Network Management, Inc. Blog

With over 25 years of experience in Information Technology, Rafiq Masri is one of the most accomplished, versatile and certified (Microsoft MCSE, Cisco CCNA, CCDA, CNE, Citrix, Neverfail, HP, and more) engineers in the field. He has spent the past 2 ½ decades administering and supporting a wide range of clients and has helped position Network Management, Inc. (NMI) as a leader in the IT Managed Services space in the Washington DC Metro Area.

Rafiq has built a reputation for designing, building and supporting top notch IT infrastructures in the small to mid-size market to match the business objectives and goals of his clients.

Embracing the core values of integrity, innovation, and reliability, Rafiq has a very loyal client base with some customer relationships dating back 20+ years.

Rafiq holds a bachelor’s degree in Mechanical Engineering from the University of Michigan and has completed graduate programs in Software Engineering and Business at Harvard and George Mason University. Rafiq is a former founder and CEO of Automation, Inc. in Ann Arbor, Michigan as well as a valued speaker on entrepreneurship and technology at industry events such as ExpoTech and others.

Make Sure Your Software Is Licensed, Or The BSA May Come Knocking

Make Sure Your Software Is Licensed, Or The BSA May Come Knocking

Despite what some songs say, the best things in life aren’t always free. Take, for instance, your software. If you or one of your employees find and download a “free” version of some business-critical application instead of properly purchasing a license, you risk catching the eye of the BSA.

0 Comments
Continue reading

Cracking Multi-Factor Authentication Requires A Lot More Than Guessing A Password

Cracking Multi-Factor Authentication Requires A Lot More Than Guessing A Password

When discussing identity authentication when IT is concerned, the use of passwords is most likely the first thing to pop into one’s mind. However, there are other methods of authentication that may be combined with the use of a password to increase security. This practice is known as Multi-Factor Authentication, or MFA, although it is also called Two-Factor Authentication, or 2FA.

0 Comments
Continue reading

Why Boarding Pass Selfies Are A Really Bad Idea

Why Boarding Pass Selfies Are A Really Bad Idea

Too often, the desire to share an exciting travel destination with the world overrides any security or safety concerns one might have. Even people who are traveling for business will use social media to document their trip as a method of promoting their attendance at the event over social media. This includes photographing and sharing proprietary documents, like boarding passes and passports.

0 Comments
Continue reading

When Designing A Data Backup Plan, Give Tape A Pass

When Designing A Data Backup Plan, Give Tape A Pass

If you suddenly were to find yourself in a data-loss situation, you would want to have some sort of backup in place to protect your critical data. However, not all backup solutions are the same, and some will do a better job than others at keeping your data safe while remaining convenient to the needs of a business. As an example, let’s compare tape backup to a cloud-based backup and data recovery solution.

0 Comments
Continue reading

Tip of the Week: Consider Using Your Own Router

Tip of the Week: Consider Using Your Own Router

Your Internet connection is arguably one of the most important parts of your information systems, but you might find yourself limited by the hardware provided by your Internet service provider (ISP). This could come in the form of a modem-router combination provided by your ISP, which prompts the question of whether or not you really need to use what they provide.

0 Comments
Continue reading

Keep Your Guard Up Against VoIP Fraud

Keep Your Guard Up Against VoIP Fraud

As with all innovative technology, there is only a certain amount of time you’ll have until someone inevitably finds ways to exploit it. One such exploitation of a common technology that has flown under the radar and avoided widespread knowledge by users is VoIP fraud. VoIP fraud is no different than other cybercrime - the exploitation of a network or data to procure ill-gotten gains.

0 Comments
Continue reading

Is Your Business a Target for Internet-Based Threats?

Is Your Business a Target for Internet-Based Threats?

It feels like only yesterday when the only action you needed to take to protect a computer was to install antivirus software. Back in the year 2000, there were around 50,000 known computer viruses. Today, that number is over 185 million unique malicious threats.

0 Comments
Continue reading

Tip of the Week: Solve (Don’t Complicate) Problems

Tip of the Week: Solve (Don’t Complicate) Problems

Have you ever heard someone refer to an activity as “yak shaving?” Also known as “bikeshedding,” this is effectively a way to describe a specific kind of procrastination. For this week’s tip, we’ll explore how a freshly barbered yak relates to your business’ productivity, and how to keep you and your employees on the right track.

0 Comments
Continue reading

New Technologies You’ll Soon See in Smartphones

New Technologies You’ll Soon See in Smartphones

The smartphone has changed the world as much as any physical product over the past decade-plus. Today, people have near-ubiquitous access to the riches of the Internet. They can communicate in a multitude of ways. They have applications that can help them live the life they find most fulfilling.

