Network Technologies of Kansas Blog

Network Technologies of Kansas has been serving the Topeka area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is It Fair to Be Fired for Falling for a Phishing… Test?

Is It Fair to Be Fired for Falling for a Phishing… Test?

Let’s run through a quick scenario: your company’s computing infrastructure is infected with ransomware. Fortunately, you have an offsite backup, so you are able to restore your systems without too much trouble, other than the time you’ve lost. As you investigate the root cause, you discover that one of your employees allowed the ransomware in by falling for a phishing email. So, do you fire them?

Continue reading
0 Comments

Your Guide to the Malware You Could Encounter

Your Guide to the Malware You Could Encounter

You’d be hard-pressed to find someone nowadays who hasn’t heard of malware, although they may have difficulty identifying different threats as they encounter them. Does this sound like the people that you work with? We’re here with a simple solution to assist you and your team in spotting the different kinds of threats - a malware guide to distribute among your staff so they can better spot the usual suspects.

Continue reading
0 Comments

Two-Factor Authentication Works to Remove Security Risks

Two-Factor Authentication Works to Remove Security Risks

Imagine a scenario where your password has been stolen by a hacker. Now your accounts are completely at the mercy of them. What do you do? Obviously you want to change the password, but are you going to learn from this mistake or let it happen again in the future? Thankfully, two-factor authentication offers a solution to this dilemma, and it’s one that you might not have considered in the past.

Continue reading
0 Comments

VoIP Has a Spam Problem

VoIP Has a Spam Problem

Robocalls plague the world’s smartphone users, but have you ever stopped to ask why you receive them in the first place? Why are robocallers able to hide behind a local number so that you pick up the phone? Scammers are actually using a business tool you may have heard of… Voice over Internet Protocol, or VoIP, a modern phone solution that in the hands of anyone else is extremely helpful.

Continue reading
0 Comments

Diagnosing a Man-In-the-Middle Attack

Diagnosing a Man-In-the-Middle Attack

The man in the middle has a lot of power and influence over the end result, and this is true even in the technological world. In fact, there are attacks dedicated to this vector, twisting and turning something that your organization needs into what amounts to a threat. We’ll discuss what a Man-in-the-Middle (MitM) attack is, as well as what you can do to combat these threats.

Continue reading
0 Comments

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Internet Technology Email Privacy Hackers Cloud Malware Software Business Business Computing Microsoft Computer Productivity Hosted Solutions User Tips Upgrade Google Hardware Backup Network Security Efficiency Mobile Devices IT Support Bandwidth Workplace Tips Small Business Social Media Gmail Smartphone Ransomware Operating System The Internet of Things Apple Facebook Best Practice Networking Communication Apps Windows BDR Data storage Innovation Content Filtering Safety Money Data Website Quick Tips Disaster Recovery Windows 10 Passwords Mobile Device Management Android Hacking Microsoft Office Saving Money Big Data Smartphones Two-factor Authentication Outlook Business Continuity Automation Unified Communications Encryption Printer Disaster Managed IT services Alert Laptop Hacker Deep Learning Document Management Recovery Augmented Reality Bluetooth Law Enforcement WiFi Office Remote Computing Memory Network Congestion Education Holiday Network Vendor Management Save Money Proactive IT YouTube Running Cable Firewall Lithium-ion battery Gadgets LiFi Downtime Customer Service Monitors Cryptocurrency Music Streaming Media Documents Data Recovery Google Docs Visible Light Communication Wireless Technology Displays Cleaning App Advertising Phishing History BYOD Black Market Domains Search Office Tips Information Technology Sports Analytics End of Support Business Growth Spam Cybercrime Micrsooft Artificial Intelligence Internet of Things Mobile Computing Writing Society Google Wallet Securty Robot Social Compliance Experience Windows 8 Hosted Solution Virtual Desktop communications Browser IP Address Retail Tech Support Drones SaaS Office 365

Newsletter Sign Up

  • First Name *
  • Last Name *