Network Management, Inc. Blog

Network Management, Inc. has been serving the Virginia area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

You Have to Think Before You Click

You Have to Think Before You Click

Phishing attacks are more commonplace than you might think. Whether it’s scamming someone into sending payments to fund who knows what or simply spreading malware or viruses, these phishing attacks are a part of doing business; therefore, it’s important that you take measures to avoid some of the most clever tricks in the book. Let’s examine some of them.

0 Comments
Continue reading

A Dive Into the US/Huawei Issues

A Dive Into the US/Huawei Issues

Huawei has found itself in an... interesting spot lately. Despite being the top telecom supplier in the world and second in phone manufacturing, many countries have banned the use of the Chinese company’s networking equipment. This is primarily due to the close ties Huawei has with China’s government, and the potential spying Huawei could do.

0 Comments
Continue reading

Do Your Employees Have Any of These Six Hackable Habits?

Do Your Employees Have Any of These Six Hackable Habits?

Habits are hard to break - but there are some habits that simply have to be broken if your business is going to be secure. Many of these habits may have been developed by your employees, which means that it is important that you recognize them.

0 Comments
Continue reading

The Shadowy Exploits of this Hacking Group Could End Up Harming Your Business

The Shadowy Exploits of this Hacking Group Could End Up Harming Your Business

After the WannaCry attack, it would seem that the hacking group known as the Shadow Brokers (or TheShadowBrokers) is in possession of some extremely potent information. This makes it all the more disconcerting that the group has announced the start of their own subscription service.

0 Comments
Continue reading

The Top 4 Technology Issues Every Business Must Plan For

The Top 4 Technology Issues Every Business Must Plan For

Managing a business is difficult enough without technology issues getting in the way of operations. Therefore, when an issue does pop up in a company’s IT, it can be a very frustrating experience for everyone involved. Here are a few common issues that have been known to trip up businesses more than they should.

0 Comments
Continue reading

This Florida City Will Pay 65 Bitcoins to Get Files Back

This Florida City Will Pay 65 Bitcoins to Get Files Back

Florida’s Atlantic coast is a destination for millions of visitors each year. One visitor is costing a coastal city a pretty penny. Riviera Beach, a small city just north of West Palm Beach, has been hit with a major ransomware attack. Today, we’ll tell you how it came to be that the small beach city would make dubious history by paying what is the largest ransomware payout in the short history of these attacks.

0 Comments
Continue reading

End of Life for SQL Server 2008 and 2008 R2 Coming Soon

End of Life for SQL Server 2008 and 2008 R2 Coming Soon

When was the last time you thought seriously about upgrading your business’s technology solutions--particularly its software? We know that administering patches and updates can be challenging for some businesses to maintain, but with the right support, it’s more manageable and certainly more secure. Unfortunately, after a certain period of time passes, Microsoft stops supporting certain outdated solutions, rendering them dangerous and obsolete.

0 Comments
Continue reading

Room Service, You Want Malware?

Room Service, You Want Malware?

In a recent finding, assorted large hotels owned and operated by HEI Hotel & Resorts have been victims of malware since 2015. 20 of the company’s hotels were affected, with customer financial data being exposed in a real-time, point-of-sale malware attack. Have you recently stayed at one of these hotels?

0 Comments
Continue reading

Sick of Spam Calls? VoIP is Partly to Blame

Sick of Spam Calls? VoIP is Partly to Blame

If you have access to a phone, chances are you’ve received a spammy robocall. In fact, you’ve probably received a bunch… but why? And how are these robocalls able to hide behind what looks to be a local number? Unfortunately, it’s because the scammers behind these robocalls are using a helpful business tool… Voice-over-Internet-Protocol telephony, also known as VoIP.

0 Comments
Continue reading

Mobile Malware is on the Rise

Mobile Malware is on the Rise

When considering cybersecurity, it can be easy to overlook the computers that so many of us typically carry with us every day: our smartphones. However, as attacks to mobile devices have risen considerably in the recent past, it is important to recognize the severity of these attacks, as well as how to avoid them.

0 Comments
Continue reading

Is Your Business Leaking Data?

Is Your Business Leaking Data?

Take a moment and consider the data that you have collected during your business’ operations. How valuable is it to you? What would it mean if it were to leak out of your business’ control?

