MTG’s IT Blog

How do I create an effective Facebook ad?

March 11th, 2019

Facebook has uses that go way beyond posting cat photos, complaining about restaurants, or stalking your ex — it’s also an incredibly effective advertising platform. From small businesses to big corporations, anyone can benefit from Facebook’s marketing tools.

Cyberthreats and the finance sector

March 6th, 2019

The financial sector has long been heavily targeted by cybercriminals. Over the years, the number of attacks that involved extortion, social engineering, and credential-stealing malware has surged rapidly. This means that financial institutions should strive to familiarize themselves with the threats and the agents behind them.

Think twice about selling or donating a Mac

March 5th, 2019

Today’s computer users often forget or are unaware of how much sensitive information their devices store. The ability to save passwords, credit card numbers, and personal messages is undeniably convenient, but it’s also a huge liability. If you’re thinking about getting rid of your Mac, make sure to follow these steps first.

How to minimize Wi-Fi hiccups

March 1st, 2019

Today, you simply can’t survive without a Wi-Fi connection. Businesses need fast, secure, and reliable internet to get work done and satisfy customers. But what about when you experience Wi-Fi issues? These fixes ought to do the trick!
Range constraints
Wi-Fi works via radio waves that are broadcast from a central hub, usually a piece of hardware known as a router.

Why is HTTPS important?

February 28th, 2019

Many internet users still do not understand what the padlock icon in their web browser’s address bar is for. It represents HTTPS, a security feature that authenticates websites and protects the information users submit to them. This is an important feature that lets users know whether the site they are visiting is secure or not.

Lessons from a disaster recovery plan audit

February 27th, 2019

Why do some companies fail their disaster recovery plan (DPR) audit? Perhaps because they did not get the right information for it. They say experience is the best teacher; thus, nothing beats what you can learn from real-world case studies. See what you can learn from the following case.

Will virtual containers change IT?

February 25th, 2019

As technical as virtualization and virtual containers are, there’s no reason your company shouldn’t benefit from them. IT specialists all over the country are setting up and supporting these technologies for small businesses to increase efficiency and cut down on technology costs.

Premise-based or cloud-hosted VoIP?

February 22nd, 2019

Business owners are turning to the cloud because of its numerous advantages. However, others prefer premise-based infrastructures. When it comes to VoIP phone systems, which is better for your business?

Installation and maintenance
On-premises VoIP phone systems are installed in your office and typically managed and maintained by your own personnel.

Groups, Yammer, and Teams: What are they?

February 21st, 2019

While most Office 365 apps serve a unique purpose, tools like Outlook Groups, Yammer, and Microsoft Teams can all be used for office communication and collaboration. However, there are small differences in the way they can be used. Let us break it down for you.

Fileless malware: Are you at risk?

February 19th, 2019

Over the past few years, the security industry has been witnessing a rapid evolution in attack techniques, including fileless malware, which uses legitimate tools and services such as existing software, applications, and authorized protocols to carry out malicious activities such as unauthorized data retrieval or data damage.