BNMC Blog

VP, Chief Operations Officer and co-owner of BNMC with 24+ years of experience developing and managing technical solutions and operations to drive growth and profitability in the IT services industry.

Are You and Your Team Prepared to Deal with Phishing?

Are You and Your Team Prepared to Deal with Phishing?

One of the most prevalent problems that businesses now face are scams known as phishing attacks. When it comes to defending against these attacks, the capability to identify phishing as such is perhaps your greatest asset. Let’s go over a few signs that a message you receive might be a phishing attack.

0 Comments
Continue reading

Tip of the Week: Get More from Your Android Device’s Battery

Tip of the Week: Get More from Your Android Device’s Battery

Is your Android device’s battery becoming a problem? Does it seem like you only get a few hours of use on a full charge? Does it shut off well before it should? These are common problems that happen when a device gets older (not-so-curiously around the time that you pay off the device). If your device’s battery is running slower, there are some steps you can take to ensure that you can get through your day without having to constantly worry about your device shutting down.

0 Comments
Continue reading

Did Google and Apple Secretly Install a COVID-19 Tracking App?

Did Google and Apple Secretly Install a COVID-19 Tracking App?

In a recent security update, most Android and iOS phones received a new opt-in setting related to the COVID-19 Exposure Notification system. What is this? Is your phone being tracked? Let’s take a deeper look at what is going on.

0 Comments
Continue reading

Office 365 is Now Microsoft 365

Office 365 is Now Microsoft 365

Microsoft has been a driving force in personal and business productivity for over 40 years. Over that time one of their most popular offerings has been Microsoft Office. For the past several years the software giant has been bundling their Office platform with OneDrive and calling it Office 365. Millions of individuals and businesses utilize the tools in the platform, which is now being rebranded to Microsoft 365, and that has started to confuse some people. Today, we’ll clarify what this means for businesses and individuals.

0 Comments
Continue reading

Tip of the Week: Some Google Search Tips You May Not Have Known

Tip of the Week: Some Google Search Tips You May Not Have Known

Be honest: you don’t think, “I need to search for this online.” You think, “I need to Google this.” Google is the standard in online search, but so few of us use it to its fullest abilities. Here, we’re sharing a few tips and tricks to make your use of Google Search much more effective.

0 Comments
Continue reading

Get More Done With Automation

Get More Done With Automation

More than ever, data fuels business decision making. To get the best use out of the data your business collects, automated tools can be used. This eliminates the (often impossible) task of manually getting the data together and then analyzing it. Today, we’ll talk about data automation and how rethinking how you look at your data can really help your business improve its operations.

0 Comments
Continue reading

Data Loss: A Business’ Biggest Faux Pas

Data Loss: A Business’ Biggest Faux Pas

Your business’ data is its lifeblood, which means that one of your internal priorities should be protecting it. While we often discuss the importance of your cybersecurity to defend against data theft and similar issues, it is also important to consider what would happen if the data loss was caused due to damage to the infrastructure it was stored on.

0 Comments
Continue reading

Tip of the Week: Some Shortcuts You May Find Useful

Tip of the Week: Some Shortcuts You May Find Useful

Keyboard shortcuts are inherently useful, from the classic cut (ctrl+X), copy (ctrl+C), and paste (ctrl-V) to the ones that fewer people know about. For this week’s tip, we’re shining the spotlight on some of these other (perhaps lesser known) keyboard shortcuts.

0 Comments
Continue reading

Are You Trying to Grow Your Business?

Are You Trying to Grow Your Business?

Small business owners have to confront a lot of issues, with more every day. As your business grows, however, there are too many for you to manage on your own. If your business is too big to control, you will need to expand on your strategies. Today, we will take a look at how decision-making shifts when your business grows. 

0 Comments
Continue reading

How Current Events Should Impact Your Business’ Technology Strategy

How Current Events Should Impact Your Business’ Technology Strategy

While it is very, very hard to say that much good has come from the COVID-19 pandemic, much less to make light of it, it is an important exercise for all of us to take. That’s why we wanted to take a few moments to reflect on the advancements—including an objectively silly one—that this time has helped foster.

0 Comments
Continue reading

Tip of the Week: Adding Google Drive Files to Your Bookmarks

Tip of the Week: Adding Google Drive Files to Your Bookmarks

Your business’ productivity is incredibly important to its processes. Considering this, it is critically important that you enable your team to work as productively as possible. To help you accomplish this, we’re sharing a tip with you: how to add your G Suite documents to your bookmarks bar.

