Network Management, Inc. Blog

Network Management, Inc. has been serving the Virginia area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Enterprise Security for the Small and Medium-Sized Business

Enterprise Security for the Small and Medium-Sized Business

Does your organization take network security as seriously as it should? It’s easy to forget with today’s advanced security offerings that the online realm is a dangerous place, but the truth of the matter is that you can’t risk your business’ security--not even for a moment. We’ll walk you through how your organization can minimize threats to security, as well as give you a primer regarding what’s at stake.

0 Comments
Continue reading

This Year’s CES Was All About Surveillance Technology

This Year’s CES Was All About Surveillance Technology

Held from Sunday, January 5 to Friday, January 10, 2020, this year’s Consumer Electronics Show took place in Las Vegas, Nevada. This event is an annual opportunity for startups and major companies alike to showcase their newest consumer-focused products. However, this year’s show has many security experts expressing sincere and legitimate concerns.

0 Comments
Continue reading

How a Firewall Helps Protect Your Systems

How a Firewall Helps Protect Your Systems

As the data that you store on your business’ computers is valuable, it is inherently a desirable target to cybercriminals and scammers alike. This means that it is in your best interest to have comprehensive protections in place to protect this data from their activities. Let’s go over exactly what a firewall is, and how they make up a critical portion of your business’ defenses.

0 Comments
Continue reading

What is Encryption, Anyways?

What is Encryption, Anyways?

You hear about encryption being used all the time, almost to the point of it being synonymous with security, but what does it really mean to have encryption on your business’ data and devices? We’ll walk you through how encryption can help you in your day-to-day struggle to secure the integrity of your organization’s communication and infrastructure.

0 Comments
Continue reading

Facebook Privacy a Concern, Part III

Facebook Privacy a Concern, Part III

Most of us have a love-hate relationship with social media. A particularly controversial platform we discuss quite a bit on our blog is Facebook. Privacy is a monumental concern in the digital age, so today we thought we would go over settings you might not even realize are enabled on your Facebook profile. 

0 Comments
Continue reading

Facebook Privacy a Concern, Part II

Facebook Privacy a Concern, Part II

If you haven’t read part one of our Facebook privacy blog, it wouldn’t hurt for you to go back and read that one first. Today, we will be building off of that blog, teaching people how to properly configure their accounts to give them the best chance to lock down their private information.

Of course, Facebook, being one of the predominant web-based services in the world, has a checkered history when it pertains to individual’s privacy. In fact, I think a fair share of its ongoing troubles when it comes to individual privacy have a lot to do with their overwhelming success.

0 Comments
Continue reading

Facebook Privacy a Concern, Part I

Facebook Privacy a Concern, Part I

Would you consider Facebook to be popular? It’s an interesting question. It’s like asking people if they think McDonalds is popular. These days Facebook is used by one in every four people in the world, yet there are very few people that will actively come to the social media giant’s defense, let alone admit to spending nearly half of their time online on the site (either via an Internet browser or via an app).

0 Comments
Continue reading

Researchers Find 23 IoT Device Manufacturers' Lack of Security Disturbing

Researchers Find 23 IoT Device Manufacturers' Lack of Security Disturbing

At the recent DEF CON security conference in Las Vegas, hackers taking part in the IoT Village tested the security of a variety of Internet-of-Things devices that are widely available to consumers. They found dozens of vulnerabilities, reinforcing the idea that IoT-device manufacturers need to do a better job securing their products.

0 Comments
Continue reading

Former Fraudster Says to Stop Using Debit Cards

Former Fraudster Says to Stop Using Debit Cards

When over 16 million people are scammed out of over $16 billion, there’s likely some type of problem that needs to be addressed. Famous con artist, Frank Abagnale, the man immortalized in Steven Spielberg’s Catch Me If You Can, a movie that was based off his own memoir, has been working as a security consultant with the Federal Bureau of Investigation for over 45 years. In that time, he has become an expert in cybersecurity and fraud prevention.

0 Comments
Continue reading

Room Service, You Want Malware?

Room Service, You Want Malware?

In a recent finding, assorted large hotels owned and operated by HEI Hotel & Resorts have been victims of malware since 2015. 20 of the company’s hotels were affected, with customer financial data being exposed in a real-time, point-of-sale malware attack. Have you recently stayed at one of these hotels?