0 Comments
Continue reading

When Is a Phone Not a Phone? When It’s a Security Key

When Is a Phone Not a Phone? When It’s a Security Key

I’d be willing to bet that your phone is within reach at the moment, assuming you aren’t actively using it to read this blog right now. The tendency that people have to always have their phones on them has contributed to these devices becoming more deeply integrated into work processes - including security, via two-factor authentication. For this week’s tip, we’ll discuss how you can leverage an Android device as an added security measure.

0 Comments
Continue reading

Biggest Security Risk: Not Assessing Issues

hacked_400

Let's get theoretical here. Let's say your friend Hank suffers from chest pain. It could be nothing, but chest pain isn't something you want to mess around with, so you suggest that Hank goes to a doctor to get it checked out. There are certain things in life you don't just let happen without getting an assessment to make sure they don't turn into bigger issues, right? Your business's IT security is one of those things.

0 Comments
Continue reading

Is Free Wi-Fi Dangerous?

wifi_400
If you take a laptop out into the world, you've probably seen the notification saying "Wireless Network Detected." Free hotspots are not uncommon in coffee shops, hotels, airports, and other public locations,  There are some things to know before you simply hop on an unfamiliar wireless network.
0 Comments
Continue reading

Misconfigured Database Almost Suplexes the WWE

Misconfigured Database Almost Suplexes the WWE

If you’re a fan of the spectacle put on by World Wrestling Entertainment, Inc., you may find yourself pinned thanks to an error made in some of their databases. This error allowed personal information from three million users to be accessed by anyone who knew where to look.

0 Comments
Continue reading

Why Both Halves Of Your Security Are Equally Important

Why Both Halves Of Your Security Are Equally Important

We talk about network security a lot, and for good reason. The majority of today’s businesses rely heavily on their information systems and there is plenty of danger presented by Internet-based threats. However, some organizations spend so much time worrying about cyber threats that they forget that physical threats exist outside the technology plane. Your organization needs to take steps toward securing its on-site premise, as well as the digital space in which your business exists.

0 Comments
Continue reading

8 Ways to Protect Your Network Against Ransomware

Protect_Your_Network_400

Sometimes old becomes new again. Such is the case with ransomware attacks, which have become popular once more. First released in 1989, ransomware infects a system and “locks out” the user from accessing the device or files on it. Only when the victim agrees to pay a ransom, usually in the form of bitcoins, can the system be unlocked and accessed again.

0 Comments
Continue reading

Google Location Services and How They Apply to the Average User

Google Location Services and How They Apply to the Average User

In the dog days of summer, the news media started running a story about how Google’s location tracking services continue to track people even after they order their mobile device’s OS to quit it. A researcher from Princeton proved these claims by traveling through New York and into New Jersey after turning location services off on for hi Android smartphones, only to be tracked through all the Interstate travel. We’ll take an in-depth look at why Google seemingly knows exactly where you are if you want them to or not.

0 Comments
Continue reading

Why Boarding Pass Selfies Are A Really Bad Idea

Why Boarding Pass Selfies Are A Really Bad Idea

Too often, the desire to share an exciting travel destination with the world overrides any security or safety concerns one might have. Even people who are traveling for business will use social media to document their trip as a method of promoting their attendance at the event over social media. This includes photographing and sharing proprietary documents, like boarding passes and passports.

0 Comments
Continue reading

How to Go About Detecting Cryptomining

How to Go About Detecting Cryptomining

One of the most dangerous and upcoming threats out there is cryptojacking. This process involves a malicious entity installing cryptomining malware on a user’s device without their knowledge or consent, allowing for a steady, reliable stream of income. What are the details behind cryptomining, and how can you keep your devices from becoming complicit in the schemes of hackers? Let’s find out.

0 Comments
Continue reading

Contact Us

Learn more about what Network Management, Inc. can do for your business.

Call Us Today
Call us today
(703) 848-9000

8229 Boone Blvd.
Suite 250

Vienna, Virginia 22182

Latest Blog

The dark web has a bad reputation - and for quite a few good reasons. However, like any tool, there is a lot of good that the dark web can be used for as well. Here, we’ll review what the dark web is, how it can be used (and abused), and wh...

Account Login

TOP