0 Comments
Continue reading

Are Professional Habits Changing During the New Normal?

Are Professional Habits Changing During the New Normal?

Remote collaboration has now become a necessity for the workforce to continue their productivity, so many businesses have adopted the modern pinnacle: video conferencing. With this widespread adoption, widespread eccentricities have also arisen. Let’s take a deep dive into one of the most noticed eccentricities that have come about: waving goodbye at the end of a video conference.

0 Comments
Continue reading

Features to Seek Out in a Business Router

Features to Seek Out in a Business Router

Your business’ wireless is an important factor to consider in your operations, which means that your choice of router is crucial for your overall success. Here, we’re going into a few considerations that you should keep in mind as you select your router.

0 Comments
Continue reading

Tip of the Week: How to Create a Thread on Twitter

Tip of the Week: How to Create a Thread on Twitter

Do you use Twitter to keep in touch with your clients? If you don’t, you should consider it, as it provides a simple way for you to reach the people you want to have as clients. While the brief-message format that Twitter is based on may seem to be an obstacle, Twitter has provided an elegant way to overcome this potential issue. This week, our tip will cover how to create a Twitter thread.

0 Comments
Continue reading

Macs Are Not Immune to Cybersecurity Threats

Macs Are Not Immune to Cybersecurity Threats

It’s a common myth that Apple computers don’t get viruses. It’s not uncommon for a Mac user to chime in and say, “you should have gotten a Mac,” when a PC user mentions getting a virus or malware. 

Let’s unpack this myth, and talk a little about how, no matter what technology you have, you need to protect it.

0 Comments
Continue reading

Not All Cybersecurity Efforts Work to Keep You Secure

Not All Cybersecurity Efforts Work to Keep You Secure

There are many security buzzwords that come into play when the technology available to help secure a business is discussed. The problem is that many of these buzzwords sound great but are actually very poor fits to the real needs of most small and medium-sized businesses. Let’s consider how these buzzwords play into the concept of “security theater” and how this can impact businesses negatively.

0 Comments
Continue reading

Tip of the Week: Changing Your Notification Settings on Android Devices

Tip of the Week: Changing Your Notification Settings on Android Devices

Notifications are one of the Android mobile platform’s most-often-used functions, but they can perhaps also detract from workplace focus the most. To help limit these interruptions, we’re dedicating this week’s tip to better managing these notifications for your productivity.

0 Comments
Continue reading

What You Need to Know About PCI Compliance

What You Need to Know About PCI Compliance

The days of the cash-only business are over. It doesn’t matter if your business is a multinational corporation or you cut grass for a living, accepting payment cards is not only convenient for your customers, most of the time it’s the most secure way to get paid. In an effort to protect the personal and financial information of consumers who have come to depend on their payment cards, the banks that back the credit card industry have developed a regulation that businesses who process cards need to adhere to. Today, we will go over this regulation and how it affects small and medium-sized businesses.

0 Comments
Continue reading

Careful, This Wallpaper will Brick Your Phone. Wait, What?

Careful, This Wallpaper will Brick Your Phone. Wait, What?

Hold onto your hats folks, this article is a rollercoaster. It has been recently discovered that a totally innocuous photograph is causing smartphones to break when set as the wallpaper. Is this some new malicious type of malware? Are dastardly hackers behind this exploit? 

It’s a much crazier story. Let’s take a look

0 Comments
Continue reading

Tip of the Week: Put Policies in Writing for More Impact

Tip of the Week: Put Policies in Writing for More Impact

Are your company’s policies and procedures documented? If not, they should be. Having a policy and procedure manual will act as an easy-to-distribute guide to educate your staff on the expectations you have for them. It will also provide a physical document that can be referenced if employees have questions about anything pertaining to your business. Today, we will give you a few tips on how to best go about completing an employee handbook for your business. 

