KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cybersecurity Awareness Is a Featured Theme in October

Cybersecurity Awareness Is a Featured Theme in October

Every October, the Department of Homeland Security (DHS), United States Computer Emergency Readiness Team (CERT), and the Federal Bureau of Investigation (FBI) join forces to drive cyber security awareness. Cybercrime is a constant threat to individuals and businesses, alike. In fact, the risk is so significant that the US government decided to step up and offer information and resources stressing the importance of cyber security and raise awareness on the best practices to utilize when protect your nonpublic information.

Here’s a brief overview of the National Cyber Security Awareness Month (NCSAM) themes for 2017, followed by a video made by the DHS that shows the tremendous threat that we are faced with every day and what is being done to keep us safe.

  • Week 1: October 2-6 – Theme: Simple Steps to Online Safety
    • This week highlights the things needed to keep consumers safe and ways to protect themselves. While it’s targeted more at individuals than businesses, they offer great resources for best practices that everyone should follow, both professionally and personally.
  • Week 2: October 9-13 – Theme: Cybersecurity in the Workplace is Everyone’s Business
    • Next, DHS shows organizations how they can protect against cybercrimes that target them. There will be information on creating a cyber security culture among you and your employees.
  • Week 3: October 16-20 – Theme: Today’s Predictions for Tomorrow’s Internet
    • The future has arrived and you need to be prepared. This week looks at emerging technology and how you can protect your nonpublic information moving forward.
  • Week 4: October 23-27 – Theme: The Internet Wants YOU: Consider a Career in Cybersecurity
    • The demand for those with IT security experience has far surpassed the number of qualified candidates.
  • Week 5: October 30-31 – Theme: Protecting Critical Infrastructure from Cyber Threats
    • The final week is a bit more on the technical side, highlighting the tie between cybersecurity and our nation’s critical infrastructure. As a business owner, it will affect you at every level.

Months to Milliseconds

You can start building a more cyber-secure business today by implementing these tips recommended by the FBI to combat threats like ransomware, and other malware attacks.

  • Raise Awareness: Make sure employees are aware of ransomware and of their critical roles in protecting the organization’s network and data.
  • Updates and Patches: Patch operating system, software, and firmware on digital devices (which may be made easier through a centralized patch management system).
  • Auto Update Security Software: Ensure antivirus and anti-malware solutions are set to automatically update and conduct regular scans.
  • Limit Super Users: Manage the use of privileged accounts—no users should be assigned administrative access unless absolutely needed, and only use administrator accounts when necessary.
  • Access Control: Configure access controls, including file, directory, and network share permissions appropriately. If users only need read-specific information, they don’t need write-access to those files or directories.
  • Filters and Application Control: Implement software restriction policies or other controls to prevent programs from executing from common ransomware locations (e.g., temporary folders supporting popular Internet browsers, compression/decompression programs).
  • Data Backup & Disaster Recovery Plan: Backup data regularly and verify the integrity of those backups to ensure redundancy.
  • Multiple Storages: Make sure they aren’t connected to the computers and networks they are backing up.

As a IT service provider, we are always looking to stress the importance of IT security - not just to our clients, but to the community as a whole. Please take a few seconds to share this blog and help us make everyone a bit more #CyberAware. Would you like to step up your cyber security efforts? Call the IT professionals at KT Connections at 605-341-3873. 



