MTG’s IT Blog

Why too many VMs is a bad thing

January 23rd, 2019

Desktop virtualization allows you to deliver computing resources to workstations in your network. Those resources are packed into virtual machines (VMs), which can be deployed as easily as any file. However, there are risks associated with trying to manage an overwhelming number of VMs.

The problem with VM sprawl
VM sprawl is a phenomenon that occurs when there are too many virtual machines on a network.

Scammers deriving new ways to scam via VoIP

January 22nd, 2019

VoIP (Voice over Internet Protocol) makes business communications simple and inexpensive. However, scammers are still finding ways to exploit VoIP, such as through “vishing scams, a new type of phishing wherein fraudsters make phone calls, pose as a business or financial partner, and request private details.

Safeguard your iPhone from phishing

January 18th, 2019

Phishing scams have been around for years, and they’ve gotten smarter with time. Recently, criminals have been targeting iPhone users through a voice phishing scam that makes the call appear like it’s coming from Apple Support. Fortunately, there are simple but effective tips so you don’t fall prey to this notorious scheme.

Single Sign-On: The key to user management

January 17th, 2019

Making passwords can be tedious. From complexity requirements to minimum lengths, creating a password for each new account brings its own set of headaches. If this problem is reaching a boiling point, Single Sign-On (SSO) solutions can help. These techniques are secure, easy-to-manage, and do away with the need to manage a long list of usernames and passwords.

Great uses for an old computer

January 16th, 2019

It’s inevitable. Sooner or later, you’re going to have to replace your computer. But while it may not be as fast as when you first got it or as sleek as your new computer, your old desktop or laptop might still have a lot to offer— after upgrading it a little, that is.

How to manage Google reviews

January 14th, 2019

Google is shaking things up yet again. Reviews from sites like Facebook and Yelp will now be displayed in search results with well-placed keywords and link-worthy content. Here’s how you can efficiently manage your business’s reviews
How Google changed search results
Google now automatically aggregates and includes online reviews to display in the Knowledge Panel found on the right side of the search results.

Get your network gear ready with UPS

January 11th, 2019

Clever business owners utilize an uninterruptible power supply (UPS) during disasters like fires, storms, and other emergency situations. A UPS is usually set up for desktop computers to give users enough time to save their work and progress. Another useful power-saving plan for emergency situations would be to use a UPS for networking gear.

Use virtualization to protect your devices

January 9th, 2019

Cybersecurity threats are increasing for both small and large businesses, which means solutions that protect mobile devices are no longer just nice-to-have solutions. As more work is handled outside of the office, the risks to your data increase. Virtualization vendors are leading the charge to tackle these challenges with innovative solutions.

VPNs: Why you need them

January 8th, 2019

Installing antivirus software and setting strong passwords are no longer considered the bare minimum in cybersecurity. With hackers, third parties, and ISPs constantly monitoring networks and your online habits, hopping onto a virtual private network (VPN) is crucial for keeping your surfing habits private.

Battle of the VoIPs: Hangouts or Skype?

January 4th, 2019

Microsoft and Google have been competing on almost every front. Both have made huge strides in machine learning, cloud computing, and productivity software. In terms of VoIP solutions, the tech powerhouses are also neck and neck with Microsoft’s Skype for Business and Google’s Hangouts Meet.