Network Technologies of Kansas Blog

Network Technologies of Kansas has been serving the Topeka area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

It’s Now Legal for ISPs to Sell Your Online Browsing History

It’s Now Legal for ISPs to Sell Your Online Browsing History

Due to recent legislative activity, the rules and regulations that the Federal Communications Commission put in place to protect the personal data of Internet users have been struck down. This change now allows ISPs, or Internet Service Providers, to sell the browsing information of their customers to advertisers without consent--a move many consider to be a threat to net neutrality. This is what you need to know.

Continue reading
0 Comments

This Cyber Crime Landed a Former IT Administrator 2 Years in Jail

This Cyber Crime Landed a Former IT Administrator 2 Years in Jail

Managing permissions for their network is something that many organizations may only consider when it’s too late to do anything about it. This can provide outsiders with access to sensitive information that shouldn’t be seen by anyone but your employees. To learn a few lessons about user permissions, let’s look at the misfortune of PA Online, a Pennsylvania-based Internet service provider.

Continue reading
0 Comments

Let's Talk Tablets

Tablets are definitely becoming a staple in the consumer electronics world. For the longest time, the tablet PC was an expensive, clunky device that just didn't wow consumers. Some businesses had adopted tablets back in the day, but they were difficult to use, hard to support, and they simply didn't perform for the price tag. However, like many consumer electronics, Apple reinvigorated the tablet market with the original iPad, and now it would seem tablets are here to stay. The question is, are they right for businesses?

Continue reading
0 Comments

How Safe is Your Email?

 

Email is (and has been) a prime method of communication for businesses of all sizes. With email comes a whole slew of issues that are essentially synonymous with the technology; spam, information overload, phishing, and information privacy. Even Topeka small businesses that only do business locally are at risk of these issues. Personal email accounts are equally at risk. Employing proper precautions and practices whenever communicating via email is very important to prevent the risk of security compromises, monetary loss, and even legality issues.

Continue reading
0 Comments

Slow Computer? Increase your memory to boost computer Speeds

Sometimes when your workstation feels bogged down, a relatively cheap and simply hardware update can make a huge difference in performance. Adding more RAM (Random Access Memory, often just referred to as memory) can be a game changer for your bogged down PC.

Continue reading
0 Comments

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Internet Technology Privacy Email Hackers Cloud Malware Software Business Computing Microsoft Computer Productivity Business Upgrade Google Hardware Network Security Backup User Tips Hosted Solutions Small Business Bandwidth Social Media Smartphone Ransomware Gmail The Internet of Things Efficiency Mobile Devices Operating System IT Support Workplace Tips Windows Apple Best Practice Innovation Content Filtering Communication Money Safety Apps Website Quick Tips BDR Windows 10 Data storage Passwords Android Hacking Data Microsoft Office Disaster Recovery Saving Money Big Data Two-factor Authentication Mobile Device Management Business Continuity Smartphones Facebook Outlook Networking Unified Communications Holiday Automation Managed IT services Printer Network Running Cable Firewall Alert Downtime Lithium-ion battery Deep Learning Gadgets Bluetooth Customer Service Document Management Documents Law Enforcement Office Memory Wireless Technology App Network Congestion Education Save Money Phishing Vendor Management Proactive IT YouTube Domains LiFi Cryptocurrency Sports Search Monitors Data Recovery Analytics Music Streaming Media Google Docs Visible Light Communication Cleaning Internet of Things Cybercrime Displays Mobile Computing Securty Advertising BYOD Compliance History Experience Black Market Office Tips Information Technology Browser End of Support IP Address Business Growth Spam Office 365 Micrsooft Artificial Intelligence Writing Society Encryption Disaster Google Wallet Social Laptop Robot Hacker Windows 8 Recovery Augmented Reality Hosted Solution Virtual Desktop communications Retail Tech Support WiFi Remote Computing Drones SaaS

Newsletter Sign Up

  • First Name *
  • Last Name *