Network Technologies of Kansas

Blog

Microsoft Releases PoC Code For MacOS App Sandbox Vulnerability

MacOS features a powerful sandbox restriction that helps keep modern Apple computers safe by limiting how code can run on the system. Unfortunately, no system is bullet proof. There's a way that ...

Lenovo Models Affected By Medium Severity Vulnerabilities

If you own a Lenovo laptop, be aware that researchers at ESET have recently discovered a trio of bugs reported to Lenovo that could allow an attacker to disable security features and ...

Microsoft 365 Suggests Rollback After Issues From Update

Does your company use Microsoft 365?  If so, and you've noticed that your Office apps have begun to crash mysteriously and inexplicably, be aware that the latest update (build 15330.20298) is the ...

IoT Security With Microsoft Defender

The Internet of Things (IoT) has seen explosive growth in recent years. If you like, you can now build your own smart home with intelligent toasters, washing machines, dishwashers, and refrigerators. They ...

Hackers Use VoIP Systems To Install PHP Web Shells

Security researchers at Unit 42, a division of Palo Alto Networks, have been tracking the efforts of a massive campaign aimed at Elastix VoIP telephony servers. They are used by companies of ...

Google Experiences International Outage

"Just Google it."  You've probably heard that phrase a thousand times.  In fact, you may use it yourself on a regular basis. Unfortunately, Googling it wasn't possible recently.  The iconic search giant ...

Apple Users Will Want To Update As Soon As Possible

Do you own a device running macOS Monterey 12.5.1, or iOS/iPadOS 15.6.1? If so, you'll want to download and install the latest patches as soon as possible. Apple recently released a small ...

Raspberry Robin Worm In Hundreds Of Windows Networks

Analysts at Red Canary Intelligence have recently spotted a Windows worm on hundreds of networks belonging to a wide range of organizations around the world. Dubbed "Raspberry Robin" by the research team ...

The Importance Of Having An Email Newsletter

Most business owners understand the importance of being active on at least one social media channel. That's fine as far as it goes, but have you considered supplementing your social media presence with ...

Prepare For Windows Server 2012 End Of Support

Another week, another Microsoft "End of Life" reminder to write about. This time, it's Windows Server 2012 R2.  If you're a user, then you're probably already aware of the looming deadline. If ...

Blog

Microsoft 365 Accounts Targeted In New BEC Scam

Microsoft 365 Accounts Targeted In New BEC Scam

Recently, researchers at Mitiga have sounded the alarm about a new Business Email Compromise (BEC) campaign.  They discovered evidence of[...]
Modern Security Solutions For Evolving Ransomware Attacks

Modern Security Solutions For Evolving Ransomware Attacks

Based on a recent survey conducted by the folks at Titaniam, a solid majority of organizations have robust security tools[...]
Oracle Cloud Infrastructure New Vulnerability Patch

Oracle Cloud Infrastructure New Vulnerability Patch

In June, Wiz engineers discovered and reported #AttachMe, a critical cloud isolation flaw in Oracle Cloud Infrastructure (OCI). Due to its[...]

Locations

Topeka (HQ)

2008 SW Gage Blvd.
Topeka, KS 66604
(785) 409-6286

Company

Since 1999, Network Technologies of Kansas has been a leading provider of IT support and consulting, focusing on small and medium sized businesses in Topeka and surrounding areas. We have helped hundreds of businesses increase productivity and profitability by making IT a streamlined part of operations. We equip our clients with customized technology solutions for greater operational value and to reduce risk.

Proud Member of

The 20 Elite