Network Technologies of Kansas Blog

Network Technologies of Kansas has been serving the Topeka area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 5 Ways to Keep Your Internet Browsing Private

b2ap3_thumbnail_anonymous_browsing_400.jpgIt turns out that the Internet isn’t as anonymous as it seems. This is a hard lesson learned by more than 37 million users of Ashley Madison, a website dedicated to cheating on one’s spouse. In July, the site was hacked by the hacker group, “The Impact Team,” and they’re currently threatening to expose the cheaters by going public with the database. In this particular case, Ashley Madison users should have known better--on two levels.

Continue reading
0 Comments

20% of Visits to Pornographic Websites Originate From Office Workstations

b2ap3_thumbnail_content_filtering_400.jpgWith all of the inappropriate content festering in the gutters of the Internet, you need a solution that will protect you, your family, and your office. Implementing a content filtering solution is a great start, but it’s not going to shield you 100 percent from what’s out there. In addition to having a content filter, you need to take an active role in monitoring who’s doing what on the Internet.

Continue reading
0 Comments

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Internet Technology Privacy Email Hackers Cloud Malware Software Microsoft Computer Productivity Business Business Computing Upgrade Google Hardware Network Security Backup User Tips Hosted Solutions Social Media Smartphone Gmail Ransomware The Internet of Things Operating System Efficiency Mobile Devices IT Support Workplace Tips Small Business Bandwidth Communication Apps Innovation Content Filtering BDR Money Safety Data storage Website Quick Tips Windows 10 Data Passwords Disaster Recovery Android Hacking Mobile Device Management Microsoft Office Saving Money Big Data Two-factor Authentication Business Continuity Smartphones Outlook Facebook Networking Apple Best Practice Windows Firewall Office Running Cable Memory Downtime Lithium-ion battery Gadgets Network Congestion Education Customer Service Save Money Vendor Management Documents Proactive IT YouTube Wireless Technology LiFi App Cryptocurrency Monitors Data Recovery Phishing Music Streaming Media Google Docs Visible Light Communication Cleaning Domains Displays Sports Search Analytics Advertising BYOD History Internet of Things Black Market Cybercrime Mobile Computing Office Tips Information Technology Securty End of Support Compliance Business Growth Spam Micrsooft Experience Artificial Intelligence Society Writing Browser Google Wallet IP Address Robot Social Windows 8 Office 365 Encryption Hosted Solution Virtual Desktop Disaster communications Laptop Tech Support Retail Drones SaaS Hacker Augmented Reality Automation Recovery Unified Communications Printer Managed IT services WiFi Alert Remote Computing Deep Learning Holiday Document Management Bluetooth Law Enforcement Network

Newsletter Sign Up

  • First Name *
  • Last Name *