BNMC Blog

Bredy Network Management Corporation (BNMC) has been serving the Northeast area since 1988. BNMC works as a strategic business partner to provide organizations with proven design, implementation and support solutions.

Are Professional Habits Changing During the New Normal?

Are Professional Habits Changing During the New Normal?

Remote collaboration has now become a necessity for the workforce to continue their productivity, so many businesses have adopted the modern pinnacle: video conferencing. With this widespread adoption, widespread eccentricities have also arisen. Let’s take a deep dive into one of the most noticed eccentricities that have come about: waving goodbye at the end of a video conference.

0 Comments
Continue reading

Features to Seek Out in a Business Router

Features to Seek Out in a Business Router

Your business’ wireless is an important factor to consider in your operations, which means that your choice of router is crucial for your overall success. Here, we’re going into a few considerations that you should keep in mind as you select your router.

0 Comments
Continue reading

Tip of the Week: How to Create a Thread on Twitter

Tip of the Week: How to Create a Thread on Twitter

Do you use Twitter to keep in touch with your clients? If you don’t, you should consider it, as it provides a simple way for you to reach the people you want to have as clients. While the brief-message format that Twitter is based on may seem to be an obstacle, Twitter has provided an elegant way to overcome this potential issue. This week, our tip will cover how to create a Twitter thread.

0 Comments
Continue reading

Macs Are Not Immune to Cybersecurity Threats

Macs Are Not Immune to Cybersecurity Threats

It’s a common myth that Apple computers don’t get viruses. It’s not uncommon for a Mac user to chime in and say, “you should have gotten a Mac,” when a PC user mentions getting a virus or malware. 

Let’s unpack this myth, and talk a little about how, no matter what technology you have, you need to protect it.

0 Comments
Continue reading

Not All Cybersecurity Efforts Work to Keep You Secure

Not All Cybersecurity Efforts Work to Keep You Secure

There are many security buzzwords that come into play when the technology available to help secure a business is discussed. The problem is that many of these buzzwords sound great but are actually very poor fits to the real needs of most small and medium-sized businesses. Let’s consider how these buzzwords play into the concept of “security theater” and how this can impact businesses negatively.

0 Comments
Continue reading

Tip of the Week: Changing Your Notification Settings on Android Devices

Tip of the Week: Changing Your Notification Settings on Android Devices

Notifications are one of the Android mobile platform’s most-often-used functions, but they can perhaps also detract from workplace focus the most. To help limit these interruptions, we’re dedicating this week’s tip to better managing these notifications for your productivity.

0 Comments
Continue reading

What You Need to Know About PCI Compliance

What You Need to Know About PCI Compliance

The days of the cash-only business are over. It doesn’t matter if your business is a multinational corporation or you cut grass for a living, accepting payment cards is not only convenient for your customers, most of the time it’s the most secure way to get paid. In an effort to protect the personal and financial information of consumers who have come to depend on their payment cards, the banks that back the credit card industry have developed a regulation that businesses who process cards need to adhere to. Today, we will go over this regulation and how it affects small and medium-sized businesses.

0 Comments
Continue reading

Careful, This Wallpaper will Brick Your Phone. Wait, What?

Careful, This Wallpaper will Brick Your Phone. Wait, What?

Hold onto your hats folks, this article is a rollercoaster. It has been recently discovered that a totally innocuous photograph is causing smartphones to break when set as the wallpaper. Is this some new malicious type of malware? Are dastardly hackers behind this exploit? 

It’s a much crazier story. Let’s take a look

0 Comments
Continue reading

Cisco VoIP phones not working properly with SonicWALL firewalls

BNMC Tech Tip

Question:  We have a new Voice over IP phone system (VoIP) with Cisco VoIP phones, a cloud hosted PBX and SonicWALL firewalls.  We have problems picking up a new line to start a call and we have dropped calls.  How do I fix this?

 

Answer:  The most likely scenario is that you have to set the Consistent NAT feature on the SonicWALL firewall to prevent this from happening.  Please refer to the KBA below on how to make this change.

SonicWALL Knowledge Base Article:  https://www.sonicwall.com/support/knowledge-base/configuring-consistent-nat-network-address-translation/170505836533942/

 

Used to resolve the following issues:

  • Busy Signal when trying to create a new call
  • Invalid line signal when trying to create a new call
  • Dropped calls internal and external
  • Dropped call during conference call
0 Comments
Continue reading

Tip of the Week: Put Policies in Writing for More Impact

Tip of the Week: Put Policies in Writing for More Impact

Are your company’s policies and procedures documented? If not, they should be. Having a policy and procedure manual will act as an easy-to-distribute guide to educate your staff on the expectations you have for them. It will also provide a physical document that can be referenced if employees have questions about anything pertaining to your business. Today, we will give you a few tips on how to best go about completing an employee handbook for your business. 

