Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

During the Holidays, Cybersecurity Matters at Work and Home

During the Holidays, Cybersecurity Matters at Work and Home

We’re right in the thick of the holiday season, which means two things: one, there’s a lot of data being exchanged between businesses and consumers, and (on a related note) two: there’s ample opportunities for cybercrime, targeting business and consumer both. Whichever side of the coin you are on at any moment, you need to be aware of the risks, and how to mitigate them.

As a Consumer
Let’s face it, the Internet is a fantastic resource for the savvy shopper to use as a means of identifying where the best deals are, be it online or in-store. However, when browsing openly in such a way, you need to ensure that you are doing so as securely as possible.

There are, of course, the more basic steps: making sure your anti-virus software is up-to-date and activated, practicing good password hygiene and strength. In addition to these precautions, there are other measures you can take to help keep the holidays merry and bright, free of a cyberattack.

While you’re browsing, you want to make sure that you are as defended as possible, and that you are browsing intelligently as well. The bar where the website’s URL appears should have a locked padlock somewhere in it, indicating that the website is secure and any data you input (like credit card information, for example) is protected behind encryption. Furthermore, as convenient as a free Wi-Fi connection may seem, it isn’t going to be worth your data being infected as a result.

As a Business’ Representative
Of course, the focus on consumerism that permeates this time of year doesn’t for a moment mean that businesses get a pass when it comes to potential cyberattacks. The holiday season means nothing to attackers, and will not prevent them from leveraging everything they’ve got against your business’ interests. This effectively makes it a requirement for any business to have policies to counteract some of a cybercriminal’s efforts.

These policies should address a couple things, the first of which ensuring that all of your business’ defenses are updated and activated.

Whether it’s your antivirus, your remote access solution, or anything in between, your entire network needs to be maintained and kept up-to-date. This means that any patches that have been released for your solutions should also be applied in addition to regular updates as they are made available.

Your users also need to play a role in your cybersecurity. With the holidays so close, there is likely to be an increase in holiday-themed scams and phishing attempts. A few simple lessons in best practices will help to keep your users aware of these efforts and how to prevent them. Anyone with network access should also be required to authenticate their identity a few times through various means.

