Network Technologies of Kansas

Archive for March, 2023

Chick-fil-A Confirms Credential Stuffing Attack

Credential stuffing is one of the many forms of cyberattacks on the rise. It's a low-risk, low-cost automated method. It uses bots to access username-password combinations from past data breaches. It then ...

US Government: Royal Ransomware Targets Critical Infrastructure

The United States government is alerting organizations about the Royal ransomware operation. The Federal Bureau of Investigation (FBI) and the Cybersecurity & Infrastructure Security Agency (CISA) said in a joint advisory that ...

How to Protect Your Organization From Callback Phishing

Callback phishing scams are one of the worst cyberattacks you can encounter. It is devastating to experience on a personal level. But it is even more disastrous if it happens to your ...

Password Mask Attacks

Having a password for online accounts is not enough protection. Hackers and cybercriminals have found a way to crack passwords and hijack emails, bank accounts, social media pages, and other digital real ...

Microsoft Exchange Online Outage Blocks Access to Mailboxes Worldwide

Microsoft Corp. announced via Twitter on March 1 that a worldwide outage affected Exchange Online – its cloud-based email service. According to the software giant in a series of tweets, Exchange Online ...

News Corp Cyberattack

News Corporation (News Corp) has disclosed more information about the 2022 cyberattack against the major publishing conglomerate. News Corp revealed that the cybercriminals had access to its systems two years ago, starting ...

Dish Network Cyberattack

Dish Network confirmed that the network outage it is currently experiencing is due to a cybersecurity breach. This outage also affected its internal communications systems. The breach occurred on Feb. 23 and ...

Ransomware Attack on Dole

Ransomware is a threat businesses cannot afford to ignore. Such a cyberattack often blocks user access to systems until the perpetrator receives ransom. A recent cautionary tale is a ransomware attack on ...

Microsoft Exchange Server Antivirus Exclusions

The Microsoft Exchange Server is an e-mail server developed exclusively for Windows OS users. It also offers collaboration functions like scheduling and calendaring. One of the Exchange Server's biggest draws is its ...

S1deload Stealer Malware

A new malware campaign on Facebook and YouTube is making headlines. S1deload Stealer hijacks these social media accounts, mines cryptocurrency, and spreads itself. Discover what business owners need to know about this ...

Blog

Unlocking Efficiency and Optimization: Exploring CMMS

Unlocking Efficiency and Optimization: Exploring CMMS

Running a business means looking after all your assets, from your property and equipment to your inventory. A good way[...]
Recovering Trust: Meta’s Refund Initiatives for Advertising Glitch Provide Relief to Affected Advertisers

Recovering Trust: Meta’s Refund Initiatives for Advertising Glitch Provide Relief to Affected Advertisers

Imagine putting money into an ad plan and having a tech issue cause costs to skyrocket. This issue hit many[...]
Understanding and Mitigating Brute-Force Attacks

Understanding and Mitigating Brute-Force Attacks

Recently, a team of researchers from Zhejiang University and Tencent Labs uncovered a new type of cyberattack, termed "BrutePrint." This[...]

Locations

Topeka (HQ)

2008 SW Gage Blvd.
Topeka, KS 66604
(785) 409-6286

Company

Since 1999, Network Technologies of Kansas has been a leading provider of IT support and consulting, focusing on small and medium sized businesses in Topeka and surrounding areas. We have helped hundreds of businesses increase productivity and profitability by making IT a streamlined part of operations. We equip our clients with customized technology solutions for greater operational value and to reduce risk.

Proud Member of

The 20 Elite