KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is It Fair to Be Fired for Falling for a Phishing… Test?

Is It Fair to Be Fired for Falling for a Phishing… Test?

Let’s run through a quick scenario: your company’s computing infrastructure is infected with ransomware. Fortunately, you have an offsite backup, so you are able to restore your systems without too much trouble, other than the time you’ve lost. As you investigate the root cause, you discover that one of your employees allowed the ransomware in by falling for a phishing email. So, do you fire them?

0 Comments
Continue reading

Your Guide to the Malware You Could Encounter

Your Guide to the Malware You Could Encounter

You’d be hard-pressed to find someone nowadays who hasn’t heard of malware, although they may have difficulty identifying different threats as they encounter them. Does this sound like the people that you work with? We’re here with a simple solution to assist you and your team in spotting the different kinds of threats - a malware guide to distribute among your staff so they can better spot the usual suspects.

0 Comments
Continue reading

Two-Factor Authentication Works to Remove Security Risks

Two-Factor Authentication Works to Remove Security Risks

Imagine a scenario where your password has been stolen by a hacker. Now your accounts are completely at the mercy of them. What do you do? Obviously you want to change the password, but are you going to learn from this mistake or let it happen again in the future? Thankfully, two-factor authentication offers a solution to this dilemma, and it’s one that you might not have considered in the past.

0 Comments
Continue reading

VoIP Has a Spam Problem

VoIP Has a Spam Problem

Robocalls plague the world’s smartphone users, but have you ever stopped to ask why you receive them in the first place? Why are robocallers able to hide behind a local number so that you pick up the phone? Scammers are actually using a business tool you may have heard of… Voice over Internet Protocol, or VoIP, a modern phone solution that in the hands of anyone else is extremely helpful.

0 Comments
Continue reading

Diagnosing a Man-In-the-Middle Attack

Diagnosing a Man-In-the-Middle Attack

The man in the middle has a lot of power and influence over the end result, and this is true even in the technological world. In fact, there are attacks dedicated to this vector, twisting and turning something that your organization needs into what amounts to a threat. We’ll discuss what a Man-in-the-Middle (MitM) attack is, as well as what you can do to combat these threats.

0 Comments
Continue reading

Social Media Scams and Everything You Should Know

Social Media Scams and Everything You Should Know

Social media has overtaken both the professional and personal aspects of online communication and connection, and while it might provide a considerable boon for both, it increases the odds of being contacted by scams and other malicious attempts. The best way to make sure you don’t fall prey to a scam is to remain vigilant. Today we’ll discuss the various scams that are created for use with social media.

0 Comments
Continue reading

Why You Should Upgrade to Windows 10

ktconnections_windows_10

Not too long ago, we shared a blog that discussed how Windows 7 isn’t going to be a viable option very much longer. We wanted to be sure that there was no misconceptions remaining as to how important it is to update your business’ systems to Windows 10. That’s why we’re taking the time to go a little further into why an update is the only real path for your business.

0 Comments
Continue reading

Will U.S. Leaders Consider Data Privacy?

Will U.S. Leaders Consider Data Privacy?

Over 90 percent of people in the United States feel like their data is out of their control, and judging from the impression that the European Union’s General Data Protection Regulation left on the world, it’s surely not going to be the last piece of privacy legislation that is issued. Still, will it be enough to urge certain governments and organizations to practice what they preach? The results could have long-lasting effects on businesses, as well.

0 Comments
Continue reading

Phishing Attacks Are Besting Two-Factor Authentication--Now What?

Phishing Attacks Are Besting Two-Factor Authentication--Now What?

What has proven to be one of the more effective ways of preventing phishing attacks may be under fire from more advanced threats designed specifically to penetrate the defenses of two-factor authentication. This means that users need to be more cognizant of avoiding these attacks, but how can you help them make educated decisions about this? Let’s start by discussing the phishing attacks that can beat 2FA.

0 Comments
Continue reading

How to Prevent Data Loss Threats from Former Employees

11361191_employee_taking_data

Disasters come in all shapes and sizes, and all of them could potentially impact your business’ operations. While the term “disaster” often conjures images of fires and floods, there is another kind of disaster that isn’t considered nearly as often - the actions of a disgruntled former employee.

Continue reading

How South Dakota Avoided Any Patient Data Breaches in 2018

79958897_XS

Throughout 2018, the healthcare industry was heavily battered by data breaches, ultimately totalling 503 breaches throughout the year that affected almost 15.1 million patient records. Of all those breaches, not one of them occurred in South Dakota. What caused this? We have our suspicions, which we’ll discuss here.

Continue reading

Taking a Trip Through Data Privacy, Part II

Taking a Trip Through Data Privacy, Part II

Earlier this week, you may have seen the first part of this article, where we discussed how robocallers collect your information. Today, we continue our discussion on data privacy and what you can do to keep your organization and personal data safe.

0 Comments
Continue reading

Taking a Trip Through Data Privacy, Part I

Taking a Trip Through Data Privacy, Part I

Protecting your business’ data is no simple task. To make it as secure as possible, you’ll have to understand how personal data flows through online channels. We’re digging pretty deep with this one, so get ready for an informative and, if nothing else, interesting read. This topic is especially important in an age where Facebook and Google exist, but there are countless other threats to data privacy out there that we all experience on a regular basis--business or not.

0 Comments
Continue reading

5 Reasons IT is Stressed About Security

5 Reasons IT is Stressed About Security

If you have an internal IT administrator, they might be pretty stressed about your business’ security. Why? Simple - there’s a good chance that they feel trapped in a few common situations. Let’s review some stresses that influence IT employees, negatively affecting your security.

0 Comments
Continue reading

Pressing the IT Security Issue

Pressing the IT Security Issue

It wasn’t so long ago when your business could get away with protecting your computer with a simple installation of antivirus software. There were only around 50,000 known computer viruses in the year 2000, but that number has since skyrocketed to an astounding 185 million unique variants of threats.

0 Comments
Continue reading

Use Encryption to Keep Email Safe from Hackers

ktconnections_email_81078771

The most significant advantage technology brings to businesses (and the world, in general) is the ability to compensate for human error. As we have noted many times before, the most significant vulnerability to network security will always be the person at the keyboard, usually inadvertently. Hackers know this, which is the reason they choose to attack the areas where people interact with the system.

Continue reading

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

0 Comments
Continue reading

Spam: The Silent Killer of Productivity

spam_95145830

In many ways, spam is the silent killer of productivity in the business world. Often overlooked and unmeasured by businesses, its effect on their bottom lines in costs and loss of productivity adds up. This is particularly true when there is no comprehensive spam protection solution in place. Going one step further, how many times have you missed an important email, not only because it was sent to the spam folder, but because you forgot to check your spam folder as well? A well-designed and implemented spam policy would prevent this from occurring.

Continue reading

Tor: The Dark Web Network

tor_image_400

For many people, the World Wide Web is comprised of Google search, Facebook, Amazon, iTunes and a multitude of blogs, shopping and more. The majority of web users only see the surface of the web; however, the web is deeper than they know. In this way, the Internet is almost like an iceberg, with a small portion of it visible from the surface, the majority being the Dark Web -- the part of the iceberg you normally don’t see.

Continue reading

Powerful Physical Security Options

Powerful Physical Security Options

Data security isn’t the easiest thing in the world to plan for, especially if your organization doesn’t have any dedicated security professionals on-hand. While protecting your data with traditional methods, like passwords, firewalls, and antivirus, is important, what measures are you taking to make sure a thief or hacker isn’t just walking into your office and making off with your technology?

0 Comments
Continue reading