0 Comments
Continue reading

What You Can Integrate with Your Business’ CRM Solution

What You Can Integrate with Your Business’ CRM Solution

To succeed in business, you need to cultivate relationships with the people you call your prospects and clients. Like any relationship, this takes a lot of work, never mind the fact that you’re dealing with hundreds instead of just one. However, there is a solution to help you with this, called a CRM, and its integrations offer nothing but benefit. Let’s discuss.

0 Comments
Continue reading

Get the Most Value Out of Your IT Budget

Get the Most Value Out of Your IT Budget

Businesses of all sizes have budgetary considerations to observe, so it is crucial that any investments into their operations are optimized to meet each business’ individual goals. With the assistance of a managed service provider, this process is simplified. Let’s go over a few ways that a business can push its IT investment further, especially if it has subscribed to managed services.

0 Comments
Continue reading

Tip of the Week: Time Management that Really Works

Tip of the Week: Time Management that Really Works

You can make more money, but you can’t make more time. Making the most of your time at work isn’t always easy. There are all types of unexpected distractions that take up a lot of time, so you should know what works to help you get the most out of the time you do have. Today, we present three considerations that will help you manage your time better.

0 Comments
Continue reading

Yeah, There’s a Reason Some Scams are So Obvious

Yeah, There’s a Reason Some Scams are So Obvious

We’ve all seen them: the scam emails that are so obviously a scam, you have no idea why a scammer or a cybercriminal would even bother sending them. It just so happens that there is a very good reason that criminals continue to use these transparent attacks, as they have done for centuries.

0 Comments
Continue reading

What If Your Team is Burning Out at Home?

What If Your Team is Burning Out at Home?

As businesses everywhere are now operating with a remote workforce, many are seeing an issue common enough in the office settling in with their at-home employees: burnout. Let’s examine this phenomenon and see what can be done to avoid it.

0 Comments
Continue reading

Tip of the Week: Simplify Your Processes with Workspaces in Google Drive!

Tip of the Week: Simplify Your Processes with Workspaces in Google Drive!

To consolidate their tools, numerous businesses have adopted the centralized benefits of software suites and comprehensive cloud services, like Google’s G Suite offering. However, while all these files and resources may be available through a single service in G Suite, they could easily be stored in far different locations. For this week’s tip, we’re going over how you can fix this by using the Google Drive feature known as Workspaces.

0 Comments
Continue reading

Social Media Services Under Fire

Social Media Services Under Fire

More than three-and-a-half billion people are active social media users, making it one of the best inventions of the 21st century. Recently, however, Twitter, one of the most used social media platforms in the world, got into some hot water when it labeled a tweet from President Donald Trump as having “potentially misleading information”. He then responded by signing an executive order condemning this action as a method of censorship. Let’s briefly unpack this issue.

0 Comments
Continue reading

How Secure is Your Data, Really?

How Secure is Your Data, Really?

Internet-based companies have access to an audience that, at the very least, are extremely trusting of them. There is an expectation that these businesses will fulfill their promises while also protecting the information that their customers and clients provide to them, but are these expectations well-founded? Let’s consider common collection practices companies deploy and how you can keep yourself safe.

Recent comment in this post
Anders Pettersson
Check out our discounted Products Online at DC Supplies https://www.dcsupplies.net/... Read More
Thursday, 11 June 2020 12:52
1 Comment
Continue reading

Tip of the Week: Keyboard Shortcuts You May Not Have Known

Tip of the Week: Keyboard Shortcuts You May Not Have Known

It can’t be denied that the Internet browser is one of the most utilized pieces of software on any workstation, mobile device, or computer of any kind. With so much time spent inside the browser, we thought that we would share some shortcuts that you probably don’t know exist.

0 Comments
Continue reading

What to Focus On as You Train Your Team

What to Focus On as You Train Your Team

Information technology is an incredibly important facet to any modern workplace, which means that your team needs to know how to properly handle the IT you have in place. Here are a few key practices that you need to ensure your team is up to speed on:

