Network Management, Inc. Blog

Network Management, Inc. has been serving the Virginia area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why (and How) to Disable Wi-Fi Calling

Why (and How) to Disable Wi-Fi Calling

Users of Android devices might notice that they have the option to make a call using their Wi-Fi in addition to using their mobile service or data. While there is certainly something to be said for using a wireless connection when you don’t have mobile service, there are circumstances when you might not want to default to using a Wi-Fi...

Read More
Don’t Let Your Business Be Put on Hold by an IT Issue

Don’t Let Your Business Be Put on Hold by an IT Issue

  • By Rafiq Masri
  • November 14, 2022
  • Business

When trying to determine if a certain piece of technology should be replaced or just taken away entirely, you should first ask yourself if the technology affects your products or services in any discernible way. If the technology is something that helps with productivity and efficiency to aid in the production or delivery of said product or service, then it’s...

Read More
Why You Shouldn’t Follow Links You Randomly Receive

Why You Shouldn’t Follow Links You Randomly Receive

  • By Rafiq Masri
  • November 11, 2022
  • Security

Paypal: Unusual activity suspended your account. For your safety confirm your identity here: [link] We’re here to tell you, very simply, not to follow links that are in messages like these, and to instead confirm their legitimacy by navigating to the website directly in a new browser. (more…)

Read More
Internet Connectivity and Routers, Explained

Internet Connectivity and Routers, Explained

Your business might depend on its Wi-Fi, but do you know what the difference between the various Internet channels mean for your connection? You might be in the process of upgrading your router, or maybe you just have questions about what the difference between a “dual band” router is. Let’s discuss routers with today’s blog. (more…)

Read More
What Counts as Personally Identifiable Information?

What Counts as Personally Identifiable Information?

  • By Rafiq Masri
  • November 7, 2022
  • Security

We frequently discuss the importance of keeping PII—personally identifiable information—secure, but what does this include? What data qualifies as PII? Here, we’re going to lock down on a definition (and you may be surprised by what this definition covers). (more…)

Read More
Do Your IT Costs Seem Inflated? Ours Do, Too

Do Your IT Costs Seem Inflated? Ours Do, Too

  • By Rafiq Masri
  • November 4, 2022
  • Business

The technology your business uses can be viewed as a mandatory expense nowadays since so much of your business is tied to its functionality. The more IT costs rise, however, the less small and mid-sized businesses like ours can do with our IT budgets. These costs are affecting the way we think about our technology and you are probably in...

Read More
Tip of the Week: How to Clear the Cache on Your Android Device

Tip of the Week: How to Clear the Cache on Your Android Device

In order for your device to run at optimal efficiency, you sometimes need to clear the temporarily stored data on your device known as the cache. You can do this for your applications on your Android device, as well as the browsers you frequently use. Let’s go over how you can do both to speed up your device a bit....

Read More
The Phisher—A Modern Take on The Raven

The Phisher—A Modern Take on The Raven

  • By Rafiq Masri
  • October 31, 2022
  • Security

What if Edgar Allan Poe wrote “The Raven” during the information age? (more…)

Read More
Why BEC is Such a Negative Circumstance for Any Organization

Why BEC is Such a Negative Circumstance for Any Organization

  • By Rafiq Masri
  • October 28, 2022
  • Security

It doesn’t always take a complicated malware or ransomware attack to break your business. Sometimes it’s as easy as someone sending you an email and pretending they have authority over you. Compromising a business email is one of the most common and easy hacking attacks to pull off, so you should be aware of how to put a stop to it....

Read More
Microsoft May Have Opened Up Millions of PCs to a Potential Cybersecurity Threat

Microsoft May Have Opened Up Millions of PCs to a Potential Cybersecurity Threat

  • By Rafiq Masri
  • October 26, 2022
  • Security

Microsoft generally takes security very seriously, and for the most part, if you keep your Windows and Server operating systems updated, you can generally depend on some base-level security and stability. Unfortunately, it was recently discovered that, for almost two years, a very critical defense mechanism within Windows wasn’t being properly secured. (more…)

Read More