BNMC Blog

Bredy Network Management Corporation (BNMC) has been serving the Northeast area since 1988. BNMC works as a strategic business partner to provide organizations with proven design, implementation and support solutions.

A Brief Guide to Help You Avoid Malicious Browser Extensions

A Brief Guide to Help You Avoid Malicious Browser Extensions

There are dozens of Internet browsers on the market. They are typically all free and when they come stock, are pretty much all the same. Most of the most popular ones come with an app store where users can download useful apps to make their experience better. Unfortunately, there are times that malicious code gets in there. Security firm Avast recently found 28 third-party extensions that are extraordinarily popular that had malicious code found in them.

0 Comments
Continue reading

It’s a Good Time to Update Your Microsoft Password

It’s a Good Time to Update Your Microsoft Password

It’s 2021! We made it! 

A lot of us look at a new year as an opportunity to greatly improve our lives. Maybe your resolution is to hit the gym regularly or commit to fewer processed foods—regardless, there are endeavours that take serious commitment, and others that take just a few minutes to accomplish. A really simple, really beneficial task you should add to your 2021 to-do list is to lock down some of your most important online accounts—and we’re going to walk you through it.

0 Comments
Continue reading

Play It Safe and Update Your Google Password Today

Play It Safe and Update Your Google Password Today

When was the last time you intentionally and systematically changed your passwords?

It’s a good practice, even though it can be a huge pain. For many of us, Google is a huge central hub that is tied to a lot of our data. With all of the cybersecurity issues and data breaches, it’s just a good idea to keep your Google account in check.

0 Comments
Continue reading

A Rundown on the Largest Hack in U.S. History

A Rundown on the Largest Hack in U.S. History

2020 has brought us a lot of news that we’d rather not hear. Just days before the end of what may be regarded as one of the worst years on record, there is more. One of the largest hacks in the history of the Internet happened earlier this year and more is being learned about it each day. Today, we will tell you what we know, who it affected, and what your business needs to do to secure itself. 

0 Comments
Continue reading

Reconsidering a Classic Christmas Story

Reconsidering a Classic Christmas Story

Around this time each year, there’s a tradition of people telling stories that have been passed down for years. We wanted to participate this year, so we’ve decided to reimagine a true holiday classic: Die Hard.

Let’s consider how the action may have played out differently if the movie’s events were to take place today…

0 Comments
Continue reading

FBI Issued "Cybersecurity Advisory" for the K-12 Education Community

On December 10, 2020, the Joint Cybersecurity Advisory (coauthored by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC)) issued a major “Cybersecurity Advisory” to the K-12 community.  This advisory reports that cyber actors are targeting kindergarten through twelfth grade (K-12) educational institutions, leading to ransomware attacks, the theft of data, and the disruption of distance learning services. Cyber actors likely view schools as targets of opportunity, and these types of attacks are expected to continue through the 2020/2021 academic year.

These issues will be particularly challenging for K-12 schools that face resource limitations.  Educational leadership, information technology personnel, and security personnel will need to balance this risk when determining their cybersecurity investments.   As you review this Advisory, K-12 schools should be thinking about how they are protecting their students online and verifying they have the proper CyberSecurity controls in place.   It is not good enough to just have the basics of firewall protection, anti-virus and endpoint protection and anti-malware controls.  Now, we need to have Enterprise class Backup and Disaster Recovery solutions (to protect against RansomWare), Security Awareness trainging for all staff  and even students, proper use of Video Conference controls and security and how to best beat Social Engineering attempts.

The Advisory document lists a series of Best Practices at the end of the document.  For further information, contact your BNMC representative or reach out to us to discuss how to better protect your school or business.

0 Comments
Continue reading

Working Hard to Secure Your Endpoints

Working Hard to Secure Your Endpoints

In March, when the stay-at-home orders first came down, and businesses started asking their employees to work from home, it was obvious that many of them were not prepared for this contingency. As the pandemic has gone on, however, businesses have had to adapt. Today, we thought we would look at some of the solutions and strategies that are being used by businesses to secure their endpoints with most of their workforce out of the office. 

0 Comments
Continue reading

Holiday Shopping is Looking Different This Year

Holiday Shopping is Looking Different This Year

Unfortunately, this season’s holiday is going to be much like the rest of 2020: risky. With many people taking the necessary precautions to not contract or spread the coronavirus, a lot of people are doing most of their shopping online. By distancing from others and using the Internet to do the lion’s share of your holiday shopping, you take on different risks. Let’s go through some of them today.

0 Comments
Continue reading

Google Patches Zero-Day Exploits and You Need to Update Chrome

Google Patches Zero-Day Exploits and You Need to Update Chrome

The Department of Homeland Security has issued an alert over several zero-day exploits found in the world’s most popular Internet browser, Google Chrome. Google has since patched this software and we would like to remind you that you need to do so on all of your devices that feature the Chrome browser. 

0 Comments
Continue reading

Mobile Smishing is Being Employed More Often

Mobile Smishing is Being Employed More Often

Cyberattacks continue to be a major problem as scammers send out billions of phishing messages a day. While it doesn’t really sound that nefarious it can be a major problem for a lot of people. One version of phishing, the absurdly labeled smishing, is gaining traction and presents another avenue of attack for hackers. 

