Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

An Extreme Example of a Fired IT Administrator Taking Revenge

An Extreme Example of a Fired IT Administrator Taking Revenge

It can be easy to underestimate the importance of maintaining permissions on your network. In fact, sometimes it takes a good dose of misfortune to present the consequences of unchecked access to your network. This time, the misfortune befell PA Online, an Internet service provider located in Pennsylvania.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Law Enforcement Writing BDR Wireless Fun Webcam Hiring/Firing Information Technology Domains SaaS Analytics Point of Sale Display Hardware Work/Life Balance Bandwidth Trending VoIP Tech Support Mobile Computing RMM Financial Facebook Money Gmail OneNote Gadget Tracking Business Computing Staffing Tech Terms Electronic Health Records Technology Business Intelligence Security Cameras VPN Networking HIPAA Mobile Device Management Retail Data Backup Hackers Microsoft Excel Business Owner Vendor Management Piracy Word Network Congestion Touchscreen The Internet of Things Ransomware IT Technicians Instant Messaging Computers Break Fix WannaCry Social Networking Virus PDF Social Engineering Office Tips Theft Heating/Cooling Notes Encryption Best Practices Antivirus Business Continuity Alert Cloud Computing Internet of Things Sports Training Access Control Smart Tech Firewall G Suite Cyberattacks Corporate Profile Uninterrupted Power Supply Remote Monitoring and Management Managed Services Provider Windows 10 Backups Features Mail Merge Paperless Office Hosted Solutions Drones End of Support Automobile ROI 5G Dark Web Operating System Downtime Applications Vulnerabilities Managing Stress Experience Proactive Google Wallet Smart Technology Project Management Time Management Finance Utility Computing Relocation User Tips Google Maps Chromebook Permission PowerPoint Health Techology Permissions Regulations Public Speaking Going Green IBM Hacker Data storage Statistics Cortana USB Black Market Remote Computing IT service Physical Security Compliance Managed IT Services Search Twitter Troubleshooting Printer Collaboration Websites Remote Monitoring Test VoIP Business Technology Google Drive Botnet Application Email Hard Drives Office Solid State Drive Technology Tips Knowledge Cleaning Motion Sickness IT solutions Authentication Save Money Distributed Denial of Service Scam User Error Virtual Assistant Disaster Resistance Operations Tech Term Android Unified Threat Management Cyber Monday WiFi Address Tip of the Week Spam Disaster Recovery Infrastructure Mobility Wearable Technology Modem Co-managed IT CCTV Chatbots Alt Codes Malware Lenovo Web Server Mobile Device Managment Enterprise Resource Planning Wireless Technology CIO Cables High-Speed Internet Saving Money Conferencing Black Friday Hotspot Windows Multi-Factor Security Apple Browser Backup eWaste Samsung Technology Laws Cybercrime Employer-Employee Relationship Consumers Cabling Digital Signature Dark Data Google Docs Bring Your Own Device Connectivity Hosted Solution Travel Users Scary Stories Virtualization Security Remote Worker Digital Administrator Maintenance Server Unified Communications Company Culture Government Cost Management Productivity Identity Theft Cache Internet Exlporer Microsoft Office Settings How To Computing Windows 7 IoT Cybersecurity Employees Data Management Data Shortcut Environment Tablet Processors Mobile Innovation Saving Time Hacking Upgrades Managed Service Provider Current Events Cookies Undo Motherboard Software as a Service YouTube Assessment GPS Screen Reader Information Bluetooth Migration Virtual Reality Website Mobile Device Privacy Files Recovery Bitcoin Sync Supercomputer Computer Care iPhone Outlook Education Competition Star Wars Wires Windows 10 Hacks Employee-Employer Relationship Data Security Update Humor Identities SharePoint Chrome Automation Presentation Analyitcs Augmented Reality Hard Drive Network Digital Payment Voice over Internet Protocol Software Spyware Storage Windows 8 Network Management Big Data Safety BYOD Intranet Documents Bookmarks Mobile Office Cloud Human Error Telephone Systems Small Business Telephony Running Cable Customer Relationship Management Router Save Time Recycling Managed IT Service Legislation Politics Virtual Desktop Computer Downloads Outsourced IT Identity Gadgets Smartphone Meetings Password Communication IT Consultant Artificial Intelligence IT Management Mobile Security Blockchain Budget MSP Managed IT services Wasting Time 3D Printing Halloween IT Budget Hard Disk Drive Mouse Personal Information Network Security Apps Net Neutrality Virtual Private Network Cooperation Software Tips Computing Infrastructure Cameras Nanotechnology Refrigeration Computer Repair Consultation IT Services Mirgation Mobile Devices Disaster Database Monitors Procurement Crowdsourcing Vulnerability Laptop Programming Upgrade Internet Customer Service Risk Management User Deep Learning Geography Remote Workers Alerts Comparison Two-factor Authentication Enterprise Content Management Electronic Medical Records Google Unified Threat Management Robot Typing Data Warehousing Zero-Day Threat Entrepreneur Unsupported Software Content Filtering Healthcare Firefox Data Recovery How To Help Desk Cryptocurrency Development Legal Lithium-ion Battery WPA3 Data loss Licensing Monitoring E-Commerce Best Practice Staff Printing Taxes Miscellaneous Passwords App Avoiding Downtime Emoji Authorization Public Cloud Favorites Data Breach IT Support Flexibility Server Management Phishing Buisness communications Efficiency Holiday Google Calendar Redundancy File Sharing Microsoft Workplace Tips Office 365 History Asset Tracking IT Support LiFi Read Only Servers Document Management Quick Tips IP Address Machine Learning Social Phone System Tip of the week Managed Service Fraud Productivity Proactive IT IT Consulting Management Private Cloud Social Media Fleet Tracking Business Growth Mobile Data Error Backup and Disaster Recovery Administration Managed IT Patch Management Professional Services Smartphones Business Management Notifications Marketing Wi-Fi Consulting Superfish Language Business Specifications

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code