KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

6 Reasons Your Team Needs to Report Cybersecurity Concerns

6 Reasons Your Team Needs to Report Cybersecurity Concerns

Have you given your team permission to contact your IT department if they have cybersecurity concerns, or are they left to their own devices? Unfortunately, your team is your weakest link when it comes to cybersecurity, and unless you give them the training and confidence to ask questions, they always will be.  

  0 Comments
0 Comments
Continue reading

Harden Your Security with a 2FA Authentication App

Harden Your Security with a 2FA Authentication App

Weak passwords are a huge problem, one that almost everyone is guilty of. Even if you think of yourself as being a diligent, security-minded person, you probably have at least one or two passwords that are common words, followed by a digit or two, followed by an exclamation point.

I’d be willing to bet that the digits in your password represent either your birthday, your anniversary, or your favorite football player’s jersey. With a little time, anyone could gain access to your account. That’s where two-factor authentication comes in.

  0 Comments
0 Comments
Continue reading

A Deeper Dive Into Multi-Factor Authentication

2 factor authentication

Recently we discussed how to successfully fight off phishing attacks by using a security key as part of your security plan. We thought we would take a moment and take a deeper dive into the differences between the three factors of authentication; something you know, something you have and something you are. These factors can be used in any combination and depending on your organization’s security requirements can be either 1FA, 2FA or MFA (1 element, 2 factor or multifactor authentication). The more steps you require to grant user access, the more secure your systems and data will be.

  0 Comments
Tags:
0 Comments
Continue reading

Reduce Cyberthreats with Security Keys

Security Keys

As we have often said, the greatest vulnerability in securing your system will be due to human error. Not due to maliciousness or incompetence, just mistakes that we all have made. Phishing is one of the most common methods of compromising your security, its goal to capture sensitive information. Since phishing often disguises itself as a friendly entity, it can be extremely difficult to recognize until it’s too late.

  0 Comments
0 Comments
Continue reading