Network Management, Inc. Blog

With over 25 years of experience in Information Technology, Rafiq Masri is one of the most accomplished, versatile and certified (Microsoft MCSE, Cisco CCNA, CCDA, CNE, Citrix, Neverfail, HP, and more) engineers in the field. He has spent the past 2 ½ decades administering and supporting a wide range of clients and has helped position Network Management, Inc. (NMI) as a leader in the IT Managed Services space in the Washington DC Metro Area.

Rafiq has built a reputation for designing, building and supporting top notch IT infrastructures in the small to mid-size market to match the business objectives and goals of his clients.

Embracing the core values of integrity, innovation, and reliability, Rafiq has a very loyal client base with some customer relationships dating back 20+ years.

Rafiq holds a bachelor’s degree in Mechanical Engineering from the University of Michigan and has completed graduate programs in Software Engineering and Business at Harvard and George Mason University. Rafiq is a former founder and CEO of Automation, Inc. in Ann Arbor, Michigan as well as a valued speaker on entrepreneurship and technology at industry events such as ExpoTech and others.

Room Service, You Want Malware?

Room Service, You Want Malware?

In a recent finding, assorted large hotels owned and operated by HEI Hotel & Resorts have been victims of malware since 2015. 20 of the company’s hotels were affected, with customer financial data being exposed in a real-time, point-of-sale malware attack. Have you recently stayed at one of these hotels?

0 Comments
Continue reading

How to Troubleshoot and Reset Your Network in Windows 10

How to Troubleshoot and Reset Your Network in Windows 10

Windows 10 made several small changes during its Anniversary Update, not the least of which being the inclusion of a Network Status page, allowing the user to check on the current network connection’s status.

0 Comments
Continue reading

Understanding the Battery Life of Your Mobile Devices

Understanding the Battery Life of Your Mobile Devices

One of the most critical considerations to using a device is its battery life. After all, it doesn’t do a user much good to be in the middle of one of their tasks and their battery dies unexpectedly. To combat this, devices will display the battery life in a status indicator that tells the user how many hours are left for the charge.

0 Comments
Continue reading

How to Find Out if You’ve Got Stolen Data on the Dark Web

How to Find Out if You’ve Got Stolen Data on the Dark Web

Data breaches: these criminal intrusions are conducted against businesses of all sizes. Critical and sensitive data is copied from the system it belongs on to another, unauthorized one--all for someone’s illegitimately-gained benefit. For many businesses, the threat of being struck by a data breach and having their data put up for sale and/or distribution on the Dark Web is very real, especially for those possessing data of a more sensitive nature.

0 Comments
Continue reading

Ransomware Can Just Be Devastating

Ransomware Can Just Be Devastating

Ransomware is still going strong, and now more than ever it’s important to emphasize the danger that it poses for your organization. Even municipalities and other high-profile targets are at risk of being taken down by ransomware. Since 2013, over 170 government systems at the county, city, or state levels have been attacked.

0 Comments
Continue reading

Company Culture Goes a Long Way

Company Culture Goes a Long Way

When you consider your business’ strengths, you might feel the need to focus on quantifiable aspects that can be defined with numbers. There are some competitive advantages to this, but it’s especially important to keep in mind that perhaps the most important quantifiable strength you have is your ability to sustain a positive company culture.

0 Comments
Continue reading

Looking for Value? Look No Further

Looking for Value? Look No Further

“Business as usual.” This is something that people say when their time at work matches their expectations. If your staff constantly has problems with the technology you’ve provided them, the saying may be in reference to your constant IT troubles, which would be problematic on several different fronts. If your company’s “business as usual” is dealing with downtime, runaway IT repair costs, and inefficient and variable productivity, you might want to consider managed IT services.

0 Comments
Continue reading

Sick of Spam Calls? VoIP is Partly to Blame

Sick of Spam Calls? VoIP is Partly to Blame

If you have access to a phone, chances are you’ve received a spammy robocall. In fact, you’ve probably received a bunch… but why? And how are these robocalls able to hide behind what looks to be a local number? Unfortunately, it’s because the scammers behind these robocalls are using a helpful business tool… Voice-over-Internet-Protocol telephony, also known as VoIP.

0 Comments
Continue reading

Tip of the Week: Five of Android Pie’s Tastier Features

Tip of the Week: Five of Android Pie’s Tastier Features

Despite Android Q being just around the corner, there’s a lot that Android Pie still has to offer. In fact, the average user might not have any idea that these features exist. This week, we’re offering a few tips that you can use to make your phone even more useful to your productivity.

