Network Technologies of Kansas Blog

Network Technologies of Kansas has been serving the Topeka area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

It’s Now Legal for ISPs to Sell Your Online Browsing History

It’s Now Legal for ISPs to Sell Your Online Browsing History

Due to recent legislative activity, the rules and regulations that the Federal Communications Commission put in place to protect the personal data of Internet users have been struck down. This change now allows ISPs, or Internet Service Providers, to sell the browsing information of their customers to advertisers without consent--a move many consider to be a threat to net neutrality. This is what you need to know.

Continue reading
0 Comments

This Cyber Crime Landed a Former IT Administrator 2 Years in Jail

This Cyber Crime Landed a Former IT Administrator 2 Years in Jail

Managing permissions for their network is something that many organizations may only consider when it’s too late to do anything about it. This can provide outsiders with access to sensitive information that shouldn’t be seen by anyone but your employees. To learn a few lessons about user permissions, let’s look at the misfortune of PA Online, a Pennsylvania-based Internet service provider.

Continue reading
0 Comments

Let's Talk Tablets

Tablets are definitely becoming a staple in the consumer electronics world. For the longest time, the tablet PC was an expensive, clunky device that just didn't wow consumers. Some businesses had adopted tablets back in the day, but they were difficult to use, hard to support, and they simply didn't perform for the price tag. However, like many consumer electronics, Apple reinvigorated the tablet market with the original iPad, and now it would seem tablets are here to stay. The question is, are they right for businesses?

Continue reading
0 Comments

How Safe is Your Email?

 

Email is (and has been) a prime method of communication for businesses of all sizes. With email comes a whole slew of issues that are essentially synonymous with the technology; spam, information overload, phishing, and information privacy. Even Topeka small businesses that only do business locally are at risk of these issues. Personal email accounts are equally at risk. Employing proper precautions and practices whenever communicating via email is very important to prevent the risk of security compromises, monetary loss, and even legality issues.

Continue reading
0 Comments

Slow Computer? Increase your memory to boost computer Speeds

Sometimes when your workstation feels bogged down, a relatively cheap and simply hardware update can make a huge difference in performance. Adding more RAM (Random Access Memory, often just referred to as memory) can be a game changer for your bogged down PC.

Continue reading
0 Comments

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Internet Technology Privacy Email Hackers Cloud Malware Software Microsoft Computer Productivity Business Business Computing Hardware Backup Network Security User Tips Hosted Solutions Google Upgrade Smartphone Operating System Ransomware The Internet of Things Efficiency Bandwidth Mobile Devices IT Support Workplace Tips Small Business Social Media Gmail Windows 10 Passwords Android Hacking Smartphones Outlook Microsoft Office Saving Money Big Data Two-factor Authentication Apple Business Continuity Best Practice Communication Apps Facebook BDR Networking Data storage Windows Data Innovation Disaster Recovery Content Filtering Money Safety Website Quick Tips Mobile Device Management Business Growth Spam Micrsooft Artificial Intelligence Domains Society Search Writing Sports Google Wallet Analytics Robot Social Windows 8 Cybercrime Internet of Things Hosted Solution Virtual Desktop Mobile Computing Securty communications Tech Support Retail Compliance Drones Experience SaaS Automation Unified Communications Printer Managed IT services Browser Alert IP Address Deep Learning Office 365 Document Management Bluetooth Encryption Law Enforcement Disaster Office Laptop Hacker Memory Network Congestion Recovery Education Augmented Reality Vendor Management Save Money Proactive IT WiFi YouTube LiFi Remote Computing Monitors Holiday Cryptocurrency Music Network Streaming Media Data Recovery Google Docs Running Cable Visible Light Communication Firewall Gadgets Displays Downtime Cleaning Lithium-ion battery Customer Service Documents Advertising History BYOD Black Market Wireless Technology Office Tips App Information Technology End of Support Phishing

Newsletter Sign Up

  • First Name *
  • Last Name *