Kansas City Cyber

Contact information, map and directions, contact form, opening hours, services, ratings, photos, videos and announcements from Kansas City Cyber, Information Technology Company, 1100 Main Street, Kansas City, MO.

04/02/2024

Welcome to ! We've been away helping protect the cyber world for a bit but if you've paid attention at all to the cyberattack landscape lately, you are assured to have read about the latest massive attack on United Health Group (UHG). UHG, the world's largest healthcare company by revenue, learned of a breach on 2/21/24 within its Optum division, specifically the Change Healthcare system. Optum’s Change Healthcare has a great presence within US healthcare, as it is used by hospitals, clinics and pharmacies nationwide. Change Healthcare is so intertwined that the AHA warned at the time that healthcare organizations that use Optum should disconnect their systems immediately to protect their private data.

The BlackCat/APLHV ransomware gang has claimed responsibility for the attack; alleging that they stole 6TB of data from the network. Though they have not yet been officially credited for the attack, BlackCat is known to focus on the healthcare sector. The FBI says the gang had over 1000 victims and was able to collect over $300 million in ransomware payments in 2023 alone.

On March 15, UHG announced that they were able to restore the Change Healthcare's electronic payments platform and have also restored 99% of the pharmacy network services. UHG also advanced over $2 billion to assist care providers that were disrupted by the cyberattack. In an AHA survey, 94% of hospitals experienced financial disruptions from the attack.

UHG has not disclosed what data was compromised by the attack or whether or not a ransom was paid to restore systems, however, the Biden administration announced that it has launched an investigation into the company due to the "unprecedented magnitude of the cyberattack".

02/06/2024

Happy Today we talk crypto-agility. In basic terms, this is the ability to be able to switch your encryption methods quickly.

Why would you want to do that? All combination locks can be defeated if someone has enough time to do it. There is a finite number of combinations that are in place. They rely on the fact that an attacker doesn't have enough time to solve the puzzle before they are discovered, the combo is changed or their mortal life ends before they can solve it.

56-bit DES encryption was the standard when it was released in 1977. At the time, it would take many lifetimes to defeat the algorithm using a brute force attack. However, with increased computing power, it can now be defeated within hours. Therefore, making it unusable for security.

This issue will continue to raise problems with any encryption method developed as Quantum computing continues to solve complex problems at a lightning rate. That is why it is important for developers to be prepared to incorporate cyber-agility into their applications so they can quickly change their security to new innovations as past algorithms are defeated.

01/24/2024

In what is being termed security experts are saying that a supermassive leak containing mostly of data from past breaches has been compiled to build 26 billion records of exposed data.

This image, courtesy of our friends at cybernews.com, shows the companies that have been most exposed by MOAB. However, this only shows the companies that have 100M+ records in the compilation but there are thousands of more companies that are unlucky enough to find themselves on the list.

To find out if you may be affected, copy this URL in your browser and search your email address/phone. https://cybernews.com/personal-data-leak-check/.

01/23/2024

Welcome to !

It is . The goal is to spread awareness about online privacy. Data privacy should be a priority both for individuals and organizations. People should understand that they have the power to manage their data and organizations should understand why it is important that they respect their users’ data. Since data privacy and data security go hand in hand, here are a few tips on how to keep your data safe:

Create long (at least 10 characters), unique passwords for each of your accounts and devices. The easiest way to do this is by using a password manager to store each password. We recommend using LastPass.

Turn on multifactor authentication (MFA) wherever it is permitted. This is how you can keep your data safe, even if your password is compromised.

Turn on automatic device, software and browser updates or make sure you are installing these updates as soon as they are available.

Invest in antivirus software. Installing a reliable antivirus tool on your computer can further strengthen your protection. Many simple but efficient programs are available for purchase at affordable prices, and they often last between one and two years. We recommend Sophos Home Premium: https://buy.home.sophos.com/1461/purl-homepremium

Feel free to reach out to us if you have any security needs or questions!

12/26/2023

Happy ! We wanted to thank everyone who has supported us over the past year, we really appreciate it!

and we look forward to having a prosperous 2024 with all of our clients and partners. Let's keep making the cyberworld a safer environment. #2024

12/19/2023

Happy ! Here at Kansas City Cyber, we wanted to wish everyone a Merry Christmas and Happy Holidays this beautiful time of the year.

Remember to stay alert as you enjoy your Egg Nog; cyber attackers have annual quotas they are trying to achieve too!

Photos from Kansas City Cyber's post 12/12/2023

Welcome to ! I bet you think the older generation is the more likely age group to fall victim to a cyber scam. However, 44% of millennials have fallen victim to cyber security attacks by sharing passwords of something harmless such as Netflix and then using the same password to access sensitive material such as their bank account.

