KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Sharing a Computer with the Kids? Better Make Security a Priority

Sharing a Computer with the Kids? Better Make Security a Priority

If you work remotely, or even if you simply use the home computer for typical household tasks, and your kids use it too, it is a good idea to buckle down on security best practices. Most of what we discuss in this post will apply to virtually anybody—safe and secure computer habits are important for everybody—but this goes double for those with children and teenagers in the house.

  0 Comments
0 Comments
Continue reading

Microsoft Dealing with Major Data Leak

Microsoft Dealing with Major Data Leak

Incorrect configurations on your infrastructure’s hardware are surprisingly easy mistakes to make, and even worse, they can have severe security ramifications if they are not discovered promptly. It can happen to anyone, as evidenced by a recent data leak. One of the most popular software developers out there, Microsoft, made a pretty nasty blunder with one particular setting that led to a huge data leak that could have exposed millions of records.

  0 Comments
0 Comments
Continue reading

Cybersecurity is Critical for a Business, Regardless of Its Size

Cybersecurity is Critical for a Business, Regardless of Its Size

It can be very tempting to read the cybersecurity headlines and assume that cybercrime is an enterprise business’ concern. There’s a sense of security in the idea that threats are, for the most part, directed toward the likes of Colonial Pipeline and other organizations of its size.

Unfortunately, we have some bad news for those who have felt this temptation and had these ideas: that sense of security is a false one.

  0 Comments
0 Comments
Continue reading

A New Ransomware Awareness Tool is Making the Rounds

A New Ransomware Awareness Tool is Making the Rounds

Ransomware is such a major problem for computing-dependent organizations that even government agencies are getting involved, equipping businesses and organizations with tools to help themselves identify whether or not they are at risk of these attacks. The most recent addition to this group, the United States’ Cybersecurity and Infrastructure Security Agency (CISA) have made their Ransomware Readiness Assessment, or RRA, available as part of its Cyber Security Awareness Toolset.

  0 Comments
0 Comments
Continue reading

Three South Dakota Industries At Risk For Ransomware

Three South Dakota Industries At Risk For Ransomware

Cyberattacks have been on the rise as bad actors continue to reap the benefits of their nefarious acts, many shifting their gaze to key industries as a means of gaining leverage. South Dakota is home to various industries—many of which are viable targets for cybercriminals and ransomware. Let’s identify three such industries that need to increase their vigilance. 

  0 Comments
0 Comments
Continue reading

Why You Should Care that Chinese Security Cameras are Banned

254701202_security_cameras_400

Due to the ongoing impacts of the pandemic, many businesses are seeing a reduced onsite workforce. With less staff at your business office, there are fewer deterrents for unwanted or criminal activity. There has been a rising trend in businesses of all sizes investing in physical security to prevent this. Unfortunately, many security cameras have joined the growing list of banned devices from Chinese manufacturers. If you’re considering investing in a security camera, take a moment to learn how to ensure your device won’t hinder your business.

  0 Comments
0 Comments
Continue reading

You Should Be Training Your Staff on Phishing Tactics

You Should Be Training Your Staff on Phishing Tactics

Phishing attacks are a major problem that all businesses must be prepared to handle. Sometimes it comes in the form of messages or web pages designed to steal information from your employees, but other times it might come in the form of phone calls asking for IP addresses or network credentials under the guise of your IT department. It’s especially important that your staff members understand how to identify these tricks, and it all starts with phishing training.

  0 Comments
0 Comments
Continue reading

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

Unsupported SonicWall Products Vulnerable to New Ransomware Attack

A new ransomware threat has surfaced, this time targeting unpatched and end-of-life products in SonicWall’s line of Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products. The threat is currently being exploited in the wild, so if you utilize these devices in your business, it is your responsibility to take action to mitigate damages caused by these ransomware attacks now.

  0 Comments
0 Comments
Continue reading

Local Municipalities are at Risk of Cyberattacks

Local Municipalities are at Risk of Cyberattacks

Ransomware attacks continue to dominate the cybersecurity conversion. While large organizations and industries garner headlines, the majority of ransomware attacks focus on smaller targets. Often, municipalities don’t have as many resources as larger organizations, so any disruption to their operations can be devastating to the people who rely on their services. Here’s how city governments can protect themselves. 

