Network Technologies of Kansas Blog

Network Technologies of Kansas has been serving the Topeka area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Apple OS X Now at Risk of Ransomware

b2ap3_thumbnail_ransomware_now_affecting_apple_400.jpgRansomware is a major problem in both the personal and private sectors of computing, but up until very recently, Apple users had little to fear from potential ransomware hacks. Security researchers at Palo Alto Networks have discovered what’s known to be the first completed ransomware on an Apple device. The threat, called KeRanger, is officially “in the wild,” and is a danger to any Mac user.

Continue reading
0 Comments

Apple Stands Up to the FBI: Legal Battle Ensues

b2ap3_thumbnail_fbi_and_apple_400.jpgThere’s no questioning Apple’s dedication to the advancement of technology, especially over the past few decades. With the iPhone being the first of many commercially available smartphones, Apple has always been at the forefront of exciting consumer technology developments. Now, however, their most important decision yet may come in the form of a face-off with the FBI.

Continue reading
0 Comments

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Internet Technology Privacy Email Hackers Cloud Malware Software Microsoft Computer Productivity Business Business Computing Upgrade Google Hardware Backup Network Security Hosted Solutions User Tips Social Media Smartphone Ransomware Gmail The Internet of Things Operating System Efficiency Mobile Devices IT Support Workplace Tips Small Business Bandwidth Communication Innovation Apps Content Filtering Safety Money BDR Website Quick Tips Data storage Windows 10 Passwords Data Android Hacking Disaster Recovery Microsoft Office Saving Money Mobile Device Management Big Data Two-factor Authentication Business Continuity Smartphones Facebook Outlook Networking Apple Windows Best Practice Customer Service Office Memory Documents Network Congestion Education Save Money Wireless Technology Vendor Management Proactive IT App YouTube Phishing LiFi Cryptocurrency Monitors Data Recovery Music Streaming Media Domains Search Google Docs Sports Visible Light Communication Displays Cleaning Analytics Advertising Cybercrime Internet of Things History BYOD Mobile Computing Black Market Securty Information Technology Office Tips Compliance End of Support Experience Business Growth Spam Artificial Intelligence Micrsooft Browser Writing Society IP Address Google Wallet Office 365 Social Robot Encryption Windows 8 Disaster Hosted Solution Laptop Virtual Desktop communications Hacker Retail Tech Support Recovery Augmented Reality Drones SaaS Unified Communications WiFi Automation Managed IT services Printer Remote Computing Holiday Alert Network Deep Learning Bluetooth Document Management Running Cable Firewall Lithium-ion battery Gadgets Law Enforcement Downtime

Newsletter Sign Up

  • First Name *
  • Last Name *