Be sure not to share or recycle passwords. Also, always turn on MFA whenever possible. As your friend today may be your enemy tomorrow.

12/05/2023

Welcome to ! Today we explore that little s that secures your website when you go from http to https. The S stands for secure and it means that the site you are visiting has been protected with an SSL certificate. SSL is a protocol that encrypts the data that is exchanged between a site and a visitor therefore preventing eavesdroppers from 'listening' to your conversation.

When sites aren't secure, a hacker can utilize the Man-in-the-Middle approach by placing themselves between you and the site and easily read the data being exchange. They can even hijack the conversation and ask you for data that the site really isn't requiring. By rule of thumb, all sites should be secured with an SSL but especially sites that request protected info like credit card information.

11/28/2023

Happy We hope everyone had a fantastic Thanksgiving holiday!

Often people ask how can I extend the life of my laptop battery? There are many tricks to do so....turn on your battery saver, keep your laptop cool, reduce the brightness of your screen, and don't just keep your laptop plugged in all the time to name a few.

Basically the more power you drain from your battery, the quicker it is to die.

11/07/2023

Happy ! Are you one of those people that love to save things to your C drive or your PC’s desktop? You’re not uncommon if you are but you should be aware that means your data quite possibly has no redundant protection and can be ‘hacked’ in about 10 minutes if someone has physical access to your computer.

Hard drives die so if you aren’t backing your PC up regularly, that data is at risk. We recommend that you store your data in a cloud solution like Microsoft OneDrive or Google Drive.

As far as your data being ‘hacked’, you may say “Who can get physical access to my PC?” It’s easy to imagine the possibility with a laptop…someone lifts it straight from your car but even a stationary desktop could be at risk by a fellow co-worker or an outside vendor walking through. To prevent easy access to a local drive, Microsoft Windows has a built-in encryption feature called BitLocker that can restrict even the strongest of intruders.

If you feel your data is at risk, please contact us at [email protected].

10/31/2023

Happy ! In lieu of a cyber tip this Tuesday, we want to wish everyone a Happy Halloween! We hope you have a fantastic day and your bag is filled with amazing treats!!

10/17/2023

Welcome to ! Have you heard of IoT? IoT is known as the Internet of Things and is any physical device that connects to the internet.

There are some crazy things out there that connect to your wireless and push collected data back to its home base. Some of the weirdest we've heard of is the Smart Salt Shaker, Smart Toaster and even the Kohler Numi 2.0 Smart Toilet that runs about $8500!!

Anytime you allow a smart device on your network, you are rolling the dice that you are good with it collecting data about you and sending it off to marketers. More importantly you are hoping that the maker of your Smart Flip-Flops also have the ability to write complex code to ensure you are not being hacked by intruders.

A wireless network is only as strong as its weakest device and as soon as you connect your Smart Mug you could be opening the door for intruders to monitor, scan and steal information from your network.

Be sure to only connect devices to your network that you can trust and to ensure random employees don't connect vulnerable devices at your business, only give the wireless password to your trained executive team, as well as conduct periodic port scans to monitor traffic.

10/10/2023

Welcome to ! We welcome back Riley to share with us how easy it is to social hack a help desk.

Your IT team is the most important people to receive extensive cyber training as they are the ones with the keys to the castle.

Contact Kansas City Cyber to learn how we can train your team company-wide.

10/03/2023

Welcome to ! When it comes to cybersecurity, many small business take the approach of "I'm too small, no one would target me" or "Cybersecurity is too expensive, I can't afford it".

The reality is 46% of cyber breaches impact businesses with < 1000 employees. 37% are on businesses with < 100 employees.

For a small business, a budget of a few hundred dollars a month can greatly reduce the risk of a cyberattack and make your neighbor with no plan a much easier target for hackers to focus on.

Contact us today so we can get started on protecting your business!

09/26/2023

Welcome to ! Not only are we moving into the scary season of ghosts and goblins but its also that time of year for our healthcare friends to finish their Security and Risk Assessment (SRA) by the end of the year.

are required to be completed on an annual basis for HIPAA compliance. Did you know its actually worse to answer your SRA incorrectly than not even doing one at all. And its even worse than that to discover a vulnerability during an SRA and not take action to eliminate the risk.

When conducting an SRA, we recommend using a 3rd party company that specializes in compliance and cybersecurity over your IT service company or internal IT department. It is beneficial to have a new set of eyes look for flaws over the individuals that set it up. There is a reason that students don't grade their own tests.

We have limited capacity for how many assessments we can complete before the end of the year. Slots are filling fast, please reach out to [email protected] to schedule a time to review your SRA needs.

09/19/2023

Welcome to ! If you're like The Hangover's Stu and joined the Caesar's or MGM's reward program, you need to be on alert for your personal private information potentially being exposed.

