KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Complacency, and The Need For a BDR Plan

BDR Plan

Of all the reasons that a business may have to postpone a migration to the cloud, there is one that probably ranks as the worst. This one reason effectively boils down to a “if it ain’t broke, don’t fix it,” mentality. Despite whatever history of success a business may have, statistics tell us that, eventually, any business will experience data loss, period.

0 Comments
Continue reading

Reduce Cyberthreats with Security Keys

Security Keys

As we have often said, the greatest vulnerability in securing your system will be due to human error. Not due to maliciousness or incompetence, just mistakes that we all have made. Phishing is one of the most common methods of compromising your security, its goal to capture sensitive information. Since phishing often disguises itself as a friendly entity, it can be extremely difficult to recognize until it’s too late.

0 Comments
Continue reading

Cloud Migration and FUD

Cloud Migration and FUD

FUD: Noun – fear, uncertainty, and doubt.

While cloud computing is becoming more mainstream, we find there is still some pushback from IT departments and ‘C’ level executives who don’t understand what the cloud offers and IT professionals may be worried more about maintaining their control than realizing it’s time to let go.

Tags:
0 Comments
Continue reading

VPNFilter: Older Technology is the Hacker’s Greatest Ally

VPNFilter

The latest malware threat that attacks IoT devices is called the VPNFilter. VPNFilter is malware which infects routers or NAS (network storage devices). These devices are primarily older consumer and SOHO (small office home office) grade level devices. When first discovered last May, VPNFilter had already hijacked half a million devices from a handful of vendors. However, as time has progressed, the malware had increased its reach, commandeering six new vendors and increasing the number of models it could infect.

Continue reading

Western Dakota Tech Wins National Science Foundation Community College Innovation Challenge

Western Dakota Tech wins award

As part of the nation’s focus on jobs for the future, most elementary and high schools have been emphasizing STEM, (Science, Technology, Engineering and Math) as a means to provide students with the skills needed to compete in a brave new world. As technology-based employment is destined to become even more dominant than ever, communities in the know are preparing their students for the jobs of tomorrow.

Continue reading

Focus on Your Patient Care and Not Your Paperwork

EMR/EHR

When was the last time you saw a room full of color-coded files in your health provider’s office? If it was recently, then your provider is part of the approximately 10% of providers who still update and maintain their patients’ (your) records by hand and on paper. Today, nearly 90% of office-based health providers are using some form of electronic health record (EMR/EHRs) system.

Continue reading

The Internet of Things and BYOD

IOT

The Internet of Things is everywhere, from the devices in our pockets, to the computers on our desk and even the stoves we cook on. Connectivity is the trend and smart devices are providing all manner of devices with unheard of functionality. We are becoming more and more connected to our technology, as they become more connected to each other. However, the more our devices speak to each other, often without our knowledge, the greater the risk of exposure. Quite frankly, as our devices become smarter, so do the cybercriminals and with our ‘always on’ connectivity, the hackers have ample time to find the vulnerabilities in our networks.

Tags:
Continue reading

Why You Should Care About Cryptomining

cryptomining

Despite cryptocurrency, such as Bitcoin, becoming more and more part of the mainstream, there is still some confusion as to what exactly cryptocurrency is. While many of us know of the concept of cryptocurrency, many of us don’t truly understand what steps are needed to acquire and to use them.

Continue reading

It’s Time To Go Beyond Computer Repair - Invest in Managed IT

Managed_IT

As more small and medium-sized businesses realize the value in working with a managed IT provider, there is now an increasing number of computer repair shops who are hopping on the IT bandwagon; claiming to offer fully-proactive managed IT services. While a computer repair shop may be great at recovering a broken hard drive or solving a quick issue, managed IT is much more than fixing broken stuff. 

