KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Even If You Don’t Hear About Small Business Breaches, They Happen

Even If You Don’t Hear About Small Business Breaches, They Happen

If you have a bank account or a credit card, chances are you’ve been made aware of a hack or a data breach. Big organizations are more frequently being breached, forcing them to run damage control for the often millions of customers affected. News coverage often bashes these big organizations, but what about smaller ones? The truth is, smaller businesses are breached just as often, with the consequences being just as severe. 

0 Comments
Continue reading

Why Passphrases Can Be Better Than Passwords

Why Passphrases Can Be Better Than Passwords

If you’re like many people, you likely find the prospect of remembering a password daunting - possibly daunting enough to cheat a bit when it comes to using a different one for each account? Admittedly, maintaining so many passwords can be challenging… so why not use a few tricks to make them easier to remember?

Continue reading

Tip of the Week: Network Security Basics

Tip of the Week: Network Security Basics

The modern threat landscape is filled with horror stories of people that have been the victim of software vulnerabilities, hackers, and situations that could have been managed differently. Today, we will go over some of the best ways to keep your business from being a victim of a data breach, data theft, or malware attack.

0 Comments
Continue reading

Getting to Know Identity and Access Management

Getting to Know Identity and Access Management

Your business will, at some point (if it doesn’t already) have a huge amount of data to manage - and not all of it will be the kind of data that all of your employees should be able to access. To minimize the risk that someone will see something that they shouldn’t, it helps to implement identity and access management solutions.

Continue reading

Ransomware Revisited

Ransomware Revisited

Ransom: a sum of money is demanded in order for the release of goods.
Software: the programs and other operating information used by a computer.

What do you get when you combine the two? Ransomware. 

0 Comments
Continue reading

Opening the Cybercriminal Toolbox

Opening the Cybercriminal Toolbox

People’s exposure to cybercrime has been increasing for some time. Today, people with very little coding experience can infiltrate systems and steal data. There is demand for data, and now there is a supply of low-cost--or even free--hacking tools available on the dark web that allows people to get closer to that data. In fact, according to a report by Deloitte entitled Black Market Ecosystem: Estimating the Cost of “Pwnership”, there is a complete economy built around these readily-available hacking tools that are relatively easy to use.

0 Comments
Continue reading

What Do You Do When Something’s Wrong with Your IT?

What Do You Do When Something’s Wrong with Your IT?

If you’ve ever dealt with a persistent issue on your workstation, you’re familiar with how frustrating it can be - especially when nothing seems to fix the problem. However, what if I was to tell you that there is a way to identify and resolve the issue? With a Remote Monitoring and Management solution, there is. 

Continue reading

Diagnosing a Man-In-the-Middle Attack

Diagnosing a Man-In-the-Middle Attack

The man in the middle has a lot of power and influence over the end result, and this is true even in the technological world. In fact, there are attacks dedicated to this vector, twisting and turning something that your organization needs into what amounts to a threat. We’ll discuss what a Man-in-the-Middle (MitM) attack is, as well as what you can do to combat these threats.

0 Comments
Continue reading

How to Prevent Data Loss Threats from Former Employees

11361191_employee_taking_data

Disasters come in all shapes and sizes, and all of them could potentially impact your business’ operations. While the term “disaster” often conjures images of fires and floods, there is another kind of disaster that isn’t considered nearly as often - the actions of a disgruntled former employee.

Continue reading

How South Dakota Avoided Any Patient Data Breaches in 2018

79958897_XS

Throughout 2018, the healthcare industry was heavily battered by data breaches, ultimately totalling 503 breaches throughout the year that affected almost 15.1 million patient records. Of all those breaches, not one of them occurred in South Dakota. What caused this? We have our suspicions, which we’ll discuss here.

Continue reading

Pressing the IT Security Issue

Pressing the IT Security Issue

It wasn’t so long ago when your business could get away with protecting your computer with a simple installation of antivirus software. There were only around 50,000 known computer viruses in the year 2000, but that number has since skyrocketed to an astounding 185 million unique variants of threats.

