Network Technologies of Kansas Blog

Network Technologies of Kansas has been serving the Topeka area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 5 Ways to Keep Your Internet Browsing Private

b2ap3_thumbnail_anonymous_browsing_400.jpgIt turns out that the Internet isn’t as anonymous as it seems. This is a hard lesson learned by more than 37 million users of Ashley Madison, a website dedicated to cheating on one’s spouse. In July, the site was hacked by the hacker group, “The Impact Team,” and they’re currently threatening to expose the cheaters by going public with the database. In this particular case, Ashley Madison users should have known better--on two levels.

Continue reading
0 Comments

20% of Visits to Pornographic Websites Originate From Office Workstations

b2ap3_thumbnail_content_filtering_400.jpgWith all of the inappropriate content festering in the gutters of the Internet, you need a solution that will protect you, your family, and your office. Implementing a content filtering solution is a great start, but it’s not going to shield you 100 percent from what’s out there. In addition to having a content filter, you need to take an active role in monitoring who’s doing what on the Internet.

Continue reading
0 Comments

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Internet Technology Email Privacy Hackers Cloud Malware Software Computer Productivity Business Business Computing Microsoft Hardware Backup Network Security User Tips Hosted Solutions Upgrade Google The Internet of Things Operating System Efficiency Mobile Devices IT Support Workplace Tips Small Business Bandwidth Social Media Smartphone Ransomware Gmail Saving Money Mobile Device Management Big Data Two-factor Authentication Business Continuity Smartphones Outlook Facebook Networking Apple Windows Best Practice Communication Innovation Apps Content Filtering Safety Money BDR Website Quick Tips Data storage Windows 10 Passwords Data Android Hacking Disaster Recovery Microsoft Office Office Tips Compliance Information Technology Experience End of Support Business Growth Spam Micrsooft Browser Artificial Intelligence Society IP Address Writing Google Wallet Office 365 Robot Encryption Social Windows 8 Disaster Hosted Solution Laptop Virtual Desktop Hacker communications Retail Tech Support Recovery Augmented Reality Drones SaaS Unified Communications WiFi Automation Managed IT services Printer Remote Computing Holiday Alert Network Deep Learning Bluetooth Document Management Running Cable Firewall Lithium-ion battery Gadgets Law Enforcement Downtime Customer Service Office Memory Documents Network Congestion Education Save Money Wireless Technology Vendor Management Proactive IT App YouTube Phishing LiFi Cryptocurrency Monitors Data Recovery Music Streaming Media Domains Search Google Docs Sports Visible Light Communication Cleaning Analytics Displays Cybercrime Internet of Things Advertising BYOD Mobile Computing History Black Market Securty

Newsletter Sign Up

  • First Name *
  • Last Name *