KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

No Free Wi-Fi For You!

No Free Wi-Fi For You!

As the quantity of Wi-Fi compatible devices increases, the demand for wirelessly-transmitted networks follow. While wired connections might seem inferior, Wi-Fi’s accessibility brings a new challenge -- security.

0 Comments
Continue reading

Dentists Need IT Security, Too!

Dentists Need IT Security, Too!

When discussing the IT needs of medical professionals - especially in terms of the technologies they need to remain compliant to regulations like HIPAA - there seems to be an unfortunate tendency to overlook one very important medical field: dentistry. Yet, once dentistry is really considered, it becomes clear how dangerous this oversight can be.

0 Comments
Continue reading

The IIoT is the Future of Manufacturing

The IIoT is the Future of Manufacturing

According to the World Economic Forum, the Industrial Internet of Things (IIoT) will transform many industries such as manufacturing, oil and gas, healthcare, aerospace and more. These industries combined account for nearly two-thirds of the world economy, making the IIoT a force to be reckoned with.

Continue reading

Hack of Capital One Exposes Information on 100,000 Customers

Hack of Capital One Exposes Information on 100,000 Customers

Capital One is one of the largest credit card issuers in the world. On July 29th 2019, Capital One made an announcement, confirming it is the victim of one of the largest data breaches in financial sector history, as a former software engineer for Amazon has been indicted on charges related to the hacking.

0 Comments
Continue reading

Is It Fair to Be Fired for Falling for a Phishing… Test?

Is It Fair to Be Fired for Falling for a Phishing… Test?

Let’s run through a quick scenario: your company’s computing infrastructure is infected with ransomware. Fortunately, you have an offsite backup, so you are able to restore your systems without too much trouble, other than the time you’ve lost. As you investigate the root cause, you discover that one of your employees allowed the ransomware in by falling for a phishing email. So, do you fire them?

0 Comments
Continue reading

Your Guide to the Malware You Could Encounter

Your Guide to the Malware You Could Encounter

You’d be hard-pressed to find someone nowadays who hasn’t heard of malware, although they may have difficulty identifying different threats as they encounter them. Does this sound like the people that you work with? We’re here with a simple solution to assist you and your team in spotting the different kinds of threats - a malware guide to distribute among your staff so they can better spot the usual suspects.

0 Comments
Continue reading

Two-Factor Authentication Works to Remove Security Risks

Two-Factor Authentication Works to Remove Security Risks

Imagine a scenario where your password has been stolen by a hacker. Now your accounts are completely at the mercy of them. What do you do? Obviously you want to change the password, but are you going to learn from this mistake or let it happen again in the future? Thankfully, two-factor authentication offers a solution to this dilemma, and it’s one that you might not have considered in the past.

0 Comments
Continue reading

Use Any Internet Connection with a VPN

Use Any Internet Connection with a VPN

How often does your business have employees traveling to conferences or working remotely due to circumstances or physical location? With technology improving at a rapid pace, these opportunities are more possible now than they ever were in the past, and depending on the solution implemented, they are far more efficient, too. Of course, one thing that will never change is the need to keep company data secure, no matter what type of Internet connection is being utilized.

Tags:
0 Comments
Continue reading

Social Media Scams and Everything You Should Know

Social Media Scams and Everything You Should Know

Social media has overtaken both the professional and personal aspects of online communication and connection, and while it might provide a considerable boon for both, it increases the odds of being contacted by scams and other malicious attempts. The best way to make sure you don’t fall prey to a scam is to remain vigilant. Today we’ll discuss the various scams that are created for use with social media.

0 Comments
Continue reading

Why You Should Upgrade to Windows 10

ktconnections_windows_10

Not too long ago, we shared a blog that discussed how Windows 7 isn’t going to be a viable option very much longer. We wanted to be sure that there was no misconceptions remaining as to how important it is to update your business’ systems to Windows 10. That’s why we’re taking the time to go a little further into why an update is the only real path for your business.

0 Comments
Continue reading

Phishing Attacks Are Besting Two-Factor Authentication--Now What?