0 Comments
Continue reading

Looking After Your Newly Remote Workforce

Looking After Your Newly Remote Workforce

With so many companies pivoting to remote operations this year, strategies to keep your data and infrastructure secure have had to pivot as well. Today, we’ll go through some important variables that you need to address to maintain a secure and reliable computing environment when you are supporting a remote workforce. 

0 Comments
Continue reading

How To (and How Not to) Handle Ransomware

How To (and How Not to) Handle Ransomware

From individuals all the way up to companies and governments, ransomware has been causing no small amount of stress for some years now. Let’s take a few moments to discuss this threat, what you can do about it, and how seriously the government is taking ransomware.

0 Comments
Continue reading

If a Hacker Uses Display Name Spoofing, They Might Look Trustworthy

If a Hacker Uses Display Name Spoofing, They Might Look Trustworthy

Business success is often tied to the quality of your business relationships, and there are many people you need to trust: suppliers who can provide you with everything you need, the team who do their jobs, and customers who turn to you because they know they need you. Unfortunately, it is possible for cybercriminals to exploit this trust to achieve their own goals.

0 Comments
Continue reading

Cybercrime Leading to Huge Business Losses

Cybercrime Leading to Huge Business Losses

This year, the main focus for business owners has been how to conduct business with a global COVID-19 pandemic. The public health crisis has created opportunities for scammers and hackers, and they’ve responded. One could say that there is a flourishing cybercrime pandemic as the past twelve months has seen a 50 percent increase in lost revenue over the second-highest period on record. Let’s take a look at COVID-19-era cybercrime and how it’s just getting worse as the pandemic rages on.

0 Comments
Continue reading

How to Provide Your Healthcare Practice’s Guests with Wi-Fi Access

How to Provide Your Healthcare Practice’s Guests with Wi-Fi Access

Regardless of how long they stay in a medical facility, patients and their visitors now expect that they will have access to wireless Internet during their time there. While it was once just a convenience, it is now an essential part of ensuring that they remain comfortable. As such, it is now the responsibility of the healthcare facility to ensure that their Wi-Fi is fast, reliable, and accessible.

0 Comments
Continue reading

Zoom is Really Working On Improving Security

Zoom is Really Working On Improving Security

Zoom is a video conferencing application that, as the coronavirus pandemic reared its ugly head, saw a considerable leap in popularity amongst organizations of every kind as well as private users. However, this leap also helped bring some serious security issues with the platform to light. Let’s check in and see how Zoom has since worked to improve their user protections.

0 Comments
Continue reading

Tip of the Week: Identifying a Phishing Message Before You’re Hooked

Tip of the Week: Identifying a Phishing Message Before You’re Hooked

Phishing attacks are a fashionable strategy for many cybercriminals and have been for some time. From the infamous Nigerian Prince email scam to the generic urgent message from the bank, most people have seen at least one example of phishing hit their inbox.

0 Comments
Continue reading

What Makes CAPTCHA So Complex (and Consistently Chafing)?

What Makes CAPTCHA So Complex (and Consistently Chafing)?

“To confirm you’re a human being, select all of the images that include traffic signals.”

Chances are good that you’ve seen such a requirement before as you’ve spent time online, whether you were filling out a form or logging into a website. Whether it was an evaluation like the one above, or simply one where you needed to identify a highly distorted series of alphanumeric characters, you probably have also noticed these tests getting more difficult as time has passed. The reason for this is simple: computers are getting better at beating them.

Recent comment in this post
vendingshop vendingshop
great work man, I would like to congratulate you on this effort cn logistics.... Read More
Wednesday, 21 October 2020 06:20
1 Comment
Continue reading

Keys to Warding off 2020’s Cyberthreats

Keys to Warding off 2020’s Cyberthreats

There are a lot of cyberthreats out there… too many for the modern business to avoid them all. While employing best practices may greatly reduce your chances of being breached and having data stolen from your network, they can also help you determine how a breach occurred and how your data was stolen. While there is no such thing as perfect cybersecurity, there are a few strategies you can lean on to strengthen yours.

0 Comments
Continue reading

How Can We Secure Our Use of Smart Assistants?

How Can We Secure Our Use of Smart Assistants?

Smart assistants are one of the most intriguing and confounding technologies developed over the past decade. At the time of this writing, over 150 million smart speakers are in 60 million homes in the United States, when you add in the smart assistants available on mobile devices and other various smart devices, you’re talking a billion people actively using some type of smart assistant. Over the past couple of years, you’re beginning to see these assistants being used more for business and this has made certain security-minded people a little weary of them. Let’s take a look at some of the security questions surrounding the smart assistants.

