KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Start Off 2020 by Auditing Your Online Accounts and Passwords

Start Off 2020 by Auditing Your Online Accounts and Passwords

Let’s take a look at a real-world scenario that I ran into a few weeks ago with a family friend. For the sake of this story, let’s call him Bob. Bob lost access to a pretty important online account.

0 Comments
Continue reading

Can Adding Spaces Increase Your Passphrase Simplicity?

Can Adding Spaces Increase Your Passphrase Simplicity?

Every year we see a rash of data breaches, the majority caused by compromised credentials. In response, KT Connections has been providing tips and best practices to help keep your users and your business safe. As the year winds down, let’s take one more look at credentials and learn another tactic to create secure and simple passphrases.

Continue reading

Security Has to Be a Priority in 2020

Security Has to Be a Priority in 2020

Cybercriminals aren’t exactly holding back when it comes to attacking businesses, which means that businesses can’t rest on their haunches as the new year rolls in. Let’s take a few moments to look toward the near future, and the issues that cybersecurity professionals are warning us about.

0 Comments
Continue reading

How to Shop Securely This Holiday Season

How to Shop Securely This Holiday Season

While the major holiday shopping days have passed us by, many people are still looking for that perfect gift often using the Internet to find it. While online shopping is certainly more convenient, it can also be dangerous. To help keep you safe this season and beyond, we’re reviewing a few practices to protect your identity while shopping online.

0 Comments
Continue reading

A Recent Data Theft Shows Us What to Watch Out For

A Recent Data Theft Shows Us What to Watch Out For

Trend Micro, the developer of the popular antivirus program, has attracted some unwanted attention after a former employee managed to steal customer data and sell it to scammers. These scammers then use this data to call Trend Micro customers. If you use Trend Micro’s antivirus solutions, you’re going to want to pay close attention to any calls you get.

0 Comments
Continue reading

Chrome’s Password Manager Makes Password Security a Breeze

813645_google_password

Poor password practices are a critical issue impacting consumers and businesses alike. Weak and re-used passwords are the low-hanging fruit many hackers use to access online accounts and sensitive materials. Google’s updated password manager seeks to provide a remedy to poor password management by providing a number of management tools in a familiar interface.

Continue reading

Start Using Two-Factor Authentication Everywhere, Today

Start Using Two-Factor Authentication Everywhere, Today

It can be easy to slack off when it comes to good password practices. Many users still use the same password across multiple sites and often don’t use secure passwords. Password managers make this a lot easier, but it’s really two-factor authentication (2FA) that can make all the difference. Strong, unique passwords are still important (not all accounts offer two-factor authentication) but let’s talk about why you should always enable two-factor or multifactor on all of your accounts when possible.

0 Comments
Continue reading

Why You Should Upgrade to Windows 10

ktconnections_windows_10

Not too long ago, we shared a blog that discussed how Windows 7 isn’t going to be a viable option very much longer. We wanted to be sure that there was no misconceptions remaining as to how important it is to update your business’ systems to Windows 10. That’s why we’re taking the time to go a little further into why an update is the only real path for your business.

0 Comments
Continue reading

4 Key Steps to Better Cybersecurity

4 Key Steps to Better Cybersecurity

In many ways, explaining why sufficient cybersecurity is important for your business has become redundant - especially when it is much more important to understand how this cybersecurity needs to protect you. The threats to data and privacy are known, but no less potent. In order to counter them, you need to make sure you have what you need to protect your business - starting with a few key considerations.

0 Comments
Continue reading

This Year’s Tornadoes Prove that Disasters Aren’t Seasonal, So Your Preparations Can’t Be Either

This Year’s Tornadoes Prove that Disasters Aren’t Seasonal, So Your Preparations Can’t Be Either

South Dakota sees a significant number of tornadoes - our state has seen as many as 30 storms over a season. The majority of these storms generally strike during June, but sometimes can appear later on, like this year’s sudden tornadoes that struck on September 8th. Storms like these can serve as a reminder of how crucial it is to be prepared for potential disasters year-round… not just when they are most likely to strike.

