Network Technologies of Kansas Blog

Network Technologies of Kansas has been serving the Topeka area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: IT Has A Lot Of Jargon… How Much Do You Know?

Tip of the Week: IT Has A Lot Of Jargon… How Much Do You Know?

If you spend more than ten minutes with anyone from the technology industry, you may notice that they have a rather colorful vocabulary. It’s not too vulgar or anything, but it is chock-full of buzzwords that you may not fully understand. Here are some of the most frequently used words in the IT industry.

Continue reading
0 Comments

In The Wake Of A Disaster, Beware Of Charity Scams

In The Wake Of A Disaster, Beware Of Charity Scams

Wanting to give donations in the wake of a disaster is admirable. However, with so many regions of the United States having been devastated by a natural disaster in recent weeks, there are dozens of illegitimate charities out there looking to take advantage of your generosity and compassion.

Continue reading
0 Comments

Tip of the Week: If You Prefer Windows 8’s Start Menu, You’re In Luck!

Tip of the Week: If You Prefer Windows 8’s Start Menu, You’re In Luck!

When Windows 8 launched, users of the operating system were all up in arms because they deviated from the Start menu that we know and love, in favor of a tiled menu screen. While many people went out and found the extension that turned tiles into the classic Start menu, others got used to working with the tile menu. With the release of Windows 10, the Start menu was back as the primary interface. If you’re one of those who adapted and enjoyed the tile menu of Windows 8, we’ve got good news: The tile menu is available on Windows 10!

Continue reading
0 Comments

100 Countries Hit By Android DDoS Malware

100 Countries Hit By Android DDoS Malware

In what is one of the first attacks of its kind, a botnet dubbed WireX swept across 100 countries, controlling over 120,000 IP addresses at its peak. The factor that made WireX so unique was the fact that the botnet was made up of Android-powered devices that had one of 300 malicious apps downloaded from the Google Play Store.

Continue reading
0 Comments

48 Vulnerabilities Resolved On Patch Tuesday

48 Vulnerabilities Resolved On Patch Tuesday

Microsoft’s monthly Patch Tuesday issued resolutions to 48 vulnerabilities in August, including 15 that affected Windows, 25 critical flaws, 21 important flaws, and 27 that allowed for remote execution. This is a lot to consider, but the main jist of this is that lots of threats were fixed, and that your organization shouldn’t risk not implementing them as soon as possible.

Continue reading
0 Comments

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Internet Technology Privacy Email Hackers Cloud Malware Software Microsoft Google Computer Productivity Hosted Solutions Business Business Computing Hardware Network Security User Tips Upgrade Smartphone Ransomware Gmail The Internet of Things Backup Efficiency Mobile Devices IT Support Operating System Workplace Tips Small Business Social Media Bandwidth Windows 10 Passwords Data storage Android Hacking Microsoft Office Saving Money Data Disaster Recovery Big Data Two-factor Authentication Business Continuity Mobile Device Management Facebook Smartphones Networking Outlook Windows Apple Innovation Best Practice Content Filtering Safety Money Communication Website Quick Tips Apps Network Congestion Education Vendor Management Save Money Domains Search Data Management BDR Sports Proactive IT LiFi Analytics Monitors Cryptocurrency Cybercrime Internet of Things Music Google Docs Visible Light Communication Mobile Computing Displays Securty Cleaning Compliance Experience Advertising History BYOD Spam Browser Black Market Office Tips Information Technology IP Address End of Support Office 365 Windows XP Encryption Business Growth Micrsooft Disaster Artificial Intelligence Writing Laptop Society Google Wallet Hacker Robot Recovery Social Augmented Reality Windows 8 Hosted Solution WiFi Virtual Desktop communications Remote Computing Retail Holiday Tech Support Drones Network SaaS Automation Running Cable Unified Communications Firewall Lithium-ion battery Gadgets Managed IT services Downtime Printer Alert Customer Service Deep Learning Documents YouTube Bluetooth Document Management Law Enforcement Wireless Technology Office App Streaming Media Memory Phishing

Blog Archive

Newsletter Sign Up

  • First Name *
  • Last Name *