Network Technologies of Kansas Blog

Network Technologies of Kansas has been serving the Topeka area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Opening the Cybercriminal Toolbox

Opening the Cybercriminal Toolbox

People’s exposure to cybercrime has been increasing for some time. Today, people with very little coding experience can infiltrate systems and steal data. There is demand for data, and now there is a supply of low-cost--or even free--hacking tools available on the dark web that allows people to get closer to that data. In fact, according to a report by Deloitte entitled Black Market Ecosystem: Estimating the Cost of “Pwnership”, there is a complete economy built around these readily-available hacking tools that are relatively easy to use.

Continue reading
0 Comments

Is It Fair to Be Fired for Falling for a Phishing… Test?

Is It Fair to Be Fired for Falling for a Phishing… Test?

Let’s run through a quick scenario: your company’s computing infrastructure is infected with ransomware. Fortunately, you have an offsite backup, so you are able to restore your systems without too much trouble, other than the time you’ve lost. As you investigate the root cause, you discover that one of your employees allowed the ransomware in by falling for a phishing email. So, do you fire them?

Continue reading
0 Comments

Your Guide to the Malware You Could Encounter

Your Guide to the Malware You Could Encounter

You’d be hard-pressed to find someone nowadays who hasn’t heard of malware, although they may have difficulty identifying different threats as they encounter them. Does this sound like the people that you work with? We’re here with a simple solution to assist you and your team in spotting the different kinds of threats - a malware guide to distribute among your staff so they can better spot the usual suspects.

Continue reading
0 Comments

Two-Factor Authentication Works to Remove Security Risks

Two-Factor Authentication Works to Remove Security Risks

Imagine a scenario where your password has been stolen by a hacker. Now your accounts are completely at the mercy of them. What do you do? Obviously you want to change the password, but are you going to learn from this mistake or let it happen again in the future? Thankfully, two-factor authentication offers a solution to this dilemma, and it’s one that you might not have considered in the past.

Continue reading
0 Comments

VoIP Has a Spam Problem

VoIP Has a Spam Problem

Robocalls plague the world’s smartphone users, but have you ever stopped to ask why you receive them in the first place? Why are robocallers able to hide behind a local number so that you pick up the phone? Scammers are actually using a business tool you may have heard of… Voice over Internet Protocol, or VoIP, a modern phone solution that in the hands of anyone else is extremely helpful.

Continue reading
0 Comments

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Internet Technology Privacy Email Hackers Cloud Malware Software Business Computing Microsoft Computer Productivity Business Upgrade Google Hardware Network Security Backup User Tips Hosted Solutions Small Business Social Media Bandwidth Smartphone Ransomware The Internet of Things Gmail Efficiency Mobile Devices Operating System IT Support Workplace Tips Windows Apple Innovation Content Filtering Best Practice Money Safety Website Communication Quick Tips Apps Windows 10 BDR Passwords Data storage Android Hacking Microsoft Office Data Saving Money Big Data Disaster Recovery Two-factor Authentication Business Continuity Mobile Device Management Facebook Smartphones Networking Outlook Holiday Retail Tech Support Drones SaaS Network Firewall Automation Unified Communications Running Cable Downtime Lithium-ion battery Managed IT services Gadgets Printer Alert Customer Service Documents Deep Learning Bluetooth Document Management Law Enforcement Wireless Technology App Office Phishing Memory Network Congestion Education Domains Vendor Management Save Money YouTube Sports Search Proactive IT Analytics LiFi Monitors Cryptocurrency Music Streaming Media Internet of Things Cybercrime Data Recovery Mobile Computing Google Docs Visible Light Communication Securty Displays Cleaning Compliance Advertising Experience History BYOD Black Market Browser IP Address Office Tips Information Technology Office 365 End of Support Business Growth Spam Encryption Micrsooft Artificial Intelligence Disaster Laptop Writing Society Google Wallet Hacker Augmented Reality Robot Social Recovery Windows 8 Hosted Solution Virtual Desktop WiFi Remote Computing communications

Newsletter Sign Up

  • First Name *
  • Last Name *