Of course, it can also be challenging for a business to keep all this up while simultaneously attending to their regular operations. That’s why we do what we do at The Connection, Inc. Give us a call at (732) 291-5938, and have a happy and healthy holiday this year.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 19 March 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Server Microsoft Office Business Technology Solid State Drive Knowledge Data Recovery Entrepreneur Cables Mobile Hackers Politics Environment Private Cloud Hiring/Firing Documents Cyberattacks Bandwidth Avoiding Downtime Permission Unified Communications Network Security Social Networking Microsoft Vendor Management Humor Compliance Holiday Cabling Mouse Administrator Nanotechnology Connectivity Automation Bring Your Own Device Domains Enterprise Content Management Electronic Medical Records Features Information Technology Remote Monitoring and Management File Sharing Identity Theft Lenovo Phone System Co-managed IT Relocation Files Tip of the week Customer Service Virtual Assistant Read Only BYOD Web Server Halloween Hacks Disaster Recovery Help Desk Health Gadget Screen Reader Competition Saving Time G Suite Procurement Public Cloud Dark Web Employer-Employee Relationship Techology Websites Cyber Monday Error How To Hacker GPS Operations Virtualization Mobile Office VoIP Hard Drives 5G IT Technicians Dark Data Alerts VPN Office IT Support Asset Tracking Mobile Computing Workplace Tips Wi-Fi Gadgets Assessment Lithium-ion Battery Hacking Monitoring Printing Computers Monitors 3D Printing Spam Google Drive Notes Document Management Tech Terms Cloud Computing Corporate Profile Windows 10 Undo Analyitcs Human Error Wireless Technology Hard Disk Drive Quick Tips High-Speed Internet Black Friday Licensing Mobile Data Innovation Computer Care Alert Marketing Information Public Speaking Virus Android CCTV Privacy Alt Codes RMM Smartphones Conferencing End of Support Passwords IT service Tech Term IT Consulting Geography Emoji Experience SaaS IT Consultant Bitcoin Apple Going Green Digital Payment Managed Services Provider Browser Cybercrime Webcam Blockchain Smart Technology Network Management Analytics Microsoft Excel Authentication Upgrade E-Commerce Vulnerabilities Malware Business Management Notifications Multi-Factor Security Productivity HIPAA Running Cable Star Wars Data Management Access Control Tip of the Week Staffing Application App Password Technology Apps Automobile Typing Consultation Time Management VoIP Security Cameras Proactive Troubleshooting Update Buisness Intranet Internet of Things Shortcut Scam Comparison Upgrades Disaster Robot Legislation Data loss Point of Sale Backups Unified Threat Management Patch Management Healthcare Managed Service Enterprise Resource Planning PowerPoint Physical Security Crowdsourcing Network Data Backup Trending Google Wallet Internet Exlporer Managed IT Specifications Unified Threat Management Office Tips Writing MSP Communication Managed IT Services Mobility Hosted Solutions Gmail Wires Cleaning Outlook Administration Regulations Tech Support SharePoint Google Maps Data storage Data Security Current Events Security Computing Personal Information Black Market Collaboration Ransomware Social Engineering LiFi Proactive IT Presentation Augmented Reality Downloads communications Employee-Employer Relationship Cortana Hardware Management IT Management Mobile Device Management Zero-Day Threat Fleet Tracking YouTube Scary Stories Chatbots Consulting How To Recycling Social Media Vulnerability Wearable Technology WannaCry Office 365 BDR Backup Search ROI Cryptocurrency Business Continuity User Tips Spyware Content Filtering Business Taxes Drones Uninterrupted Power Supply Cybersecurity Flexibility Remote Monitoring Antivirus Data Technology Laws Storage Virtual Private Network Financial Chromebook Efficiency Applications Best Practice Outsourced IT Artificial Intelligence Motherboard Instant Messaging Backup and Disaster Recovery Managed IT Service OneNote Network Congestion Theft Modem Heating/Cooling Windows 10 Servers Display Paperless Office Work/Life Balance Website History Cost Management Statistics Disaster Resistance Windows 8 Printer Education Computing Infrastructure eWaste IP Address Operating System Best Practices Managed IT services Hotspot Computer Travel Social Maintenance User Error Software Permissions Piracy iPhone Identity Virtual Desktop Test Address Managing Stress Business Owner IBM Networking Email Touchscreen Laptop Smart Tech Save Money Retail Downtime Project Management User Redundancy Word Fun Mobile Device Fraud Virtual Reality Sync Break Fix Cloud WPA3 IT Services Machine Learning The Internet of Things Google Google Docs Cookies Two-factor Authentication Save Time Remote Worker USB Data Warehousing Hard Drive Computer Repair Favorites Saving Money Mobile Security CIO Motion Sickness Digital Signature Mobile Device Managment Identities Migration Wasting Time Router Customer Relationship Management Smartphone Settings Firefox Money Supercomputer Development Voice over Internet Protocol Cooperation Budget Processors Risk Management Bluetooth PDF Technology Tips Wireless Deep Learning Unsupported Software Data Breach WiFi Windows 7 Company Culture Cache Database Superfish Hosted Solution IT Support Net Neutrality Remote Computing Business Intelligence Authorization Internet Tracking Distributed Denial of Service Software Tips Tablet Consumers Windows Phishing Safety Bookmarks Electronic Health Records Twitter Refrigeration Law Enforcement Finance Botnet Programming Productivity Miscellaneous Business Growth Small Business Staff Legal Utility Computing Software as a Service Mobile Devices Server Management Remote Workers Firewall Google Calendar Language Telephone Systems Infrastructure Recovery IoT Training IT solutions Samsung Facebook Managed Service Provider Big Data Mirgation Professional Services IT Budget Telephony Cameras Meetings Encryption Mail Merge Sports Digital Users Chrome Employees Government Business Computing

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...