0 Comments
Continue reading

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing User Tips Privacy Cloud Email Network Security Microsoft Hackers Hosted Solutions Efficiency Business Software Computer Malware Data Communication Google Small Business IT Services Workplace Tips Hardware IT Support Mobile Devices Tech Term Internet Cloud Computing Data Recovery Smartphone Managed IT Services Android Backup Mobile Device Innovation Ransomware Outsourced IT Users Windows Smartphones Information Phishing Upgrade Saving Money Disaster Recovery Facebook Data Backup Miscellaneous Social Media communications Office 365 Business Continuity Network Microsoft Office Business Management Browser Windows 10 VoIP Server Cybersecurity Managed IT Services Productivity Windows 10 Passwords Internet of Things Data Management App Gmail Quick Tips Gadgets Word Vulnerability Remote Monitoring Artificial Intelligence Mobile Office Infrastructure Encryption Managed Service Chrome Managed Service Provider Apps Access Control Analytics VPN Remote Work Applications Website Government Router BYOD Company Culture IT Support Money Settings Tip of the week Remote Workers Information Technology Save Money Google Drive Employer-Employee Relationship Networking Virtual Reality Risk Management Education Apple Storage IT Management Data Security Paperless Office Business Technology Office Tips Virtual Private Network Computers Hacker Data storage Unified Threat Management Big Data Conferencing Employee-Employer Relationship Display Spam Collaboration Firewall WiFi Maintenance Avoiding Downtime Robot Antivirus Development Bandwidth Automation Content Filtering COVID-19 HIPAA YouTube BDR Mobile Security Remote Computing Hard Disk Drive SaaS Printing Server Management Wi-Fi Password Touchscreen Compliance Business Intelligence iOS Virtualization Laptop Managed IT Holiday How To The Internet of Things Tablet Data loss Telephone Systems Retail Alert Regulations desktop Managed Services Outlook Augmented Reality Computing Downtime MSP Two-factor Authentication Marketing Managing Stress Bring Your Own Device Operating System Social OneNote Monitors LiFi Managed IT Service Vendor Management Data Breach Humor Customer Relationship Management Scam Chromebook Hosted Solution Document Management IT Administration Best Practice Windows 7 Wireless Solid State Drive Software as a Service Mouse Break Fix Social Network End of Support Search Going Green Training Assessment Automobile Digital Signage Hacks Data Warehouse Network Management Procedure Scary Stories Solar G Suite Entertainment Vendor Dark Web Distribution Monitoring Bitcoin Solid State Drives Network Congestion Running Cable Work Dell Shortcuts Google Wallet Mobile Management Cyber Monday Smart Tech Employee-Employer Relationships Payment Card Cooperation Service Level Agreement Cabling Streaming Processor Legislation Buisness Voice over Internet Protocol WannaCry Business Growth Logistics Hotspot Virtual Desktop Internet Exlporer Google Maps Troubleshooting Business Analysis SharePoint Writing PCI DSS Sports Legal Hybrid Cloud Microsoft Excel Spying Windows 8 National Security Techology IT Technicians Optimization Unified Communications Security Cameras Drones Profiles Smart Technology Connectivity Analysis Students Lenovo Dark Data Inventory Update Staff Leominster Human Error Memory Statistics Modem FinTech Asset Management Language Value Mobile Device Management Virus Downloads Battery Deep Learning Scalability Mail Merge Blockchain IoT Digital Payment Updates VoIP Unified Threat Management Peripheral Mirgation Recycling Utility Computing Shortcut Distributed Denial of Service Politics Alt Codes Mixed Reality Firefox Superfish Customer Service Shadow IT Cybercrime K-12 Schools Meetings Disaster Device Reducing Cost Bluetooth Comparison Work/Life Balance Cookies Digital Address Permissions Memes Health Private Cloud Computing Infrastructure Professional Services LED Threats Office Samsung Social Networking Migration Consulting Star Wars PowerPoint User Error Management Chatbots eWaste Laptops Budget Patch Management Tech Support Spyware Typing Gamification Wearable Technology Network upgrade Uninterrupted Power Supply Mobility Batteries Specifications Nanotechnology Alerts USB File Sharing Co-Managed IT Current Events Heating/Cooling Multi-Factor Security Social Engineering Motherboard Cables Computer Care IBM Fraud Cost Management Onboarding GDPR Time Management Printer Policy Twitter Halloween Identity Continuity Managed Services Provider Websites Identity Theft Slack Cryptocurrency Hard Disk Drives Smart Office Print Toner Myths Black Friday Screen Reader Charging Emergency Holidays Licensing Dongle IT solutions Content Huawei Servers Google Calendar Safety Wires Corporate Profile Messaging Google Docs Personal Information Botnet Supercomputer CrashOverride Cortana 3D Printing Regulation Motion Sickness Staffing Machine Learning Administrator Processors Taxes IT Budget Web Server what was your? Unsupported Software GPS Computer Repair Relocation Printers IT Consultant Cameras Mobile Data Recovery How To Tracking Mobile Computing Cleaning Black Market CCTV Webcam Law Enforcement Electronic Medical Records Financial Notifications Error Physical Security Emoji Point of Sale Ben McDonald shares Upgrades Gadget Travel Crowdsourcing

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3