Caesar's confirmed that driver's license and social security numbers of rewards members were copied during their recent cyberattack. Though they paid an undisclosed amount (rumors say $15M) to not have the data leaked, it is more of a 'pinky promise' that the threat actors won't expose the data.

At this point, MGM hasn't confirmed what was breached and stolen but cyber attackers are claiming they have the same data and are threatening to leak it if they aren't soon paid.

To help against identity threat, we recommend subscribing to a service like Symantec LifeLock to monitor your private information. Caesar's is currently offering a free identity service to those members that may have been exposed (call 888-652-1580 to signup) and it is assumed that MGM isn't far behind.

09/13/2023

MGM was hit by a cyberattack Monday that pushed the company to shut down network systems. This lead to digital rooms keys not to work, slot machines to be out of order, and ATMs inoperable.

Websites for the MGM resorts were also taken offline and continue to be disrupted this morning.

As the attack is being investigated, ALPHV ransomware group is taking credit claiming they simply used a social engineering attack to gain access.

ALPHV ransomware group claims they went to LinkedIn, found an employee, called the help desk and "defeated a $33,900,000,00 company by a 10-minute conversation"

The best defense against social engineering attacks is education. Having an effective training program in place to train your team how to recognize social hacking can minimize the risk of a threat actor gaining access.

Please contact Kansas City Cyber to learn how we can train your team on security awareness.

09/05/2023

Welcome to Today Travis Lass uses the risk of throwing an interception to better understand cyber risk assessments and how to deal with risk.

08/22/2023

Welcome to ! If you are looking to enter the exciting world of cybersecurity or advance your career with additional training, ISC2 (isc2.org) is a great place to work towards your certifications, including the industry standard CISSP.

08/10/2023

Royal: the ransomware group behind the City of Dallas attack

Flashback to late April, the main concern for the City of Dallas was whether or not #1 draft pick Mazi Smith would be enough to stop Jalen Hurts from running all over the Cowboys this Fall.

Flashforward a week later and the only thing the City of Dallas was worried about stopping was the ransomware that had impacted city services including the police department and 9-1-1.

In light of Dallas finally admitting (3 months later) that over 27,000 people had their sensitive data exposed along with over $8.5 million dollars being spent, lets look at the ransomware group that raised such havoc in the Big D- this group would be known as Royal.

Royal splashed onto the scene back in 2022. They are suspected to be made up of members of the now defunct Russian ransomware gang- Conti. Their most notable way of attack is through a strategy known as callback phishing. A method where a threat actor sends a person an email detailing a fake problem (i.e. your package can’t be delivered or do you want to cancel your subscription before you get billed). The recipient is like “no way do I want to pay for a subscription to Colossal Cake of the Month”, they click the link in the email (or call the number provided), follow the instructions given and BOOM they now have remote access malware loaded on their PC.

The threat actor later capitalizes on the remote access looking at the PC for valuable or sensitive data. They then use the PC to complete a lateral discovery throughout the connected network looking for vulnerabilities they can capitalize on. Think of it as having a crazy awesome security system that keeps people out of your house but before you go to bed your nephew shuts it down quick to let a solicitor in to hang out as you sleep.

Royal tends to enjoy a two-way ransom attack on victims. First encrypting the data so it is useless, inaccessible and therefore shutting down operations. Second, they threaten to expose the sensitive data if you don’t give them their bag of cash.

Royal is heavily funded with loads of experience. They are considered a high-level threat to enterprises across all verticals. To protect against such threats, organizations need to allocate resources and build a multi-facet security system that monitors 24x7. Contact Kansas City Cyber today and we can establish a strong effective defense strategy for your environment.

07/25/2023

Welcome to ! If you ever are unfortunate enough to be negotiating with a hacker, know that that it is far from guaranteed that you will ever see your data again even if you pay the ransom.

Committing the time and the resources to prevent a breach is the #1 way to minimize your risk.

07/18/2023

Welcome back to ! We've been on hiatus enjoying the Summer! A great way to jump back in is to remind everyone Windows Server 2012R2 end of support is coming up faster than a knife fight in a phone booth! Don't be left out of compliance, contact KCC today and let us get you up to speed!

06/27/2023

Welcome to Continuing our conversation on speeding up your PC, if you're still running on a standard rotational hard drive (HDD), !probably want to take a sledgehammer to your PC every time it boots up.

To be effective, you should have a solid state drive (SSD). An HDD has moving parts and must spin to the spot on the drive to find the data you request. SSDs don't have moving parts. Data is read/written through 'cells' which perform at a much faster rate.