0 Comments
Continue reading

Messaging is an Important Communications Tool for SMBs

Messaging is an Important Communications Tool for SMBs

Any business that wants to have sustained success needs to have a strong communications strategy. Typically, businesses used a telephone service from the telephone company, an email server they hosted themselves, and their official company letterhead that they’d use for all their formal correspondence.

0 Comments
Continue reading

Tip of the Week: Getting Around the G Suite

Tip of the Week: Getting Around the G Suite

Depending on what your preferences are for a productivity suite, you might find that the conventional options are slightly less optimal for your needs. Google’s G-Suite solution for businesses can offer your organization a great way to access common applications for a multitude of purposes.

0 Comments
Continue reading

Augmented Reality is Promising for Small Businesses

Augmented Reality is Promising for Small Businesses

Every so often, we encounter an IT solution that could prove to be intensely beneficial to businesses when it can be fully adopted, but also has a few obstacles to its complete implementation. Here, we’ll review how augmented reality can be used practically in the future, and the challenges that will need to be overcome in order to do so.

0 Comments
Continue reading

How to More Securely Utilize Your Email

How to More Securely Utilize Your Email

Studies have shown that email still has a safe place in the business world, with an estimated 124.5 billion business emails sent and received each day. However, are the emails that your business is actually receiving safe? If you aren’t adopting the following practices in your daily business operations, they probably aren’t.

0 Comments
Continue reading

Tip of the Week: Embrace the Right Software for Your Business

Tip of the Week: Embrace the Right Software for Your Business

It is not unusual for the business that has been in business for a while to have used a number of software titles that either are completely ineffective, or are known to be security risks. The use of cheap, or free, software is prevalent among individuals and organizations that don’t realize that it pays to have a software strategy in place. For this week’s tip, we’ll talk about software and how something so crucial to the success or failure of a business needs to be taken seriously.

0 Comments
Continue reading

5 Questions to Ask When Selecting a Cloud Solution

5 Questions to Ask When Selecting a Cloud Solution

The cloud is swiftly becoming the method by which most computing is done, especially as far as businesses are concerned. You may have been considering adding the cloud to your own IT strategy. However, in order to make your best decision, there are a few questions you need to ask

0 Comments
Continue reading

Considering Payment Cards and Business Use of Them

Considering Payment Cards and Business Use of Them

People use all types of payment options. With more people moving away from cash as a payment option, businesses have to accept and process more payment card transactions. Depending on your business, it could put you in a very precarious position. Today, we will look at payment card statistics, and how the increase in payment card usage could end up be a devastating problem for the modern business.

0 Comments
Continue reading

Tip of the Week: 4 Tricks to Excel at Excel

Tip of the Week: 4 Tricks to Excel at Excel

When it comes to creating spreadsheets, the go-to option for many businesses is Microsoft Excel. There are a few little-known tricks that can make creating your Excel spreadsheets even faster. For this week’s tip, we’ll go over a few.

0 Comments
Continue reading

4 Cyber Security Bad Habits that You Can Start to Fix Right Now

4 Cyber Security Bad Habits that You Can Start to Fix Right Now

When it comes to hacking and cybercrime, it can literally be a few seconds that will ruin your business. One single chink in your network’s armor is all it takes for your data to be compromised. Modern SMBs need to take every opportunity to ensure they’re using best practices to help keep their network safe and secure. Here’s a look at four network security bad habits that you and your team can fix today.

0 Comments
Continue reading

The Key Facets to Managing Personally Identifiable Information

The Key Facets to Managing Personally Identifiable Information

From an objective point of view, the amount of trust that people put with companies based on the Internet is pretty astounding. In addition to providing whatever product or service they offer, these companies are often given highly sensitive information with hardly a second thought from the consumer. Here, we’ll review how millions of people learn that this trust was misplaced each year, why these companies want all this data in the first place, and how important it is to follow a few data collection best practices in your own business.

0 Comments
Continue reading

Tip of the Week: NIST Password Guidelines

Tip of the Week: NIST Password Guidelines

Passwords have always been important to businesses, but they are priorities for organizations in certain industries. Government-based organizations in particular need to be concerned about using secure passwords. Of course, not all businesses are government-based, but there’s a thing or two your own can learn about some of their password practices.

0 Comments
Continue reading

Contact Us

Learn more about what Network Management, Inc. can do for your business.

Call Us Today
Call us today
(703) 848-9000

8229 Boone Blvd.
Suite 250

Vienna, Virginia 22182

Latest Blog

It feels like only yesterday when the only action you needed to take to protect a computer was to install antivirus software. Back in the year 2000, there were around 50,000 known computer viruses. Today, that number is over 185 million uni...

Account Login

TOP