0 Comments
Continue reading

Is Free Wi-Fi Dangerous?

wifi_400
If you take a laptop out into the world, you've probably seen the notification saying "Wireless Network Detected." Free hotspots are not uncommon in coffee shops, hotels, airports, and other public locations,  There are some things to know before you simply hop on an unfamiliar wireless network.
0 Comments
Continue reading

The Wild Ride That Is Data Privacy, Part II

The Wild Ride That Is Data Privacy, Part II

Earlier this week, we published the first part of our blog, “The Wild Ride That Is Data Privacy” where we went over the systems in place in society that are designed to put your privacy at risk. We continue the article today. Please visit our blog to re.

0 Comments
Continue reading

The Wild Ride That Is Data Privacy, Part I

The Wild Ride That Is Data Privacy, Part I

Data Privacy is a huge topic these days. We often talk about data security when it comes to protecting your organization’s information, but we often don’t go into a lot of depth when it comes to protecting an individual’s information. It’s important to understand how personal information moves around, so you know what you are up against when it comes to protecting your privacy online. This post is going to be a bit of a deep rabbit hole, but I really want to shine some light on the subject for my readers.

0 Comments
Continue reading

Google Location Services and How They Apply to the Average User

Google Location Services and How They Apply to the Average User

In the dog days of summer, the news media started running a story about how Google’s location tracking services continue to track people even after they order their mobile device’s OS to quit it. A researcher from Princeton proved these claims by traveling through New York and into New Jersey after turning location services off on for hi Android smartphones, only to be tracked through all the Interstate travel. We’ll take an in-depth look at why Google seemingly knows exactly where you are if you want them to or not.

0 Comments
Continue reading

Why Boarding Pass Selfies Are A Really Bad Idea

Why Boarding Pass Selfies Are A Really Bad Idea

Too often, the desire to share an exciting travel destination with the world overrides any security or safety concerns one might have. Even people who are traveling for business will use social media to document their trip as a method of promoting their attendance at the event over social media. This includes photographing and sharing proprietary documents, like boarding passes and passports.

0 Comments
Continue reading

Keep Your Guard Up Against VoIP Fraud

Keep Your Guard Up Against VoIP Fraud

As with all innovative technology, there is only a certain amount of time you’ll have until someone inevitably finds ways to exploit it. One such exploitation of a common technology that has flown under the radar and avoided widespread knowledge by users is VoIP fraud. VoIP fraud is no different than other cybercrime - the exploitation of a network or data to procure ill-gotten gains.

0 Comments
Continue reading

4 Cyber Security Bad Habits that You Can Start to Fix Right Now

4 Cyber Security Bad Habits that You Can Start to Fix Right Now

When it comes to hacking and cybercrime, it can literally be a few seconds that will ruin your business. One single chink in your network’s armor is all it takes for your data to be compromised. Modern SMBs need to take every opportunity to ensure they’re using best practices to help keep their network safe and secure. Here’s a look at four network security bad habits that you and your team can fix today.

0 Comments
Continue reading

These Companies Provide A Benchmark For Password Strength

These Companies Provide A Benchmark For Password Strength

We are never shy about insisting that certain standards are met when devising passwords, but many major companies are seemingly far less worried about password security than we are. A recent study conducted by the password manager developer Dashlane paints a troubling picture of the state of password security, providing anecdotal evidence in the form of some very well-known and trusted companies scoring at the low end of the password security spectrum.

0 Comments
Continue reading

Taking a Look at Facebook’s Recent Controversies

Taking a Look at Facebook’s Recent Controversies

The past few years certainly haven’t been very good for Facebook. After going public in 2012, Facebook acquired several organizations and applications to make waves in the market. The company is now responsible for a considerable amount of data, which has led to several data breaches, exacerbating the media and creating skepticism toward the social media giant.

0 Comments
Continue reading

Sexy Scam Relies on Your Belief that Someone Was Watching

Sexy Scam Relies on Your Belief that Someone Was Watching

Internet scams are major threats to individuals and business because all it takes is one wrong click of the mouse and a user is embroiled in an unenviable situation. One such scam that is happening today is designed to catch users with their pants down, so to speak.

0 Comments
Continue reading

Contact Us

 

Call Us Today
Call us today
(888) 748-2525

 

Latest Blog

What would you think if I told you that you could break your smartphone by setting the wrong picture as its background? Well, you had better start thinking it, as a photograph has been discovered that has precisely that effect when it is se...

Account Login

TOP