Continue reading

Security Operations Center - Your 24/7 Partner Against Cyberattacks

cyber_security

When it comes to securing your network, are you treating security and protection like a 9-to-5 job? That is, do you assume that once you close your office for the day, hackers stop attacking your servers and go home to eat dinner? That it’s like, “Honey, Star Trek is on, stop your DDoS and make some popcorn?”

Continue reading

Defend Yourself From Cybercrime with Office 365

office365-logo_20180510-131202_1

Over the past couple of decades, we have been quickly reducing the barriers between average people and technology. There was a time not so long ago when much of the technology we use these days was considered out of reach financially for most people.

Continue reading

The Time to Recycle E-Waste is Today

ewaste_recycle

For technology to become accessible, it must first become affordable and when it becomes affordable; it becomes disposable. In the early days of technology, the products were expensive, which meant that people invested the time to keep them running. If they broke, you got it fixed; if it couldn’t be fixed, you tried to save whatever parts you could salvage, because you may need them for something else. It wasn’t uncommon to go into garages and basements and find pieces and pieces of other technology being saved for other uses.

Continue reading

World Backup Day 2018

World_BackUp_day

You know that sound.

The Click….Click….Click, as your hard drive searches for data it most likely will never find again. The sound of the drive heads hitting the internal head stop. You did back up your data, didn’t you? If so, what did you back it up to?

Continue reading

BDR Is More Than Just Insurance For Your Data, Its Insurance For Your Business’ Future

BDR

An efficient Data Backup and Recovery (BDR) solution consist of more than just backing up your data, “just in case.” BDR, like most forms of insurance, is about planning for the future and doing all to ensure your business can not only be prepared for a disaster but survive it. As nearly 70% of businesses that lose their data, quickly go out of business, we can see the importance of developing a BDR plan.

Continue reading

Head Into The Cloud

head_into_the_cloud

“640K ought to be enough for anyone.” - Bill Gates* 

Past Is Prologue

Oh, how have times changed. I have been in this industry long enough to remember when one gig drives were first introduced, and we felt our storage needs were finally solved with the power of one thousand floppies! Who would ever need that much space, let alone use it? ...yeah.

Continue reading

Router on Steroids: The Unified Threat Management System

Router on Steroids

Threat Evolves and So Must Your Security

Face it, the days of people sitting in the parking lot, hacking your WiFi to ‘share’ your bandwidth is gone. Today their goal is to co-op your technology for their own nefarious needs and use your own data against you.

Continue reading

Data Privacy Goes Beyond A Secure Password

DataPrivacyDay_400

Celebrated on January 28, Data Privacy or Data Protection Day, was first held in January 2008. Its goal is to bring awareness and develop best practices to how we manage our data and who we share our information with. KT Connections offers a variety of security services to help protect your business from risks to your data safety and your privacy.

Continue reading

Unified Threat Management is a Must For a Protected Business

Fotolia_107536823_S_UTM_Network_server_400

At KT Connections, we understand that your security is paramount to your business’ success. We are committed to providing the means for your organization’s data to be as protected as possible against the variety of threats that you can potentially encounter. To accomplish this, we leverage a security measure known as Unified Threat Management.

Continue reading

The Holiday Season is also Spear-Phishing Season

Fotolia_165264430_S_present_thief_400

For a hacker, there’s no such thing as a holiday break. As a matter of fact, some attack vectors are seen more commonly during this time of year. One of these attack vectors, spear phishing, becomes a particular favorite for many hackers. In order to stay safe, you need to be more careful on social media, webmail, and ecommerce sites.

Continue reading

It’s Now Legal for ISPs to Sell Your Online Browsing History

It’s Now Legal for ISPs to Sell Your Online Browsing History

Due to recent legislative activity, the rules and regulations that the Federal Communications Commission put in place to protect the personal data of Internet users have been struck down. This change now allows ISPs, or Internet Service Providers, to sell the browsing information of their customers to advertisers without consent--a move many consider to be a threat to net neutrality. This is what you need to know.

0 Comments
Continue reading