Network Technologies of Kansas Blog

Network Technologies of Kansas has been serving the Topeka area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is It Fair to Be Fired for Falling for a Phishing… Test?

Is It Fair to Be Fired for Falling for a Phishing… Test?

Let’s run through a quick scenario: your company’s computing infrastructure is infected with ransomware. Fortunately, you have an offsite backup, so you are able to restore your systems without too much trouble, other than the time you’ve lost. As you investigate the root cause, you discover that one of your employees allowed the ransomware in by falling for a phishing email. So, do you fire them?

Continue reading
0 Comments

Tip of the Week: Speed Up Your Computing with Windows Shortcuts

Tip of the Week: Speed Up Your Computing with Windows Shortcuts

The Windows operating system has quite a few shortcuts baked in, each offering a user quicker access to the utility they are seeking out. It may sound crazy, but using these keyboard shortcuts can actually eliminate the eight days the average employee accumulates every year by just moving their hand from their keyboard to their mouse. 

Continue reading
0 Comments

Your Guide to the Malware You Could Encounter

Your Guide to the Malware You Could Encounter

You’d be hard-pressed to find someone nowadays who hasn’t heard of malware, although they may have difficulty identifying different threats as they encounter them. Does this sound like the people that you work with? We’re here with a simple solution to assist you and your team in spotting the different kinds of threats - a malware guide to distribute among your staff so they can better spot the usual suspects.

Continue reading
0 Comments

Should You Consider Microsoft 365?

Should You Consider Microsoft 365?

The story of Microsoft 365 unofficially starts with millions of individuals that still use workstations that run Windows 7. Microsoft had to come up with a plan to get the millions of people that didn’t upgrade to Windows 10 onto the platform before they retired Windows 7. What better way to accomplish that than making it easier than ever to upgrade?

Continue reading
0 Comments

Tip of the Week: How to Secure Your Internet Browser

Tip of the Week: How to Secure Your Internet Browser

Most people today spend a lot of time on the Internet, which means that most people spend a lot of time using a browser. Little do they know, selecting the wrong one could easily put their cybersecurity at risk, along with dozens of other actions. For this week’s tip, we’ll go over how to make your Internet browser as secure as possible.

Continue reading
0 Comments

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Internet Technology Email Privacy Hackers Cloud Malware Software Business Business Computing Microsoft Computer Productivity Backup Network Security Hosted Solutions User Tips Google Upgrade Hardware Efficiency Mobile Devices Bandwidth IT Support Workplace Tips Small Business Social Media Gmail Smartphone Operating System Ransomware The Internet of Things Business Continuity Apple Best Practice Facebook Communication Apps Networking BDR Windows Data storage Innovation Content Filtering Safety Data Money Disaster Recovery Website Quick Tips Windows 10 Mobile Device Management Passwords Android Hacking Smartphones Microsoft Office Saving Money Big Data Outlook Two-factor Authentication Unified Communications IP Address Automation Office 365 Managed IT services Printer Encryption Alert Deep Learning Disaster Bluetooth Document Management Laptop Hacker Law Enforcement Office Recovery Augmented Reality Memory Education WiFi Network Congestion Vendor Management Save Money Remote Computing Proactive IT YouTube Holiday LiFi Network Monitors Cryptocurrency Running Cable Firewall Lithium-ion battery Data Recovery Gadgets Music Streaming Media Downtime Visible Light Communication Customer Service Google Docs Displays Cleaning Documents Advertising Wireless Technology History BYOD App Black Market Phishing Information Technology Office Tips End of Support Domains Search Business Growth Spam Sports Artificial Intelligence Analytics Micrsooft Writing Society Cybercrime Google Wallet Internet of Things Social Mobile Computing Robot Windows 8 Securty Compliance Hosted Solution Virtual Desktop communications Experience Retail Tech Support Browser Drones SaaS

Newsletter Sign Up

  • First Name *
  • Last Name *