0 Comments
Continue reading

Google Now Plays Nice with Microsoft Office

Google Now Plays Nice with Microsoft Office

For some time now, businesses have more or less had to choose between utilizing solutions provided by Google, or those that Microsoft has developed - exclusively. This was because these solutions offered no real inter-compatibility… until now, at least, as Google now allows users to edit Microsoft Office files in Google Docs.

0 Comments
Continue reading

Mobile Malware is on the Rise

Mobile Malware is on the Rise

When considering cybersecurity, it can be easy to overlook the computers that so many of us typically carry with us every day: our smartphones. However, as attacks to mobile devices have risen considerably in the recent past, it is important to recognize the severity of these attacks, as well as how to avoid them.

0 Comments
Continue reading

Tip of the Week: 5 Key OneNote Tips

Tip of the Week: 5 Key OneNote Tips

Microsoft OneNote is a program that can help you keep track of your notes, but it’s much more than that. OneNote actually provides several other functions that take it beyond the use of a simple digital scratchpad. Let’s take a look at some of the OneNote features that you may not know about.

0 Comments
Continue reading

Understanding the Dangers of a Man-in-the-Middle Attack

Understanding the Dangers of a Man-in-the-Middle Attack

Have you ever played the telephone game? One person in a group whispers a phrase to another, who then passes it to another, and the fun is had when the group shares what they heard and how the message was garbled along the way. In many ways, this activity is similar to a Man-in-the-Middle (MitM) attack - although the attack is a lot less fun than the game.

0 Comments
Continue reading

How Working with a Managed Service Provider Helps Your Operations

How Working with a Managed Service Provider Helps Your Operations

In today’s highly competitive business environment, any advantage that you can claim will be useful to you. One big advantage you should seek to have is a trusted and reliable resource you can turn to so they can help you manage your IT solutions, consulting you on your business’ future in terms of its technology.

0 Comments
Continue reading

Check Out These 4 Great Gmail Extensions

Check Out These 4 Great Gmail Extensions

Gmail is a massively popular email client for individuals and businesses, alike. As a business tool, Gmail is almost unmatched. This is mainly because it comes with a massive amount of space to archive emails and the ability to sync with other email providers. Another big draw is that it has several useful third-party applications that integrate with Gmail to provide even more communication tools. Today, we will take a look at four great Gmail integrations that can work for you and your business.

0 Comments
Continue reading

How to Protect Your Company’s Reputation Online

How to Protect Your Company’s Reputation Online

When you run a successful business, you accrue a large client base. It eventually becomes impossible to please everyone, leading to some negative online reviews. With the rise of social media making it easier than ever before to take negative thoughts into the public’s view, you need to take a step back and consider your organization’s stance on how it deals with online reputation management.

0 Comments
Continue reading

How 5G is Being Overhyped

How 5G is Being Overhyped

More and more is being said about the impending shift from fourth-generation wireless to fifth-generation, and how impactful this shift will be. The only problem is, a lot of what is being said is conflated hyperbole - exaggerated and overhyped.

0 Comments
Continue reading

Tip of the Week: How to Set Your Default Video Player in Windows 10

Tip of the Week: How to Set Your Default Video Player in Windows 10

Windows 10 has applications built into it that give users the ability to accomplish certain tasks, such as listening to music or watching a video, but they might not be the applications that you want or need to use. Today we’re going to help you set the right default video playback options, but you might be able to use these steps to change the default app settings for just about any other purpose, too.

0 Comments
Continue reading

A Field Guide to the Cables Around the Office

A Field Guide to the Cables Around the Office

If there’s one thing you likely have plenty of in your office, it’s cables. Each device you regularly use probably has compatibility with at least one kind of cable… but can you identify them and what they do? Below, we’ll go over a few common cable types so that you’ll be able to do just that.

0 Comments
Continue reading

Is Your Business Leaking Data?

Is Your Business Leaking Data?

Take a moment and consider the data that you have collected during your business’ operations. How valuable is it to you? What would it mean if it were to leak out of your business’ control?

0 Comments
Continue reading

Contact Us

Learn more about what Network Management, Inc. can do for your business.

Call Us Today
Call us today
(703) 848-9000

8229 Boone Blvd.
Suite 250

Vienna, Virginia 22182

Latest Blog

Ransomware is still going strong, and now more than ever it’s important to emphasize the danger that it poses for your organization. Even municipalities and other high-profile targets are at risk of being taken down by ransomware. Since 201...

Account Login

TOP