0 Comments
Continue reading

The Marriott Hack Exposes 500 Million People

The Marriott Hack Exposes 500 Million People

It’s nice to get away every now and then, but if you have stayed at any property under the Marriott umbrella, including St. Regis, Westin, Sheraton, or W hotel since 2014, there is a good chance that your personal information has been leaked, a spokesperson from parent company Marriott has said. They said the multinational hotel corporation will begin emailing users impacted by the leak in the coming days.

0 Comments
Continue reading

Tip of the Week: Ward Off Holiday Scammers

Tip of the Week: Ward Off Holiday Scammers

It’s the most wonderful time of the year… for scammers, that is. These kinds of criminals love to take advantage of the gift-giving season. With the right tools for the job, hackers can have a field day stealing sensitive information, like credit card numbers, due to the sheer amount of stuff being purchased by consumers. It’s up to you to stay vigilant and make sure you’re not being scammed, but we have a couple of tricks you can use to stay as safe as possible.

0 Comments
Continue reading

Why Protecting Your Google Account Should Be a Priority

Why Protecting Your Google Account Should Be a Priority

Your Google account is one of your most important assets, regardless of whether you’re a business professional or a casual user. The tricky part of using Google, however, is to make sure that you’re using this asset safely. By securing your account and valuing your Google account credentials, you can make sure your account stays safe.

0 Comments
Continue reading

Tip of the Week: Improvement Needed to Avoid Cybercrime

Tip of the Week: Improvement Needed to Avoid Cybercrime

Did you know that almost 90 percent of small business owners feel they are completely safe from attack? It’s unfortunate, but the truth of the matter is that half of these businesses will eventually be proven wrong--they too can suffer from a cyberattack. Are you going to risk becoming one of them? You should know now that there is no reason to.

0 Comments
Continue reading

A Look at this Year’s Worst Cybercrimes

A Look at this Year’s Worst Cybercrimes

It’s fair to say that today's organizations are faced with more online threats than ever before. To properly manage the information systems that they depend on for productivity, redundancy, and operational management, they need to ensure that they are doing what they need to do to mitigate problems stemming from the continuous flow of threats.

0 Comments
Continue reading

Hackers Continuously Target Major Sporting Events

Hackers Continuously Target Major Sporting Events

Sports are a very popular thing around the world, which means that these athletic contests gather many fans to them. In turn, this means that these events are chock full of potential targets for a hacking attack. Today, we’ll examine the assortment of hacks that have taken place around sporting events.

0 Comments
Continue reading

Have You Implemented These Security Best Practices?

Have You Implemented These Security Best Practices?

If your business hasn’t put protections in place for your technology infrastructure, that needs to be moved to the top of your to-do list, yesterday. It isn’t as though the increasing number of threats are going to avoid you until your network is prepared to deflect them. Therefore, you need to take action now. To help, we’ll review some of the most important security considerations to make for your organization.

0 Comments
Continue reading

How to Identify If an Email is a Security Risk

How to Identify If an Email is a Security Risk

There’s one major reason why email is the preferred method of spreading threats like ransomware and other types of malicious software. The sheer number of messages that can be sent through email on its own increases the odds that a user will click on the wrong link or download the wrong attachment. How can you know the legitimacy of any message you receive in your email inbox?

0 Comments
Continue reading

Take These Steps to Make IT Security Top of Mind

Take These Steps to Make IT Security Top of Mind

Here’s the thing about IT security: it requires a little more than a decent firewall and a reasonably-strong password. We talk a lot about how to ensure that your business’ network stays a top priority, and the best way to do that is to implement what we call a Unified Threat Management (UTM) solution. An enterprise security system like a UTM can provide a considerable improvement for the way you protect your organization, but even something as simple as a little bit of user error could bypass these protocols.

0 Comments
Continue reading