KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

GoDaddy Demonstrated How Not to Educate Users About Phishing

GoDaddy Demonstrated How Not to Educate Users About Phishing

While phishing awareness is an important practice to teach to a business’ employees, some methods are better than others, as GoDaddy—the domain registrar and web-hosting company notorious for its run of risqué ads—is learning the hard way. On December 14, GoDaddy’s employees received an email that seemed to be a holiday bonus from the company… only to find out (the hard way) that it was a phishing test that their employer had run.

  0 Comments
0 Comments
Continue reading

Schools Need Cybersecurity Protections, Too

Schools Need Cybersecurity Protections, Too

An increasing consequence of the COVID crisis has been the rash of ransomware attacks being unleashed upon various organizations. Whether enterprise-level or SMB, government or private, no business is immune from being targeted, as hackers take advantage of the confusion caused by the crisis. Take a moment to learn how to utilize cybersecurity techniques to protect your school district from ransomware attacks.

  0 Comments
0 Comments
Continue reading

You Have to Patch Your Software

You Have to Patch Your Software

Your business relies on its software, so if that software presents major security issues, it can be really concerning. In order to keep software from being a point of entry for hackers and scammers, you need to update and patch your software. Today, we’ll briefly discuss patch management and why it is a policy that you should be actively pursuing. 

  0 Comments
0 Comments
Continue reading

Is the Smartwatch a Security Risk?

Is the Smartwatch a Security Risk?

The holidays are a great time to give technology to your loved ones. One of the most popular smart devices for each of the past few years is the smart watch. While they are extremely useful and make great gifts, they may have an effect on an organization’s cybersecurity.  Let’s take a look at some of the possible threats smartwatches may present for IT administrators.

  0 Comments
0 Comments
Continue reading

Security Tips That Will Help You Hold Your Own

Security Tips That Will Help You Hold Your Own

Despite all the attention we try to direct toward cybercrime and awareness of the risks out there today, hacks and scams are still impacting businesses. With so many professional duties and activities carried out online, your business’ cybersecurity needs to be considered paramount. Here, we’ve listed six things to prioritize in your business to help protect it from such activities.

  0 Comments
0 Comments
Continue reading

Let’s Take a Look at Phishing Attacks

Let’s Take a Look at Phishing Attacks

Phishing attacks are growing in number and it presents a major challenge for businesses. The many different forms that these attacks come in just exacerbates the problem. Today, we will take a brief look at phishing to help you educate your staff on what they entail and how to mitigate the massive risk that comes with them. 

  0 Comments
0 Comments
Continue reading

Holiday Shopping Looking Different this Year

Holiday Shopping Looking Different this Year

2020’s holiday season is going to be much like the rest of 2020: distanced. Most people are taking precautions and therefore have put the kibosh on much of their holiday shopping trips, choosing instead to do a majority of their shopping online. By avoiding one risk, people take on others. Today, we thought we’d outline some of the problems people may experience when shopping online and what to do to reduce your risk.

  0 Comments
0 Comments
Continue reading

Two Lessons Businesses Can Learn from the Spotify Data Discovery

Two Lessons Businesses Can Learn from the Spotify Data Discovery

Every so often, we come across a bit of news that helps to teach not one, but two cybersecurity best practices at the same time. With the recent news of a cache of hacked Spotify accounts, we find just such an opportunity. Let’s review the two lessons to be learned.

  0 Comments
0 Comments
Continue reading

Alert: The Healthcare Sector is Being Targeted with Ransomware

Alert: The Healthcare Sector is Being Targeted with Ransomware

The healthcare industry is under siege as cybercriminals take advantage of the COVID-19 fueled stress to attack and compromise medical centers' data. Learn how to defend against these ransomware attacks, which have gained the Joint Cybersecurity Advisory's attention and should capture yours, too. 

  0 Comments
0 Comments
Continue reading

Is Remote Work a Bigger Risk with Certain Employees?

Is Remote Work a Bigger Risk with Certain Employees?

Despite all that has gone on, many businesses have managed to stay open by embracing the remote capabilities of today’s technology. This is undeniably fortunate… however, it is crucial that we also acknowledge the importance of cybersecurity as these actions are taken.

