KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Start Off 2020 by Auditing Your Online Accounts and Passwords

Start Off 2020 by Auditing Your Online Accounts and Passwords

Let’s take a look at a real-world scenario that I ran into a few weeks ago with a family friend. For the sake of this story, let’s call him Bob. Bob lost access to a pretty important online account.

0 Comments
Continue reading

Can Adding Spaces Increase Your Passphrase Simplicity?

Can Adding Spaces Increase Your Passphrase Simplicity?

Every year we see a rash of data breaches, the majority caused by compromised credentials. In response, KT Connections has been providing tips and best practices to help keep your users and your business safe. As the year winds down, let’s take one more look at credentials and learn another tactic to create secure and simple passphrases.

Continue reading

These Are the Last Days of Windows 7

These Are the Last Days of Windows 7

Microsoft is just days away from retiring not just one, but two of its most popular operating systems. The software giant has made a point to run a major campaign warning people who are still using Windows 7 that they are going to lose support after the January 14, 2020 deadline; but, as of this writing, there are still over a quarter of desktop users running the software. With the deadline looming, we thought we’d look at what this means for users and go through some of the options they have.

0 Comments
Continue reading

Security Has to Be a Priority in 2020

Security Has to Be a Priority in 2020

Cybercriminals aren’t exactly holding back when it comes to attacking businesses, which means that businesses can’t rest on their haunches as the new year rolls in. Let’s take a few moments to look toward the near future, and the issues that cybersecurity professionals are warning us about.

0 Comments
Continue reading

A Recent Data Theft Shows Us What to Watch Out For

A Recent Data Theft Shows Us What to Watch Out For

Trend Micro, the developer of the popular antivirus program, has attracted some unwanted attention after a former employee managed to steal customer data and sell it to scammers. These scammers then use this data to call Trend Micro customers. If you use Trend Micro’s antivirus solutions, you’re going to want to pay close attention to any calls you get.

0 Comments
Continue reading

Chrome’s Password Manager Makes Password Security a Breeze

813645_google_password

Poor password practices are a critical issue impacting consumers and businesses alike. Weak and re-used passwords are the low-hanging fruit many hackers use to access online accounts and sensitive materials. Google’s updated password manager seeks to provide a remedy to poor password management by providing a number of management tools in a familiar interface.

Continue reading

Start Using Two-Factor Authentication Everywhere, Today

Start Using Two-Factor Authentication Everywhere, Today

It can be easy to slack off when it comes to good password practices. Many users still use the same password across multiple sites and often don’t use secure passwords. Password managers make this a lot easier, but it’s really two-factor authentication (2FA) that can make all the difference. Strong, unique passwords are still important (not all accounts offer two-factor authentication) but let’s talk about why you should always enable two-factor or multifactor on all of your accounts when possible.

0 Comments
Continue reading

Why You Should Upgrade to Windows 10

ktconnections_windows_10

Not too long ago, we shared a blog that discussed how Windows 7 isn’t going to be a viable option very much longer. We wanted to be sure that there was no misconceptions remaining as to how important it is to update your business’ systems to Windows 10. That’s why we’re taking the time to go a little further into why an update is the only real path for your business.

0 Comments
Continue reading

4 Key Steps to Better Cybersecurity

4 Key Steps to Better Cybersecurity

In many ways, explaining why sufficient cybersecurity is important for your business has become redundant - especially when it is much more important to understand how this cybersecurity needs to protect you. The threats to data and privacy are known, but no less potent. In order to counter them, you need to make sure you have what you need to protect your business - starting with a few key considerations.

0 Comments
Continue reading

How to Optimize Security, Regarding Your Servers

How to Optimize Security, Regarding Your Servers

Your business relies on its servers in order to function - which makes it incredibly important that these servers are sufficiently protected. There are a few practices that you can put into place that will help you to secure your server room. Let’s work our way from the inside out as we review them.

0 Comments
Continue reading

Cybersecurity is a Shortcoming for the DHS

Cybersecurity is a Shortcoming for the DHS

Every IT administrator today needs to be concerned about cybersecurity, as does every private business when it comes to its network. However, the same can’t really be said for the computing resources of the government and other public entities… simply due to the lack of talent available.

0 Comments
Continue reading

Will You Still be in Business Six Months From Now?

hacker_181606056-400

Data breaches compromise thousands of people’s personal information, while ransomware attacks cripple businesses and organizations on a daily basis. Despite this, many small-to-medium-sized businesses still feel that due to their smaller size, they aren’t targets. The truth is, many SMBs handle the type of sensitive data which is attractive to cybercriminals. To make matters worse, many SMBs haven’t invested in the security infrastructure needed to protect themselves… something hackers count on.

0 Comments
Continue reading

Tip of the Week: Mobile Data Management

Tip of the Week: Mobile Data Management

There are hundreds of things that a business owner has to do, so managing the security of the data coming in and going out from mobile devices might not make the hierarchy of considerations that need to be immediately addressed. Today, we will take a look at why paying attention to the mobile end of your business is so important, how Mobile Information Management (MIM) helps with that, and how MIM fits in with the rest of your mobile strategy. 

0 Comments
Continue reading

How Google is Trying to Make Passwords Easier and Better

password_easier

Common opinion more or less states that passwords aren’t so much “necessary,” as they are a “necessary evil.” The best practices that are recommended to maintain the efficacy of passwords today can certainly feel excessive - which tempts many users into ignoring these practices, to the detriment of their security. Fortunately, many large companies - like Google - are trying to make passwords easier to manage.

0 Comments
Continue reading

Even If You Don’t Hear About Small Business Breaches, They Happen

Even If You Don’t Hear About Small Business Breaches, They Happen

If you have a bank account or a credit card, chances are you’ve been made aware of a hack or a data breach. Big organizations are more frequently being breached, forcing them to run damage control for the often millions of customers affected. News coverage often bashes these big organizations, but what about smaller ones? The truth is, smaller businesses are breached just as often, with the consequences being just as severe. 

0 Comments
Continue reading

Can Your Business Afford to Pay $10,000 a Day?

Can Your Business Afford to Pay $10,000 a Day?

It’s a good thing South Dakota is one of the most data secure states. Since 2018, a data breach in South Dakota could cost your company up to $10,000 a day, per instance, if you don’t notify your customers.

Continue reading

Microsoft is Releasing Out-of-Band Security Updates

Microsoft is Releasing Out-of-Band Security Updates

Patching your software is one of the most important, yet ignored, tasks in computing. Keeping all of your software up to date with the latest threat definitions can help your business’ IT stay secure. Recently, in a somewhat atypical move, Microsoft has announced that they have released an emergency out-of-band security update to fix two critical security issues. 

0 Comments
Continue reading

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

0 Comments
Continue reading

Three Tricks to Spot Phishing Attempts

Three Tricks to Spot Phishing Attempts

Cybersecurity needs to be a priority to any business that wants to continue their operations in the long-term. One threat that is very common today is the phishing attack.

0 Comments
Continue reading

Why Passphrases Can Be Better Than Passwords

Why Passphrases Can Be Better Than Passwords

If you’re like many people, you likely find the prospect of remembering a password daunting - possibly daunting enough to cheat a bit when it comes to using a different one for each account? Admittedly, maintaining so many passwords can be challenging… so why not use a few tricks to make them easier to remember?

Continue reading