Phishing Attacks Are Besting Two-Factor Authentication--Now What?

What has proven to be one of the more effective ways of preventing phishing attacks may be under fire from more advanced threats designed specifically to penetrate the defenses of two-factor authentication. This means that users need to be more cognizant of avoiding these attacks, but how can you help them make educated decisions about this? Let’s start by discussing the phishing attacks that can beat 2FA.

0 Comments
Continue reading

Taking a Trip Through Data Privacy, Part II

Taking a Trip Through Data Privacy, Part II

Earlier this week, you may have seen the first part of this article, where we discussed how robocallers collect your information. Today, we continue our discussion on data privacy and what you can do to keep your organization and personal data safe.

0 Comments
Continue reading

Taking a Trip Through Data Privacy, Part I

Taking a Trip Through Data Privacy, Part I

Protecting your business’ data is no simple task. To make it as secure as possible, you’ll have to understand how personal data flows through online channels. We’re digging pretty deep with this one, so get ready for an informative and, if nothing else, interesting read. This topic is especially important in an age where Facebook and Google exist, but there are countless other threats to data privacy out there that we all experience on a regular basis--business or not.

0 Comments
Continue reading

5 Reasons IT is Stressed About Security

5 Reasons IT is Stressed About Security

If you have an internal IT administrator, they might be pretty stressed about your business’ security. Why? Simple - there’s a good chance that they feel trapped in a few common situations. Let’s review some stresses that influence IT employees, negatively affecting your security.

0 Comments
Continue reading

Here are 5 Trends Happening with the Internet of Things

Here are 5 Trends Happening with the Internet of Things

The Internet of Things is currently one of the most promising, yet risk-laden, information technology trends that we have today. The combination of the push for more connected devices with the lack of the security they need to remain protected, presents a considerable issue for a business’ network security. Here, we’ll examine some of the IoT’s latest trends, and how they could impact your business.

0 Comments
Continue reading

Pressing the IT Security Issue

Pressing the IT Security Issue

It wasn’t so long ago when your business could get away with protecting your computer with a simple installation of antivirus software. There were only around 50,000 known computer viruses in the year 2000, but that number has since skyrocketed to an astounding 185 million unique variants of threats.

0 Comments
Continue reading

Tor: The Dark Web Network

tor_image_400

For many people, the World Wide Web is comprised of Google search, Facebook, Amazon, iTunes and a multitude of blogs, shopping and more. The majority of web users only see the surface of the web; however, the web is deeper than they know. In this way, the Internet is almost like an iceberg, with a small portion of it visible from the surface, the majority being the Dark Web -- the part of the iceberg you normally don’t see.

Continue reading

How to Turn a Security Risk into a Security Solution

How to Turn a Security Risk into a Security Solution

Let’s face it; the office isn’t the most engaging place at all times. Repetitive tasks can make attention to detail difficult to maintain. While this might throw a wrench into operational plans, it’s not the end of the world. A major threat like ransomware, on the other hand, could be a business-ender. When a lack of engagement meets security issues, you create a whole other monster that could strike your business when you least expect it.

0 Comments
Continue reading

Powerful Physical Security Options

Powerful Physical Security Options

Data security isn’t the easiest thing in the world to plan for, especially if your organization doesn’t have any dedicated security professionals on-hand. While protecting your data with traditional methods, like passwords, firewalls, and antivirus, is important, what measures are you taking to make sure a thief or hacker isn’t just walking into your office and making off with your technology?

0 Comments
Continue reading

Our Help Desk is Black Hills Gold

Our Help Desk is Black Hills Gold

As a managed IT services provider, we’ve seen and heard it all. We’ve helped countless users get their technology back working properly. We’ve also been dumbfounded by issues out of our control due to vendor mishaps. That’s not to say that there aren’t things that you can do to ensure that you and your staff have the resources available to fix frustrating technology issues quickly. One of those things is outsourcing your IT with a monthly fixed -rate help desk solution.

0 Comments
Continue reading