Knowledge and Insights

Featured Post

How to Minimize the Risk of Being a Victim of Ransomware

Did you know 85% of all hacker attempts happen to small businesses?

Did you know 85% of all hacker attempts happen to small businesses?

Read More ›

8 Best Practices To Avoid A Phishing Scam

Untitled

Read More ›

3 Ways to Protect Your Business From Security Threats

Daily Quotes

Read More ›

Warning: 5 Things You Need To Know About Password Security

pass

Read More ›

5 Reasons It's Time For The Cloud

Read More ›

Searching for Technology Services: It’s Not About The Technology

Read More ›

4 Steps To Stay Safe On Vacation

It’s summer time, which means traveling and vacations! In today’s day and age though, the lines between personal time and work time are somewhat blurred. Many people take their laptops, tablets, or mobile phones with them and check up on company...

It’s summer time, which means traveling and vacations! In today’s day and age though, the lines between personal time and work time are somewhat blurred. Many people take their laptops, tablets, or mobile phones with them and check up on company things while on vacation. If that sounds like you, remember these 4 steps to keep electronically safe when you go!

Read More ›

How Password Policies Protect Your Business

MotherG regularly reviews our best practices to ensure we’re providing the experience our clients’ desire.  Recently we updated our security section, specifically password policies.  We are frequently asked, “What’s the best password policy for...

MotherG regularly reviews our best practices to ensure we’re providing the experience our clients’ desire.  Recently we updated our security section, specifically password policies.  We are frequently asked, “What’s the best password policy for my business? “

Read More ›

How Secure Is Your Business from Hackers?

As the focus of IT moves towards the cloud, hackers are turning their attention to larger targets with a higher payoff. While it may not seem worth it for most hackers to attack small to medium businesses, more and more small businesses are being...

As the focus of IT moves towards the cloud, hackers are turning their attention to larger targets with a higher payoff. While it may not seem worth it for most hackers to attack small to medium businesses, more and more small businesses are being compromised. How is that possible? Scripts and tools are making it easier to launch basic attacks against a network. Entry level hackers can now cast a wide net when checking for vulnerabilities, which doesn’t take much effort on their part. It’s similar to an intruder walking through an apartment building or hotel. These basic attacks are basically jiggling the door knob to the rooms to see if any of them are unlocked.

Read More ›

IBM Kicks Siri to the Curb!

Can Siri keep your company’s secrets? IBM doesn’t think so and they aren’t taking any chances. The company banned Siri because the application converts spoken queries to text and processes them on apple servers.  IBM fears that this might allow...

Can Siri keep your company’s secrets? IBM doesn’t think so and they aren’t taking any chances. The company banned Siri because the application converts spoken queries to text and processes them on apple servers.  IBM fears that this might allow sensitive information to escape.  Corporations are still figuring out what kinds of risks Siri and voice dictation could present.

Read More ›

Sign Up For Updates

Don't miss another important post. By subscribing to our newsletter you will get timely updates & news each month