0 Comments
Continue reading

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Productivity Business Computing User Tips Privacy Cloud Email Microsoft Network Security Hackers Software Efficiency Business Workplace Tips Hosted Solutions Data Hardware Computer Google Malware Communication IT Services IT Support Mobile Devices Small Business Android Mobile Device Smartphone Internet Cloud Computing Tech Term Phishing Ransomware Backup Data Recovery Managed IT Services Users Smartphones Innovation Outsourced IT Saving Money Windows VoIP Information Miscellaneous Upgrade Cybersecurity Network Facebook Data Backup Social Media communications Disaster Recovery Quick Tips Microsoft Office Browser Windows 10 Passwords Server Office 365 Business Continuity Business Management Internet of Things Managed IT Services Productivity Managed Service Data Management COVID-19 Apps Windows 10 Collaboration Gadgets Word Save Money Vulnerability Remote Monitoring App Analytics Remote Work Gmail Artificial Intelligence Chrome WiFi Managed Service Provider Remote Workers Government Router Mobile Office Infrastructure Encryption Conferencing Money Settings Tip of the week Information Technology Google Drive Employer-Employee Relationship Networking Virtual Reality VPN Access Control Website Applications Paperless Office Holiday BYOD Company Culture IT Support Display Spam Operating System Firewall Maintenance Avoiding Downtime Development Document Management Robot Antivirus Wireless Bandwidth Automation Content Filtering YouTube End of Support HIPAA BDR Risk Management Education Apple Storage IT Management Data Security Business Technology Office Tips Virtual Private Network Wi-Fi Computers Hacker Data storage Unified Threat Management Big Data Employee-Employer Relationship Bring Your Own Device Two-factor Authentication Marketing Managing Stress Managed IT Service Vendor Management Social OneNote Monitors LiFi Data Breach Humor Customer Relationship Management Scam Chromebook Hosted Solution Best Practice Windows 7 IT Administration Break Fix Social Network Solid State Drive Software as a Service Mouse Identity Theft Search Training Going Green Mobile Security Remote Computing Hard Disk Drive Vendor SaaS Printing Server Management Password Touchscreen Compliance Business Intelligence iOS Virtualization Laptop Managed IT Data loss How To The Internet of Things Tablet Telephone Systems Retail Alert Regulations desktop Managed Services Downtime MSP Outlook Cybercrime Augmented Reality Computing Migration Consulting Address Permissions Memes Health Private Cloud Computing Infrastructure Professional Services LED Threats Office Files Samsung Social Networking Instant Messaging Tech Support Star Wars PowerPoint User Error Management Chatbots eWaste Laptops Budget Patch Management Nanotechnology Spyware Typing Gamification Wearable Technology Network upgrade Uninterrupted Power Supply Mobility Batteries Specifications Shopping IBM Alerts USB File Sharing Co-Managed IT Current Events Heating/Cooling Multi-Factor Security Social Engineering RMM Motherboard Cables Computer Care Websites Fraud Cost Management Onboarding GDPR Time Management Printer Policy Twitter Halloween Identity Continuity Managed Services Provider Screen Reader Charging Slack Cryptocurrency Hard Disk Drives Smart Office Print Toner Myths Black Friday Employees Corporate Profile Messaging Google Docs Emergency Holidays Licensing Dongle IT solutions Content Huawei Servers Google Calendar Safety Banking Wires Dark Web Distribution Assessment Automobile Digital Signage Hacks Data Warehouse Network Management Procedure Scary Stories Solar G Suite Entertainment Gig Economy Smart Tech Monitoring Bitcoin Solid State Drives Network Congestion Running Cable Work Dell Shortcuts Google Wallet Mobile Management Cyber Monday WannaCry Business Growth Employee-Employer Relationships Payment Card Cooperation Service Level Agreement Cabling Streaming Processor Legislation Reviews Buisness Voice over Internet Protocol Legal Hybrid Cloud Microsoft Excel Logistics Hotspot Virtual Desktop Internet Exlporer Google Maps Troubleshooting Business Analysis SharePoint Writing PCI DSS Sports FBI Connectivity Spying Windows 8 National Security Techology IT Technicians Optimization Unified Communications Security Cameras Drones Profiles Smart Technology Analysis Students Lenovo Dark Data Inventory Update Staff Leominster Human Error Memory Statistics Remote Modem FinTech Deep Learning Scalability Mail Merge Blockchain Asset Management Language Value Mobile Device Management Virus Downloads Battery K-12 Education Politics IoT Digital Payment Updates VoIP Unified Threat Management Peripheral Mirgation Recycling Utility Computing Shortcut Distributed Denial of Service Cookies Digital Alt Codes Mixed Reality Firefox Superfish Customer Service Shadow IT K-12 Schools Meetings Disaster Device Reducing Cost Bluetooth Comparison user treats Work/Life Balance Mobile Computing Cleaning Black Market CCTV Webcam Law Enforcement Electronic Medical Records Financial Notifications Physical Security Error Emoji Point of Sale Ben McDonald shares Upgrades Gadget Travel Crowdsourcing Personal Information Botnet Regulation Supercomputer CrashOverride Cortana 3D Printing Staffing Motion Sickness Machine Learning Administrator Processors Taxes Unsupported Software IT Budget Web Server what was your? GPS Computer Repair Relocation Printers IT Consultant Mobile Data Cameras Tracking Recovery How To

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3