To determine if you have an SSD or HDD follow these steps:

PC-
Click Windows Key + S to open search menu
Type PowerShell and press
PowerShell will enter
Type (or copy/paste) the following: Get-PhysicalDisk | Format-Table -AutoSize
Under MediaType, you will see what type of drive you have

Mac
Click the Apple logo in the top-right corner
Click "About this Mac"
Click Storage
Under the hard drive icon there will be a description of the hard drive (Flash Storage = SSD)

If you are still running on a rotational drive (HDD), we would recommend replacing that ASAP!

06/13/2023

Welcome to ! As organizations have continued to move towards a decentralization of their team, BYOD (Bring Your Own Device) has become more prevalent. This has created challenges with management and security. As the name states, BYOD allows users to use their personal device for business purposes.

Since the devices aren't company assets, users can be reluctant to allow security software to be loaded on their device. However, an unprotected personal device accessing company data can lead to a hacker's dream. To prevent this, ensure you have a strict BYOD security policy that includes items such as a password policy, endpoint protection, the principle of least privilege, storage location protection or backup, and the ability to wipe the machine if the device is lost or stolen.

06/06/2023

Welcome to ! A Man in the Middle attack is when a hacker places their device or app between two parties that are communicating.

The device then scans the traffic for plain text communication which can allow it to steal confidential and sensitive information.

Be careful when using unknown public wireless as you never know what the connecting device is able to track.

Want your business to be the top-listed Computer & Electronics Service in Kansas City?
Click here to claim your Sponsored Listing.

Videos (show all)

Happy #cybertiptuesday! We wanted to thank everyone who has supported us over the past year, we really appreciate it! #H...
Welcome to #cybertiptuesday ! Today we explore that little s that secures your website when you go from http to https. T...
Happy #cybertiptuesday ! Are you one of those people that love to save things to your C drive or your PC’s desktop? You’...
Welcome to #cybertiptuesday! We welcome back Riley to share with us how easy it is to social hack a help desk. Your IT t...
Happy #cybertiptuesday ! Today we talk about #emailencryption ! Learn how to protect your sensitive and governed informa...
Welcome to #cybertiptuesday Today Travis Lass uses the risk of throwing an interception to better understand cyber risk ...
#WorldPasswordDay #levelup #maythefourthbewithyou
Welcome to #cybertiptuesday 5.2.22! Windows 2012 Server and Windows 2012r2 are set to go Microsoft End of Support in Oct...
#cybertiptuesday #uarizona Live from the University of Arizona where we are promoting cyber awareness training to become...
Happy #TipTuesday. In this video, we conclude our two-part series on #multifactorauthentication by discussing the differ...
Natalie shares information on Multifactor Authentication for this #tiptuesday on 2.7.23. #protectyourbusiness #mfa #kans...
This #TipTuesday we are looking at password recycling. We all have done it, but did you know by reusing your username an...

Telephone

Address


1100 Main Street
Kansas City, MO
64105

Other Information Technology Companies in Kansas City (show all)
Business Technology Association Business Technology Association
12411 Wornall Road , Ste. 200
Kansas City, 64145

The Business Technology Association serves office technology dealerships, manufacturers, distributor

ECCO Select ECCO Select
1601 Iron Street, Suite 200
Kansas City, 64116

ECCO Select is recognized as an innovative technology leader providing proven IT services, solutions and staffing to meet your long-term strategic goals an

The Sanderson Technology Group INC. The Sanderson Technology Group INC.
1828 Walnut Street, 3rd Floor
Kansas City, 64108

We are a national technology conglomerate, providing services to large companies down to residential.

DatAdit DatAdit
Kansas City, 64083

A trusted partner for efficient & accurate data entry solutions. Savings with subscription services!

Skeep.Dig Skeep.Dig
1019 Jefferson Street
Kansas City, 64105

We are one the leading re-sellers of computer harware accessories and cloud service

Caffeination Caffeination
Kansas City

We are here to help you with your home improvement, design consultation, and home automation.

Mimic IT Solutions Mimic IT Solutions
Kansas City

We help companies increase productivity, reduce cost, improve accuracy, and diminish risk by transforming manual business processes into automated solutions.

WinZier WinZier
Kansas City

At WinZier we hope to provide all of our clients with respectful and safe installations of the vario

Will-Fix-IT Will-Fix-IT
700 W 31st Street
Kansas City, 64108

Hi I am Will, a resident in the OPP building. I Am now offering a tech help service in the building

Baby, Child & Parent Freebies by Mail Baby, Child & Parent Freebies by Mail
Kansas City

Baby, child, family, parent, food & more freebies/samples by mail with free or cheap shipping!

Wenzel Computer Services Wenzel Computer Services
Kansas City, 64108

Full-service technology consulting for home and business.

To The Sky Solutions LLC To The Sky Solutions LLC
8301 State Line Road Suite 220 #228
Kansas City, 64114

Need a cheap mobile repair? Repairs are meant to help you not hurt you. Don't be fooled by big OR sma