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 21 October 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Email Business Computing Cloud Internet hackers malware Network Security Google software Efficiency Business Data Ransomware Backup User Tips Microsoft Managed IT Services Smartphone Small Business Windows Hosted Solutions Mobile Device Management Productivity IT Support Network Computer Android IT Support Facebook Mobile Devices Hardware Windows 10 Cloud Computing Data Management Operating System Money Business Continuity security cameras Disaster Recovery Alert Phishing BDR data breach End of Support IT Services Bandwidth Apple communications Antivirus Microsoft Office VoIP Outlook Unified Communications Social Media Internet of Things Business Management Gmail Passwords Data storage IT Management Outsourced IT Upgrade Encryption SaaS Saving Money Information Technology Drones Customer Service Artificial Intelligence IBM Networking History Search Server Google Maps Big Data The Internet of Things Apps vulnerability cybersecurity Innovation Hard Drive Start Menu BYOD security solutions Managed IT Services Law Enforcement Nextiva Robot Scam Windows 10 Smartphones Firewall Lunch and Learn WiFi Events Data Recovery YouTube Productivity Word Best Practice Event Marketing Automation Local Buzz Data Backup South Dakota Spam Communication Politics Google Wallet Legal App IoT Save Money IT for Oil Companies Maintenance Document Management Microsoft Bookings Telephony Hosted Solution IT Assessment Laptop Tablets Remote Computing Law IT Settings Remote Monitoring macbook Managed Service Provider Cryptocurrency Cache Displays botnet Hack Risk Management Fortinet password manager LastPass booking process VoIP IT Strategy Workplace Tips Tablet Lawyers Emergency Cleaning Fast food Proactive IT DDoS attacks Kaseya Business Security Hacking user confidence Event Bluetooth Quick Tips Administration Office Tips SOX Solid State Drive IT Solutions DDoS Business Technology Communications Music Kaseya Connect security precautions Printing Information Security Mixer Time Management Safety Sarbanes-Oxley Act Attorneys Social Computer Care Disaster Government Phone System Writing Gadgets Conference LastPass Email Security Vendors Unified Threat Management Education Chamber of Commerce Experience End User Testing Running Cable Managed Services communication device Uninterrupted Power Supply Virtual Reality Hardware as a Service Black Market How To News Community Involvement Sports Cabling face business owner Data Protection Knowledge Wireless Technology HaaS Retail Download Business Comunications LiFi Memory communication solutions Press Release Update surveillance cameras VPN Corporate Profile Tech Terms Society vulnerabilities Vendor Mangement Streaming Media Business Growth Content Filtering Network Congestion Programming Virtualization healthcare Touchscreen Visible Light Communication identity theft Rebrand Digital Deep Learning Worker Trend Micro Cloud Backup AtomBombing Access Control Windows 8 Dell ’s Sonicwall Global Management System Business Mangement Windows XP Microsoft Office 365 Managed IT Penetration Testing Rapid City File Sharing tool Websites Website media experience Patch Management Applications Access Compliance Office Web Servers Google Play Store Virtual Machines Data Security Tech Support Password Local Technology appointment Microsoft Office 365 features Phishing Scams Google Docs IoT Devices Workers Software as a Service Advertising information Physical Security Redundancy Tips and Tricks Spyware Browser Vendor Management Internet 101 Risk Creep Audit Printer Sales Tax Office 365 Google Drive Virtual Desktop Collaboration IT Consultation Webcam Samsung Virus Flash Project Management enterprise productivity software Internet Connected Devices Analytics Monitors botnet attack camera In Internet of Things Books IT service Documents Web Server Motion Sickness Budget Text Messaging Meetings Reading Mobility PDF Ordinary Computers Machine Learning Hiring/Firing Computing Emails Bring Your Own Device Phone Systen Administrator Relocation Tracking quantum computers Hacker Language Supercomputer base infrastructure CrashOverride Hacks Miscellaneous Holiday IT Consultant Automobile security solution Downloads network security professionals Unified Threat Management Notifications Social Engineering Training Business Metrics Users end-of-support date Telephone Systems Playbook holiday season Rental Service Health Employer Employee Relationship Chromebook UTM Flexibility Banking Digital Payment breach methods holidays Cortana 3D Printing Threat management Reliable Computing Public Cloud Taxes Cost Management scammers Twitter Distributed Denial of Service Scalability Paperless Office Work/Life Balance scams Marketing G Suite Computer Malfunction Travel Processors Employer-Employee Relationship Messenger Wi-Fi collaboration capabilities Sync Private Cloud Microchip CCTV