BNMC Blog

Bredy Network Management Corporation (BNMC) has been serving the Northeast area since 1988. BNMC works as a strategic business partner to provide organizations with proven design, implementation and support solutions.

What’s it Going to Take? Cybersecurity

What’s it Going to Take? Cybersecurity

The COVID-19 pandemic has changed the way that a lot of businesses are approaching cybersecurity. In normal times, businesses will periodically try to make improvements to their organizational security and pounce all over events that could put their network and data at risk. While this strategy has worked, the new normal brought on by COVID-19 has IT administrators and business decision makers focused on maintaining resilience regardless of the financial and operational stressors they encounter. In today’s article we will look to identify the major shifts businesses have had to make, and how a consistent approach to cybersecurity is giving some companies an advantage.

0 Comments
Continue reading

Did Google and Apple Secretly Install a COVID-19 Tracking App?

Did Google and Apple Secretly Install a COVID-19 Tracking App?

In a recent security update, most Android and iOS phones received a new opt-in setting related to the COVID-19 Exposure Notification system. What is this? Is your phone being tracked? Let’s take a deeper look at what is going on.

0 Comments
Continue reading

How Current Events Should Impact Your Business’ Technology Strategy

How Current Events Should Impact Your Business’ Technology Strategy

While it is very, very hard to say that much good has come from the COVID-19 pandemic, much less to make light of it, it is an important exercise for all of us to take. That’s why we wanted to take a few moments to reflect on the advancements—including an objectively silly one—that this time has helped foster.

0 Comments
Continue reading

7 Necessities before Sending Your Workforce Remote

Due to the COVID-19 outbreak, many companies are working from home to facilitate social-distancing and keep their workforce healthy. However, it’s not as simple as sending your employees home, firing up personal laptops and getting back to work. Here are seven things you need to have lined up in order to successfully deploy your remote workforce.  

  • Secure Remote Access: Employees should not have open access to everything on their work systems from their personal computers. This keeps company data protected. In order to be productive through this pandemic, however, employers will need to provide a secure connection utilizing VPN or remote access software. These solutions will mirror the employee’s work desktop without housing all of the data on the individual’s personal system, allowing them to seamlessly continue work.
  • File Sharing Capabilities: While people will be working in isolation, they must still be able to collaborate. File sharing/group editing software will be critical to moving forward creative or documentation projects through real-time editing, commenting, and versioning. Software like Microsoft Office 365 Teams / Sharepoint,  Google G-Suite Docs or Dropbox for Business fill this need securely.
  • Enterprise Level Antivirus: Basic home-level antivirus is not sufficient, particularly in secured industries. Extend your enterprise-level antivirus to home systems that will be accessing your network to create an added layer of protection. You may also consider deploying firewalls on top of individual’s home networks to create the same secure connection employees experience in your office.
  • Video Conferencing: Meetings must go on while people work remote; however, voice-only leaves much to be desired in terms of tone and context. We highly recommend putting in place video conferencing options. You can implement something as simple as Google Duo/FaceTime, or something more feature intensive, like Zoom or GoTo Meeting.
  • Messaging Software: You can’t just spin your chair around to talk to your co-worker when working remote, yet it’s not efficient to always pick up the phone. We recommend implementing a messaging software like Microsoft Teams or Slack to open communication channels and allow employees to continue to interact quickly and accurately. Utilizing these tools, you can set up one-on-one conversations or set up channels to facilitate team communication.
  • Phone: A strong VoIP solution will allow employees to take their phone numbers remote to their cellphones without giving out their cellphone numbers. Office calls will transfer seamlessly to the employee’s cellphones, voice mails will be sent via email, and the employee can dial-out using a phone application to maintain office functionality.
  • Remote Access Policy: Prior to providing access to your employees, put in place a clear access policy that acknowledges that your company monitors whatever they do while connected. Employees should be encouraged to act as if they are on site even while working remote and reminded that punishments for doing something illegal/against company policy will apply.

The COVID-19 situation is ever-changing. Schools across the nation have been closed and events have been cancelled. While it may make sense to keep your employees on-site for now, we believe it’s important to have a plan should you need to close your physical offices. Getting these seven pieces of the puzzle in line will prepare you to take your workforce remote. For assistance implementing these things, contact us at (978) 482-2020 or Sales@bnmc.net .