0 Comments
Continue reading

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Productivity Business Computing Privacy User Tips Cloud Network Security Email Microsoft Hackers Hosted Solutions Software Business Computer Malware Efficiency Google Communication Data Small Business IT Services Workplace Tips Hardware IT Support Mobile Devices Cloud Computing Tech Term Internet Managed IT Services Smartphone Data Recovery Mobile Device Android Ransomware Backup Innovation Users Outsourced IT Windows Upgrade Smartphones Information Saving Money Data Backup Miscellaneous Facebook Phishing Disaster Recovery Cybersecurity VoIP Server communications Business Management Network Microsoft Office Browser Social Media Windows 10 Business Continuity Productivity Office 365 Managed IT Services Windows 10 Passwords Data Management Internet of Things Vulnerability Remote Monitoring Gadgets Gmail App Word Encryption Apps Mobile Office Chrome Managed Service Provider Managed Service Artificial Intelligence Infrastructure Quick Tips Tip of the week Information Technology Save Money Employer-Employee Relationship Virtual Reality Networking Analytics Settings VPN Access Control Applications Government Router Remote Workers BYOD Money Company Culture IT Support Website WiFi Office Tips Robot Remote Work Avoiding Downtime Google Drive Development Antivirus Big Data Content Filtering Automation Bandwidth HIPAA Paperless Office Conferencing Apple BDR Education Employee-Employer Relationship Storage IT Management Data Security Unified Threat Management Virtual Private Network Computers YouTube Hacker Data storage Collaboration Firewall Display Risk Management Maintenance Spam Document Management Augmented Reality Bring Your Own Device Operating System MSP Vendor Management LiFi Managing Stress Monitors Two-factor Authentication Social Laptop Managed IT Service Hosted Solution Wireless Chromebook Humor Solid State Drive Administration Customer Relationship Management Scam Best Practice The Internet of Things iOS Mouse Training Break Fix End of Support Hard Disk Drive Going Green Downtime Search Marketing Remote Computing Mobile Security Managed Services Printing SaaS Data loss Wi-Fi Business Technology Server Management Password Holiday Telephone Systems Compliance Business Intelligence OneNote Virtualization Touchscreen Managed IT Data Breach desktop Windows 7 IT How To Retail Alert Tablet Social Network Regulations Software as a Service Computing Outlook Spyware K-12 Schools Messaging Health Private Cloud Holidays Buisness Firefox Superfish Uninterrupted Power Supply Cookies Content Huawei Office Samsung Bluetooth Comparison Entertainment Vendor Tech Support Distribution Sports Address Permissions File Sharing Budget Social Networking Digital Signage Data Warehouse Procedure Virtual Desktop Computer Care IBM Computing Infrastructure Professional Services Patch Management Chatbots eWaste Monitoring Solid State Drives User Error Typing Star Wars Shortcuts Mobile Management Current Events Identity Theft Wearable Technology Network upgrade Employee-Employer Relationships Payment Card Nanotechnology Streaming Processor Social Engineering Specifications USB Hybrid Cloud Websites Logistics Motherboard Cables Troubleshooting Business Analysis Twitter PCI DSS Heating/Cooling Multi-Factor Security Corporate Profile Alerts Automobile Identity Continuity Spying National Security Time Management Printer Cryptocurrency G Suite Fraud Cost Management Security Cameras Profiles IT solutions Smart Office Analysis Students Inventory Google Docs Dell Screen Reader Charging Human Error Memory Safety Cybercrime Black Friday Licensing Dongle Scalability Asset Management Emergency Cabling Wires Virus Servers Google Calendar Hacks WannaCry Dark Web Google Wallet Google Maps Solar Updates Network Congestion Peripheral Network Management Bitcoin Assessment Utility Computing Cyber Monday Work Mixed Reality Shadow IT Business Growth Smart Tech Device Reducing Cost Cooperation Service Level Agreement Migration Consulting Memes Legal Voice over Internet Protocol LED Threats Writing Legislation Halloween Microsoft Excel Unified Communications Drones PowerPoint Management SharePoint Windows 8 Hotspot Internet Exlporer Laptops Smart Technology Digital Payment IT Technicians Optimization Dark Data Update Gamification Techology Connectivity Mobility Batteries Mobile Device Management Digital Staff Leominster Lenovo Deep Learning Meetings Disaster Modem FinTech Co-Managed IT Statistics Politics Scary Stories Mail Merge Blockchain Onboarding GDPR Policy Downloads Language Value Managed Services Provider Shortcut Distributed Denial of Service Mirgation Recycling Slack Hard Disk Drives Customer Service COVID-19 VoIP Unified Threat Management Alt Codes IoT Print Toner Myths Work/Life Balance Running Cable Mobile Computing Webcam Black Market Error Law Enforcement Electronic Medical Records Point of Sale Ben McDonald shares Notifications Physical Security Travel Emoji Upgrades Gadget Supercomputer CrashOverride Crowdsourcing Personal Information Botnet Motion Sickness Printers Staffing Administrator Cortana Taxes 3D Printing IT Budget Web Server what was your? Regulation Machine Learning Processors GPS Unsupported Software IT Consultant Cameras Tracking Computer Repair Relocation Financial Mobile Data Cleaning Recovery CCTV How To

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3