KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Philosophy of Zero Trust

The Philosophy of Zero Trust

Your business’ security is inherently one of its most important considerations, which means that you need to take it very seriously. While this may sound overly obvious, many underestimate just how seriously business security needs to be taken nowadays. Let’s go into a security philosophy known as “zero trust,” and how it works to protect a business.

  0 Comments
0 Comments
Continue reading

What If All Data Was Leaked at Once?

What If All Data Was Leaked at Once?

When you take a long look at cybersecurity, you need to understand that the main purpose of it is to protect people’s ideas, people’s identities, and people’s effort. It isn’t all about protecting money, even though that obviously is a consideration. This notion led us to a thought experiment that Gizmodo recently undertook: What would happen if all the data stored in the world was suddenly leaked, open for the world to see? We’ve put together some of the responses. 

  0 Comments
0 Comments
Continue reading

The NSA Warns You To Protect Your Location

The NSA Warns You To Protect Your Location

We have often discussed the risks to privacy and security when talking about IoT, mobile devices, and ‘smart’ technologies. One thing we haven’t discussed often is the exposure to risk that geolocation tracking can bring to you and your business.

  0 Comments
0 Comments
Continue reading

Cybersecurity Has Also Felt the Influence of COVID-19

Cybersecurity Has Also Felt the Influence of COVID-19

While businesses have always needed to focus on their data security, the COVID-19 pandemic has only made this more of a challenge. Let’s go over why this is, and how many industries (especially the healthcare industry) have had to adjust as a result.

  0 Comments
0 Comments
Continue reading

Employees Can Be Your Business’ Best Defense Policy

Employees Can Be Your Business’ Best Defense Policy

A business’ employees are perhaps its greatest weakness in terms of its cybersecurity, although they also have the potential to be one of its greatest advantages if trained properly. To demonstrate this, let’s consider a few examples that exemplify either case.

  0 Comments
0 Comments
Continue reading

How Azure Can Support Your Remote Workforce

 How Azure Can Support Your Remote Workforce

In the pre-coronavirus era, the remote workforce was more the exception than the rule. As most workers were physically in the office, you could control and monitor the data your team accessed via your company network. In the post-coronavirus world, supporting a remote workforce may be the only way you’re able to keep your business open; however, going remote also brings with it diminished security. Fortunately, Microsoft’s Azure can provide the solution to keeping your data secure.

  0 Comments
0 Comments
Continue reading

Is My Smartphone Tracking COVID-19 Exposures Without My Consent?

Is My Smartphone Tracking COVID-19 Exposures Without My Consent?

Remember a few months ago when Google and Apple joined forces to come up with a system to help state and local governments establish a COVID-19 Exposure Notification system? If you didn’t, you aren’t alone. A lot has been going on lately. Just to catch you up, the two tech giants recently pushed out an update across nearly all modern smartphones so state and local governments can deploy apps to notify people when they may have been exposed to COVID-19. Let’s do a deep dive on what this means for your privacy.

  0 Comments
0 Comments
Continue reading

Cybercriminals are Targeting Rapid City Businesses with This Attack

Cybercriminals are Targeting Rapid City Businesses with This Attack

When talking to smaller Rapid City business owners about their IT security, we often get asked a question like this “My business is only operating on a local scale - I cover Rapid City, Hot Springs, and Spearfish, but I’m such a small blip on the radar...why would hackers target my business?”

I get variations of this question pretty often - are hackers really looking for targets like me, or why not a bigger firm out of Minneapolis? The truth is, small businesses can be easy targets, especially for this new attack.

  0 Comments
0 Comments
Continue reading

5 Coronavirus-Related Scams Affecting South Dakota

225551865_phishing_400

Never one to let a bad thing get in the way of a good opportunity, hackers are using the coronavirus crisis to target South Dakota businesses and employees. Cybercriminals are scamming South Dakotans out of their hard-earned cash or sensitive information and building the narrative around COVID-19. Now more than ever, businesses need to help their team recognize a phishing attempt before it’s too late.

  0 Comments
0 Comments
Continue reading

How to Deal with Body Temperature Concerns in Your Organization

How to Deal with Body Temperature Concerns in Your Organization

The impact an illness can have upon a business has perhaps never been more clear than it is now. We have all learned a hard lesson that spreading any sort of sickness amongst staff and customers has dire ramifications. We want to discuss this situation and introduce a potential solution using thermal camera technology as a means of minimizing the spread of illnesses.

  0 Comments
0 Comments
Continue reading

What’s the Best Antivirus for Businesses?

What’s the Best Antivirus for Businesses?

Quick Marty! Hop into the DeLorean! Let’s time travel back to a simpler time, back in the late 90’s!

