Network Technologies of Kansas Blog

Network Technologies of Kansas has been serving the Topeka area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Nearly 50% of Data Stolen in 2015 Were Passwords and Email Addresses

b2ap3_thumbnail_stolen_data_400.jpgIn 2015, there was an incredible amount of information stolen from organizations all over the world. From healthcare companies to government institutions, nobody was safe from the endless onslaught of hacking attacks. Now, in the wake of these hackers’ destruction, it seems that most of the incidents in question exposed passwords and email address; important credentials that put many users’ security in jeopardy.

Continue reading
0 Comments

What is your Identity Worth to You?

Your identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.

Continue reading
0 Comments

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Internet Technology Privacy Email Hackers Cloud Malware Software Microsoft Computer Productivity Business Business Computing Google Hardware Backup Network Security Hosted Solutions User Tips Upgrade Smartphone Ransomware Gmail The Internet of Things Efficiency Operating System Mobile Devices IT Support Workplace Tips Small Business Bandwidth Social Media BDR Windows 10 Data storage Passwords Hacking Android Data Microsoft Office Disaster Recovery Saving Money Big Data Two-factor Authentication Mobile Device Management Business Continuity Facebook Smartphones Outlook Networking Windows Apple Best Practice Innovation Content Filtering Communication Safety Money Apps Website Quick Tips Proactive IT YouTube LiFi Domains Sports Cryptocurrency Search Monitors Data Recovery Music Streaming Media Analytics Google Docs Visible Light Communication Internet of Things Cleaning Cybercrime Displays Mobile Computing Securty Advertising Compliance BYOD History Black Market Experience Office Tips Information Technology Browser End of Support Business Growth Spam IP Address Office 365 Micrsooft Artificial Intelligence Encryption Society Writing Google Wallet Disaster Robot Laptop Social Windows 8 Hacker Hosted Solution Recovery Virtual Desktop Augmented Reality communications Retail Tech Support WiFi Drones SaaS Remote Computing Unified Communications Automation Holiday Managed IT services Printer Network Running Cable Alert Firewall Lithium-ion battery Gadgets Deep Learning Downtime Bluetooth Document Management Customer Service Law Enforcement Documents Office Memory Wireless Technology Network Congestion App Education Save Money Vendor Management Phishing

Newsletter Sign Up

  • First Name *
  • Last Name *