Network Technologies of Kansas Blog

Network Technologies of Kansas has been serving the Topeka area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

It’s Now Legal for ISPs to Sell Your Online Browsing History

It’s Now Legal for ISPs to Sell Your Online Browsing History

Due to recent legislative activity, the rules and regulations that the Federal Communications Commission put in place to protect the personal data of Internet users have been struck down. This change now allows ISPs, or Internet Service Providers, to sell the browsing information of their customers to advertisers without consent--a move many consider to be a threat to net neutrality. This is what you need to know.

Continue reading
0 Comments

This Cyber Crime Landed a Former IT Administrator 2 Years in Jail

This Cyber Crime Landed a Former IT Administrator 2 Years in Jail

Managing permissions for their network is something that many organizations may only consider when it’s too late to do anything about it. This can provide outsiders with access to sensitive information that shouldn’t be seen by anyone but your employees. To learn a few lessons about user permissions, let’s look at the misfortune of PA Online, a Pennsylvania-based Internet service provider.

Continue reading
0 Comments

Let's Talk Tablets

Tablets are definitely becoming a staple in the consumer electronics world. For the longest time, the tablet PC was an expensive, clunky device that just didn't wow consumers. Some businesses had adopted tablets back in the day, but they were difficult to use, hard to support, and they simply didn't perform for the price tag. However, like many consumer electronics, Apple reinvigorated the tablet market with the original iPad, and now it would seem tablets are here to stay. The question is, are they right for businesses?

Continue reading
0 Comments

How Safe is Your Email?

 

Email is (and has been) a prime method of communication for businesses of all sizes. With email comes a whole slew of issues that are essentially synonymous with the technology; spam, information overload, phishing, and information privacy. Even Topeka small businesses that only do business locally are at risk of these issues. Personal email accounts are equally at risk. Employing proper precautions and practices whenever communicating via email is very important to prevent the risk of security compromises, monetary loss, and even legality issues.

Continue reading
0 Comments

Slow Computer? Increase your memory to boost computer Speeds

Sometimes when your workstation feels bogged down, a relatively cheap and simply hardware update can make a huge difference in performance. Adding more RAM (Random Access Memory, often just referred to as memory) can be a game changer for your bogged down PC.

Continue reading
0 Comments

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Internet Technology Privacy Email Hackers Cloud Malware Software Microsoft Computer Productivity Business Business Computing Upgrade Google Hardware Backup Network Security User Tips Hosted Solutions Social Media Smartphone Gmail Ransomware Operating System The Internet of Things Efficiency Mobile Devices IT Support Bandwidth Workplace Tips Small Business Innovation Content Filtering Safety Money Data Website Quick Tips Disaster Recovery Windows 10 Passwords Mobile Device Management Android Hacking Microsoft Office Saving Money Smartphones Big Data Two-factor Authentication Outlook Business Continuity Apple Best Practice Facebook Networking Communication Apps Windows BDR Data storage Monitors Cryptocurrency Customer Service Data Recovery Documents Music Streaming Media Visible Light Communication Google Docs Displays Wireless Technology Cleaning App Advertising Phishing History BYOD Black Market Domains Search Information Technology Sports Office Tips End of Support Analytics Business Growth Spam Cybercrime Artificial Intelligence Internet of Things Micrsooft Writing Society Mobile Computing Securty Google Wallet Social Compliance Robot Experience Windows 8 Hosted Solution Virtual Desktop communications Browser Retail Tech Support IP Address Drones Office 365 SaaS Automation Unified Communications Encryption Managed IT services Disaster Printer Alert Laptop Deep Learning Hacker Bluetooth Recovery Document Management Augmented Reality Law Enforcement Office WiFi Memory Remote Computing Education Holiday Network Congestion Vendor Management Network Save Money Running Cable Proactive IT Firewall YouTube Lithium-ion battery LiFi Gadgets Downtime

Newsletter Sign Up

  • First Name *
  • Last Name *