Back then, you could walk into any store that sold software and you’d see two types of antivirus protection - orange boxes that said Norton, and red boxes that said McAfee.

Today, like most things, life isn’t as simple. There are a lot of choices, and… well, you shouldn’t be going to a store to buy your antivirus these days. Let’s discuss!

  0 Comments
0 Comments
Continue reading

Avoiding Cybersecurity Placebos in Your Business

Avoiding Cybersecurity Placebos in Your Business

When it comes to your business, especially its technology, some of the buzzwords you hear floating around can be pretty convincing, almost intoxicating. Unfortunately, like most buzzwords, many of these are aggrandized beyond their worth to the average small-to-medium-sized business. Let’s take a look at how this can impact a business’ perception of its cybersecurity, as well as dig into the reality behind these terms.

  0 Comments
0 Comments
Continue reading

The Basics of PCI Compliance

The Basics of PCI Compliance

Businesses today should be accepting card-based payments, regardless of their size. In addition to the convenience it offers to customers, it’s the most secure means you have of being paid. To protect consumers and their personal and financial information, many card providers have adopted a unified regulation that applies to businesses that accept these payments. Let’s review this regulation and how it impacts the average small-to-medium-sized business.

  0 Comments
0 Comments
Continue reading

Storing Data Is a Miracle of Physics That We All Put Too Much Trust Into

Storing Data Is a Miracle of Physics That We All Put Too Much Trust Into

We all store data on our computers. Whether you have family photos and text documents on your home computer, or databases and on-premises applications running your entire business, data is typically stored in exactly the same way. If you knew how delicate your data actually was, you’d never let a single file exist in one place ever again. Let’s explore that.

  0 Comments
0 Comments
Continue reading

There’s a Reason Some Scams are Painfully Transparent

There’s a Reason Some Scams are Painfully Transparent

“Hello sir/ma’am, I am a member of royal [sic] family and I am in grave danger in my country. If you send me money to get out safely, I will share my great riches with you as reward.”

Scams like this one have become a punchline for many, which makes you wonder why they are still commonly used by cybercriminals. As it turns out, there’s a very compelling reason that they do so, one that’s been known for years.

  0 Comments
0 Comments
Continue reading

COVID-19 is Having a Big Effect on Cybersecurity

COVID-19 is Having a Big Effect on Cybersecurity

The COVID-19 pandemic has put a lot of stress on people.  Nowhere is this more true than in the small business arena. Small businesses, many of which were forced to suspend or severely alter their operations, are also dealing with cyberattacks. Let’s take a look at the effects COVID-19 has on small businesses regarding cybersecurity. 

  0 Comments
0 Comments
Continue reading

Cyberattacks are Up at the World Health Organization

Cyberattacks are Up at the World Health Organization

The World Health Organization has been busy dealing with one of the biggest calamities in contemporary times, the COVID-19 pandemic that has had much of the world on pause for the past few months. Unfortunately, they’ve been dealing with an increase in cyberattacks. Today, we’ll take a look at some of the issues the WHO is having with cybercriminals. 

  0 Comments
0 Comments
Continue reading

5 Tips to Make Your Zoom Meetings More Secure

5 Tips to Make Your Zoom Meetings More Secure

As remote work becomes the new normal, many businesses are turning to Zoom video conferencing as a way to communicate with their team and customers. “Zoombombing” has come to the forefront as an ongoing issue due to a lack of proper security protocols being in place. While many organizations are banning Zoom meetings out of concern, your business doesn’t (and shouldn’t) have to. We’ve put together five tips to keep your Zoom meetings secure.

  0 Comments
0 Comments
Continue reading

Your Cybersecurity Policy Will Come to Define Your Business

Your Cybersecurity Policy Will Come to Define Your Business

At this point, it’s hard to believe that anyone needs to be told that cybersecurity is important, but some organizations are still doing the bare minimum to protect their network and data. That can’t go on forever. Today, we thought we would discuss how to put together a cybersecurity policy that covers all the bases, and will give you the peace of mind that you are actively combating today’s most present threats to your network, infrastructure, and data. 

  0 Comments
0 Comments
Continue reading

Coronavirus: A Threat to Your Staff, Cyberthreat to Your Operations

Coronavirus: A Threat to Your Staff, Cyberthreat to Your Operations

COVID-19, or coronavirus, has been a major global health concern over the past couple of months. At this point, it is clear that this disease could have serious impacts on the workplace. We wanted to provide a brief rundown of good workplace and network health practices, as well as a few pointers on how you can handle health-based employee absences.

  0 Comments
0 Comments
Continue reading