Network Technologies of Kansas Blog

Network Technologies of Kansas has been serving the Topeka area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

It’s Now Legal for ISPs to Sell Your Online Browsing History

It’s Now Legal for ISPs to Sell Your Online Browsing History

Due to recent legislative activity, the rules and regulations that the Federal Communications Commission put in place to protect the personal data of Internet users have been struck down. This change now allows ISPs, or Internet Service Providers, to sell the browsing information of their customers to advertisers without consent--a move many consider to be a threat to net neutrality. This is what you need to know.

Continue reading
0 Comments

This Cyber Crime Landed a Former IT Administrator 2 Years in Jail

This Cyber Crime Landed a Former IT Administrator 2 Years in Jail

Managing permissions for their network is something that many organizations may only consider when it’s too late to do anything about it. This can provide outsiders with access to sensitive information that shouldn’t be seen by anyone but your employees. To learn a few lessons about user permissions, let’s look at the misfortune of PA Online, a Pennsylvania-based Internet service provider.

Continue reading
0 Comments

Let's Talk Tablets

Tablets are definitely becoming a staple in the consumer electronics world. For the longest time, the tablet PC was an expensive, clunky device that just didn't wow consumers. Some businesses had adopted tablets back in the day, but they were difficult to use, hard to support, and they simply didn't perform for the price tag. However, like many consumer electronics, Apple reinvigorated the tablet market with the original iPad, and now it would seem tablets are here to stay. The question is, are they right for businesses?

Continue reading
0 Comments

How Safe is Your Email?

 

Email is (and has been) a prime method of communication for businesses of all sizes. With email comes a whole slew of issues that are essentially synonymous with the technology; spam, information overload, phishing, and information privacy. Even Topeka small businesses that only do business locally are at risk of these issues. Personal email accounts are equally at risk. Employing proper precautions and practices whenever communicating via email is very important to prevent the risk of security compromises, monetary loss, and even legality issues.

Continue reading
0 Comments

Slow Computer? Increase your memory to boost computer Speeds

Sometimes when your workstation feels bogged down, a relatively cheap and simply hardware update can make a huge difference in performance. Adding more RAM (Random Access Memory, often just referred to as memory) can be a game changer for your bogged down PC.

Continue reading
0 Comments

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Internet Technology Privacy Email Hackers Cloud Malware Software Business Business Computing Microsoft Computer Productivity User Tips Hosted Solutions Upgrade Google Hardware Network Security Backup IT Support Bandwidth Workplace Tips Small Business Social Media Smartphone Gmail Ransomware Operating System The Internet of Things Efficiency Mobile Devices Facebook Apple Best Practice Networking Communication Apps Windows BDR Innovation Content Filtering Data storage Money Safety Website Quick Tips Windows 10 Data Disaster Recovery Passwords Android Hacking Mobile Device Management Microsoft Office Saving Money Big Data Two-factor Authentication Smartphones Business Continuity Outlook Unified Communications Laptop Automation Managed IT services Printer Hacker Augmented Reality Alert Recovery Deep Learning Bluetooth Document Management WiFi Remote Computing Law Enforcement Holiday Office Memory Network Running Cable Firewall Network Congestion Education Save Money Downtime Lithium-ion battery Gadgets Vendor Management Customer Service Proactive IT YouTube Documents LiFi Cryptocurrency Monitors Data Recovery Music Streaming Media Wireless Technology App Google Docs Visible Light Communication Cleaning Phishing Displays Domains Advertising History BYOD Sports Search Analytics Black Market Information Technology Office Tips End of Support Internet of Things Cybercrime Mobile Computing Business Growth Spam Artificial Intelligence Securty Micrsooft Writing Society Compliance Google Wallet Experience Social Robot Windows 8 Browser IP Address Hosted Solution Virtual Desktop communications Office 365 Retail Tech Support Encryption Drones SaaS Disaster

Newsletter Sign Up

  • First Name *
  • Last Name *