Continue reading

Cybersecurity is a Shortcoming for the DHS

Cybersecurity is a Shortcoming for the DHS

Every IT administrator today needs to be concerned about cybersecurity, as does every private business when it comes to its network. However, the same can’t really be said for the computing resources of the government and other public entities… simply due to the lack of talent available.

0 Comments
Continue reading

Will You Still be in Business Six Months From Now?

hacker_181606056-400

Data breaches compromise thousands of people’s personal information, while ransomware attacks cripple businesses and organizations on a daily basis. Despite this, many small-to-medium-sized businesses still feel that due to their smaller size, they aren’t targets. The truth is, many SMBs handle the type of sensitive data which is attractive to cybercriminals. To make matters worse, many SMBs haven’t invested in the security infrastructure needed to protect themselves… something hackers count on.

0 Comments
Continue reading

Tip of the Week: Mobile Data Management

Tip of the Week: Mobile Data Management

There are hundreds of things that a business owner has to do, so managing the security of the data coming in and going out from mobile devices might not make the hierarchy of considerations that need to be immediately addressed. Today, we will take a look at why paying attention to the mobile end of your business is so important, how Mobile Information Management (MIM) helps with that, and how MIM fits in with the rest of your mobile strategy. 

0 Comments
Continue reading

How Google is Trying to Make Passwords Easier and Better

password_easier

Common opinion more or less states that passwords aren’t so much “necessary,” as they are a “necessary evil.” The best practices that are recommended to maintain the efficacy of passwords today can certainly feel excessive - which tempts many users into ignoring these practices, to the detriment of their security. Fortunately, many large companies - like Google - are trying to make passwords easier to manage.

0 Comments
Continue reading

Stop Trusting Hackers With Your Smartphone!

Stop Trusting Hackers With Your Smartphone!

Do you have a smartphone? Do you feel as though your data is secure on it? Users are relying on smartphones more and more to accomplish daily tasks. This means there is a massive amount of data traffic each day transferred to and from your device, and potentially transferred into the hands of a cybercriminal. 

0 Comments
Continue reading

Taking a Look at the History of Cybersecurity

Taking a Look at the History of Cybersecurity

Let’s face it, cybersecurity now has to be a major point of emphasis for the modern business. With the immense amount of threats out there, cybersecurity it has grown into a multi-billion dollar a year industry, with no limit in sight. Just a few decades ago, there was no fileless malware, no ransomware, no botnet army lying in wait to DDoS corporate data centers into oblivion. Today, we take a look at the brief (albeit rapidly growing) history of cybersecurity. 

0 Comments
Continue reading

No Free Wi-Fi For You!

No Free Wi-Fi For You!

As the quantity of Wi-Fi compatible devices increases, the demand for wirelessly-transmitted networks follow. While wired connections might seem inferior, Wi-Fi’s accessibility brings a new challenge -- security.

0 Comments
Continue reading

Dentists Need IT Security, Too!

Dentists Need IT Security, Too!

When discussing the IT needs of medical professionals - especially in terms of the technologies they need to remain compliant to regulations like HIPAA - there seems to be an unfortunate tendency to overlook one very important medical field: dentistry. Yet, once dentistry is really considered, it becomes clear how dangerous this oversight can be.

0 Comments
Continue reading

The IIoT is the Future of Manufacturing

The IIoT is the Future of Manufacturing

According to the World Economic Forum, the Industrial Internet of Things (IIoT) will transform many industries such as manufacturing, oil and gas, healthcare, aerospace and more. These industries combined account for nearly two-thirds of the world economy, making the IIoT a force to be reckoned with.

Continue reading

Hack of Capital One Exposes Information on 100,000 Customers

Hack of Capital One Exposes Information on 100,000 Customers

Capital One is one of the largest credit card issuers in the world. On July 29th 2019, Capital One made an announcement, confirming it is the victim of one of the largest data breaches in financial sector history, as a former software engineer for Amazon has been indicted on charges related to the hacking.

0 Comments
Continue reading