  0 Comments
0 Comments
Continue reading

Ransomware is a Serious Problem… Here’s How to Deal with It

Ransomware is a Serious Problem… Here’s How to Deal with It

Ransomware has been a scourge to businesses for years now, with it unfortunately experiencing a renaissance of sorts as the COVID-19 pandemic came to the fore. With increased phishing attacks and other means of spreading ransomware now taking advantage of the ongoing situation, it is all the more important that these attempts can be identified and mitigated.

  0 Comments
0 Comments
Continue reading

Don’t Let Your Small Business Fall Prey to These Common Security Risks

Don’t Let Your Small Business Fall Prey to These Common Security Risks

Data breaches are an unfortunate reality that businesses have to contend with, but small businesses often do not give them the consideration that they deserve. It is critical that you consider security challenges and take these risks seriously. Let’s examine how you can overcome some of the many challenges that small businesses have with cybersecurity.

  0 Comments
0 Comments
Continue reading

There Isn’t Much that Is More Devastating than Ransomware

There Isn’t Much that Is More Devastating than Ransomware

Countless high-profile ransomware attacks have surfaced over the past several years, all against targets like manufacturers, pipelines, hospitals, and utility companies. Obviously, these attacks are a cause for concern, but some small businesses might make the mistake of thinking themselves too small to target. Unfortunately, this is simply not the case; we’ll help you protect your business from these devastating cyberattacks.

  0 Comments
0 Comments
Continue reading

New Report Finds that A Third of Employees Will Fall for Phishing Scams

New Report Finds that A Third of Employees Will Fall for Phishing Scams

Hackers are a crafty bunch. They will use any and all means to infiltrate businesses, including some that are downright shameful. One of the most devastating ways that hackers make these attempts is through the use of phishing attacks, or attacks where they essentially trick users to click on links in emails or hand over confidential information.

  0 Comments
0 Comments
Continue reading

What the Irish Health Service Disruption Proves About Data Restoration

What the Irish Health Service Disruption Proves About Data Restoration

This past May, Ireland’s Health Service Executive—the organization responsible for providing healthcare and social services to the country’s residents—was successfully targeted by a major ransomware attack. Unfortunately, we are still talking about it now because the entire situation has forced us to acknowledge the aftereffects of such an event.

  0 Comments
0 Comments
Continue reading

Implement a Password Management Solution Today!

Implement a Password Management Solution Today!

With so many accounts required on an everyday basis, it’s no surprise that people often struggle with passwords and password security. One way that individuals try to manage the countless passwords used on a daily basis while keeping them secure is through the use of password managers. What does a password manager do, and why should you consider implementing one for your business?

  0 Comments
0 Comments
Continue reading

How a VPN Works to Keep Your Data Secure

How a VPN Works to Keep Your Data Secure

The COVID-19 pandemic forced many organizations to transition to online work, a notion that many businesses felt was previously out of the question. This transition came with its fair share of frustrations, but eventually businesses figured out that remote work offered various benefits. That said, one of the biggest issues also manifested, and was in the form of security.

  0 Comments
0 Comments
Continue reading

Considering Your Business’ Cybersecurity Strategy

Considering Your Business’ Cybersecurity Strategy

It should come as no surprise that cybersecurity is an important consideration for a business, which means it is important that you are aware of how effective your security practices are. Evaluating this is best accomplished by testing your team and their preparedness… but how often should you do so?

  0 Comments
0 Comments
Continue reading

Encryption Is More Important than Ever

Encryption Is More Important than Ever

Now that Google’s Android Messages application has end-to-end encryption, it might be a good time to discuss the concept of what end-to-end encryption actually is and why it’s important. Let’s take a closer look.

  0 Comments
0 Comments
Continue reading

Is Cybersecurity Really a Big Deal?

Is Cybersecurity Really a Big Deal?

While cybersecurity continues to be a top-of-mind concern, too many people to tune out the warnings, despite the high-profile events that populate the news cycle. So while there has been some pain felt and service disruptions due to ransomware, it may not have impacted enough people or lasted long enough to realize that action needs to be taken.

  0 Comments
0 Comments
Continue reading

Meat Packers On the Wrong End of Malware

Meat Packers On the Wrong End of Malware

Once again, ransomware strikes, this time targeting the world’s largest meat processor and distributor, JBS S.A. This disruptive cyberattack forced the company to suspend operations in both North America and Australia, a move which had devastating consequences to the supply chain. What can we learn from this situation?

  0 Comments
0 Comments
Continue reading