Network Management, Inc. Blog

Network Management, Inc. has been serving the Virginia area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How To Get Better at Managing Your Time

  • By Rafiq Masri
  • July 5, 2020
  • How To

Countless business professionals all over the world are finding that they don’t have enough time in their work day to handle all of their responsibilities. The truth of the matter is that this is hardly something that’s anyone’s fault. If anything, it’s the poor time management skills that come from bad practices in the office. Today's tip is dedicated to...

Read More

Having Experts On Your Company’s Side Makes a Big Difference

There is an inherent value in approaching experts regarding any services you need, whether it’s building maintenance or your technology. It really helps to have IT professionals to turn to for any and all questions or concerns you might have regarding your computers, servers, and any other technological asset your organization might need to succeed. You should know that NetMGM...

Read More

8 Ways to Protect Your Network Against Ransomware

Sometimes old becomes new again. Such is the case with ransomware attacks, which have become popular once more. First released in 1989, ransomware infects a system and “locks out” the user from accessing the device or files on it. Only when the victim agrees to pay a ransom, usually in the form of bitcoins, can the system be unlocked and...

Read More

How to Set Your Out of Office Messages

  • By Rafiq Masri
  • July 4, 2020
  • How To

The business world depends on communication to function efficiently. In fact, you might say it’s grown to be little too connected, to the point where it’s considered odd or rude to not receive a reply back soon after sending an email. Even though it’s important to take a break every so often to maintain your sanity, it’s also important to...

Read More

The Wild Ride That Is Data Privacy, Part II

Earlier this week, we published the first part of our blog, “The Wild Ride That Is Data Privacy” where we went over the systems in place in society that are designed to put your privacy at risk. We continue the article today. Please visit our blog to re. In the first part of our look at data privacy, we went...

Read More

The Wild Ride That Is Data Privacy, Part I

Data Privacy is a huge topic these days. We often talk about data security when it comes to protecting your organization’s information, but we often don’t go into a lot of depth when it comes to protecting an individual’s information. It’s important to understand how personal information moves around, so you know what you are up against when it comes...

Read More

Google Location Services and How They Apply to the Average User

In the dog days of summer, the news media started running a story about how Google’s location tracking services continue to track people even after they order their mobile device’s OS to quit it. A researcher from Princeton proved these claims by traveling through New York and into New Jersey after turning location services off on for hi Android smartphones,...

Read More

Tip of the Week: How to Deactivate Skype

Not too long ago, as of this writing, Microsoft began including Skype in their PCs. As a result, they created accounts for Skype based on a user’s Microsoft account…. Surprise! Now, you may not be comfortable with the prospect of people being able to find you via Skype, which is why we’re offering some tips to hide yourself from others....

Read More

A Quick Look at Professional Services Management Software

As we come up on tax time, we’re reminded just how important the professional services are. There is very little that businesses do without consultation. After all, consultants are just professionals in a field giving you advice on how to navigate forward. Lawyers, financial consultants, accountants, and advertising and marketing specialists are just a few of the crucial people that...

Read More

How to Go About Detecting Cryptomining

One of the most dangerous and upcoming threats out there is cryptojacking. This process involves a malicious entity installing cryptomining malware on a user’s device without their knowledge or consent, allowing for a steady, reliable stream of income. What are the details behind cryptomining, and how can you keep your devices from becoming complicit in the schemes of hackers? Let’s...

Read More