  0 Comments
0 Comments
Continue reading

Adobe Flash Will Soon Be Unsupported Software

Adobe Flash Will Soon Be Unsupported Software

Flash Player is going to be going out of support, the 24-year-old software being retired at the end of this year. That's a pretty big deal: Flash Player, at least initially, was a solution that most users have used at one time or another. What will this loss mean for your business’ processes?

  0 Comments
0 Comments
Continue reading

South Dakota's Rural Clinics are at Risk of Cyberattacks

272324397_Hacker_Rural_Hospitals_400

Cybercriminals focus on patient data because it contains all the information needed for identity theft and has a high value on the Dark Web. This is why large hospitals invest in considerable cybersecurity resources. Hackers know this and often focus on rural hospitals because, due to lack of resources for IT security, rural clinics may be an easier target. They aren’t wrong. Please read on to learn how rural clinics can better protect their patient data.

  0 Comments
0 Comments
Continue reading

The Four Corners Your Network Security Needs to Cover

The Four Corners Your Network Security Needs to Cover

Network security is paramount to a business’ success with the number of security incidents and data breaches that could potentially upend it. While this sounds like a task of marginally epic proportions, managing your security can be greatly simplified via a few basic activities. Let’s go over four such security-boosting actions that you should direct your attention to.

  0 Comments
0 Comments
Continue reading

When Your Contacts Aren’t Your Contacts - Display Name Spoofing

When Your Contacts Aren’t Your Contacts - Display Name Spoofing

Business success is often tied to the quality of your business relationships. There are a lot of people you need to trust: your vendors to get you whatever supplies you need, your team to complete their responsibilities without letting in threats, and your customers to turn to you for what they need. Unfortunately, cybercriminals are willing to take advantage of such trust to accomplish their own ends.

  0 Comments
0 Comments
Continue reading

Microsoft Thwarts Major Hacking Attempt

Microsoft Thwarts Major Hacking Attempt

With the 2020 U.S. Election under a month away, there has been a lot of concern that outside interests would try to influence the results. Microsoft has recently disrupted a huge coordinated hacking effort that had designs of altering the election infrastructure needed for a fair and secure election. Let’s take a look at the effort and Microsoft’s response in today’s blog.

  0 Comments
0 Comments
Continue reading

Rapid City’s 3 Biggest Cybersecurity Misconceptions

Rapid City’s 3 Biggest Cybersecurity Misconceptions

Business owners have a lot on their minds right now. That makes it easy to ignore the seemingly invisible cybersecurity threats that lurk in the shadows. It’s hard to put a realistic persona to these threats (the mysterious hacker in the dark hoodie concealed by shadows only goes so far) but the risks of not protecting your business from cyberthreats is very real.

  0 Comments
0 Comments
Continue reading

The Philosophy of Zero Trust

The Philosophy of Zero Trust

Your business’ security is inherently one of its most important considerations, which means that you need to take it very seriously. While this may sound overly obvious, many underestimate just how seriously business security needs to be taken nowadays. Let’s go into a security philosophy known as “zero trust,” and how it works to protect a business.

  0 Comments
0 Comments
Continue reading

What If All Data Was Leaked at Once?

What If All Data Was Leaked at Once?

When you take a long look at cybersecurity, you need to understand that the main purpose of it is to protect people’s ideas, people’s identities, and people’s effort. It isn’t all about protecting money, even though that obviously is a consideration. This notion led us to a thought experiment that Gizmodo recently undertook: What would happen if all the data stored in the world was suddenly leaked, open for the world to see? We’ve put together some of the responses. 

  0 Comments
0 Comments
Continue reading

The NSA Warns You To Protect Your Location

The NSA Warns You To Protect Your Location

We have often discussed the risks to privacy and security when talking about IoT, mobile devices, and ‘smart’ technologies. One thing we haven’t discussed often is the exposure to risk that geolocation tracking can bring to you and your business.

  0 Comments
0 Comments
Continue reading

Cybersecurity Has Also Felt the Influence of COVID-19

Cybersecurity Has Also Felt the Influence of COVID-19

While businesses have always needed to focus on their data security, the COVID-19 pandemic has only made this more of a challenge. Let’s go over why this is, and how many industries (especially the healthcare industry) have had to adjust as a result.

  0 Comments
0 Comments
Continue reading