0 Comments
Continue reading

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing User Tips Privacy Cloud Email Network Security Microsoft Hackers Hosted Solutions Efficiency Business Software Computer Malware Data Communication Google Small Business IT Services Hardware IT Support Workplace Tips Mobile Devices Cloud Computing Internet Tech Term Smartphone Data Recovery Managed IT Services Android Backup Mobile Device Innovation Ransomware Outsourced IT Users Upgrade Information Windows Smartphones Phishing Saving Money Miscellaneous Data Backup Disaster Recovery Facebook Social Media Business Continuity communications Office 365 Cybersecurity Network VoIP Microsoft Office Browser Server Business Management Windows 10 Managed IT Services Productivity Windows 10 Passwords Internet of Things Data Management Word App Vulnerability Remote Monitoring Gmail Quick Tips Gadgets Apps Encryption Artificial Intelligence Chrome Managed Service Provider Mobile Office Infrastructure Managed Service Remote Workers Website Virtual Reality Analytics Employer-Employee Relationship Government Networking COVID-19 VPN Access Control BYOD Applications Router Remote Work Money Settings IT Support Company Culture Information Technology Save Money Google Drive Tip of the week Risk Management Avoiding Downtime Antivirus Development Education Apple Office Tips Storage HIPAA BDR Big Data Computers IT Management Data Security Hacker Data storage Paperless Office Business Technology Display Virtual Private Network Spam WiFi Unified Threat Management Conferencing Robot Employee-Employer Relationship YouTube Bandwidth Maintenance Automation Content Filtering Collaboration Firewall End of Support Managed IT Service OneNote Going Green Document Management Data Breach Customer Relationship Management Scam Remote Computing Windows 7 Solid State Drive Software as a Service Break Fix IT Wireless Search Printing Social Network Laptop SaaS Password Training The Internet of Things Wi-Fi Hard Disk Drive Virtualization Mobile Security Holiday Downtime Retail Alert Server Management Compliance Business Intelligence Marketing iOS Touchscreen Managed IT Computing Outlook Tablet Data loss How To Bring Your Own Device Operating System Social Regulations Monitors LiFi Telephone Systems Vendor Management desktop Chromebook Managed Services Hosted Solution Humor Administration MSP Best Practice Augmented Reality Managing Stress Mouse Two-factor Authentication Laptops Patch Management Star Wars Memes PowerPoint User Error Cryptocurrency Chatbots eWaste Scary Stories Specifications IT solutions Nanotechnology Spyware Safety Google Docs Wearable Technology Network upgrade Running Cable Management Uninterrupted Power Supply Mobility Batteries Hacks Motherboard Cables Buisness Computer Care IBM Alerts USB File Sharing Gamification Co-Managed IT Heating/Cooling Multi-Factor Security Sports Network Congestion Managed Services Provider Google Wallet Fraud Cost Management Virtual Desktop Onboarding GDPR Time Management Printer Bitcoin Identity Continuity Print Toner Myths Black Friday Screen Reader Charging Identity Theft Slack Hard Disk Drives Business Growth Smart Office Policy Wires Corporate Profile Writing Messaging Emergency Legal Licensing Dongle Content Huawei Servers Google Calendar Solar G Suite Entertainment Vendor Dark Web Unified Communications Drones Assessment Automobile Holidays Digital Signage Data Warehouse Network Management Windows 8 Update Shortcuts Mobile Management Cyber Monday Smart Tech Distribution Monitoring Solid State Drives Work Procedure Dell Dark Data Mobile Device Management Voice over Internet Protocol WannaCry Employee-Employer Relationships Deep Learning Cooperation Service Level Agreement Cybercrime Cabling Streaming Processor Legislation Hybrid Cloud Microsoft Excel Hotspot Internet Exlporer Payment Card Google Maps Politics Troubleshooting Business Analysis SharePoint Customer Service Security Cameras Profiles Smart Technology Connectivity Logistics Work/Life Balance Spying National Security Techology Alt Codes IT Technicians Optimization PCI DSS Statistics Modem FinTech Office Samsung Analysis Students Lenovo Staff Leominster Health Private Cloud Human Error Memory Scalability Mail Merge Blockchain Budget Language Value Inventory Tech Support Virus Downloads Utility Computing Shortcut Distributed Denial of Service IoT Asset Management Digital Payment Updates VoIP Unified Threat Management Typing Mirgation Recycling Halloween Battery Bluetooth Comparison Current Events Cookies Digital Social Engineering Mixed Reality Firefox Superfish K-12 Schools Meetings Peripheral Disaster Device Reducing Cost Social Networking Twitter Migration Consulting Address Permissions Computing Infrastructure Professional Services Shadow IT Websites LED Threats CCTV Emoji Upgrades Gadget Crowdsourcing Webcam Personal Information Botnet Financial Cortana Error 3D Printing Point of Sale Ben McDonald shares Processors Travel Machine Learning Unsupported Software Regulation Supercomputer CrashOverride Staffing Motion Sickness Computer Repair Relocation Taxes Administrator Mobile Data Recovery IT Budget How To Web Server what was your? Mobile Computing GPS IT Consultant Black Market Printers Law Enforcement Cameras Tracking Notifications Electronic Medical Records Cleaning Physical Security

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3