphone browsers now support biometrics

August 21st, 2019

Google Chrome and Mozilla Firefox Lite support web-based biometric authentication. The leading mobile browsers now allow users to sign in to online profiles through fingerprint scanners, facial recognition, and the like. What’s more, online biometric authentication through these browsers requires no additional software.

Why dashboards are vital to your business

August 20th, 2019

People are visual creatures, which means we interpret visual data better than written words. That’s why most businesses turn to dashboards as a business intelligence tool to present data in a way that’s easy to understand. Dashboards have become a critical part of the analytics process.

Keeping Facebook and Twitter safe from hackers

August 16th, 2019

Keep your guard up! Pranksters, malicious attackers, and hackers come in different forms, but they are all after your online privacy and security — especially on social media. There are several things you can do to protect your Facebook and Twitter accounts.

3 Potential issues to watch out for during virtualization

August 13th, 2019

Virtualization can boost operational efficiencies like never before, but you have to understand that the benefits aren’t always immediate. As valuable as it is, it does come with flaws to those who don’t know how to properly adopt it. Here are a few concerns that can become an issue in virtualization adoption.