Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

An Extreme Example of a Fired IT Administrator Taking Revenge

An Extreme Example of a Fired IT Administrator Taking Revenge

It can be easy to underestimate the importance of maintaining permissions on your network. In fact, sometimes it takes a good dose of misfortune to present the consequences of unchecked access to your network. This time, the misfortune befell PA Online, an Internet service provider located in Pennsylvania.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Computer Repair Human Error IP Address Address Crowdsourcing Company Culture CCTV Tip of the Week Saving Time How To Firewall VoIP Troubleshooting Save Time Cameras GPS Website Tech Term Server Hosted Solutions Technology Tips Deep Learning Password Business Owner Smart Technology WannaCry Virtual Private Network User Network Congestion Superfish Phone System Microsoft Excel Unsupported Software Apple Computing Infrastructure Network Identity Theft Data Management Electronic Medical Records Business Continuity Downtime iPhone Budget Avoiding Downtime Uninterrupted Power Supply Malware Search Printer Managing Stress communications Remote Computing Authorization Legal Refrigeration Statistics Sports Laptop Remote Worker Google Project Management Entrepreneur Software Tips Office Digital Signature Public Speaking Test Intranet Nanotechnology Break Fix Big Data Point of Sale Privacy YouTube Information Technology Vulnerabilities Phishing Finance Consulting Technology Development Samsung Lithium-ion Battery Compliance Remote Monitoring and Management Politics Unified Communications Social Media Data loss Hotspot Wi-Fi Business Intelligence OneNote IT Consultant Telephone Systems Windows 10 IT Consulting Mobile Devices Software as a Service Gadgets End of Support Motherboard Social Engineering Digital Permissions Microsoft Retail Mobile HIPAA Analytics Mirgation Co-managed IT Data Recovery Cortana Cryptocurrency Bring Your Own Device Word Tip of the week Proactive Fun Quick Tips Flexibility Data storage Blockchain IBM Education SaaS How To Hard Drive Knowledge Conferencing Virtualization Business Growth Application Botnet Business Computing PDF Server Management Net Neutrality Managed IT Automobile Hard Disk Drive IT Management Gmail Managed IT services Help Desk Star Wars Servers Recovery Google Wallet Migration Alert Environment Employer-Employee Relationship Bitcoin Windows 10 Hiring/Firing Typing Productivity Safety Google Drive Private Cloud Vendor Management Twitter Administration Augmented Reality Shortcut Monitors Networking Facebook Geography Artificial Intelligence CIO Bandwidth Hackers Infrastructure Screen Reader Workplace Tips Windows Permission Solid State Drive Instant Messaging Language Printing Motion Sickness Saving Money Efficiency Cost Management Storage Robot IT service Cloud Computing Heating/Cooling VPN Multi-Factor Security Health Internet Windows 8 Gadget Computer Identities Data Breach Firefox Alt Codes Security Cameras Competition Backups Unified Threat Management IoT Web Server Presentation Connectivity IT Support Applications Proactive IT Hacking Supercomputer Going Green WiFi IT solutions Digital Payment Data Warehousing Holiday Cybersecurity Google Calendar Scam Save Money G Suite Two-factor Authentication Sync Spyware Innovation PowerPoint Government Emoji Cyberattacks Virtual Desktop Users Business Technology Cleaning Antivirus Content Filtering High-Speed Internet BDR Management Upgrades Collaboration Documents Document Management Piracy Office Tips Disaster Security Hacker Communication Taxes Electronic Health Records Social Smartphones Unified Threat Management Comparison Miscellaneous Consumers Operations Mobile Device Managment Machine Learning IT Support Android Business Management Computers IT Budget 5G Operating System Enterprise Content Management Buisness Smartphone User Error Regulations Wireless Licensing Router Specifications Theft Upgrade Vulnerability Settings Tracking Fleet Tracking Public Cloud Notifications Running Cable Internet of Things Mouse Alerts Chrome Money The Internet of Things Bluetooth Virus Small Business Microsoft Office Ransomware Recycling SharePoint Writing Hard Drives Physical Security Browser Business Maintenance Disaster Resistance Outlook Cooperation Disaster Recovery IT Technicians Staff Undo History User Tips Cache VoIP Training Internet Exlporer Office 365 Access Control Modem Redundancy Spam Cybercrime Analyitcs Google Docs Managed Services Provider USB Mobile Device Managed Service Techology Data Security Passwords Domains Programming Law Enforcement Relocation Webcam Marketing Encryption Asset Tracking Assessment File Sharing Wireless Technology eWaste Zero-Day Threat Email Downloads Outsourced IT Employees Information BYOD Wearable Technology Error Mobility Hardware Cloud Trending Hosted Solution Managed IT Service Staffing Data Cyber Monday Fraud Computing Employee-Employer Relationship Distributed Denial of Service LiFi Dark Web Backup and Disaster Recovery Telephony Cookies Time Management Enterprise Resource Planning Automation Google Maps Drones Files ROI Update RMM Humor Dark Data Authentication Touchscreen Best Practices Identity Black Friday Tech Support Read Only Wires Customer Relationship Management Tablet Mobile Device Management Virtual Reality WPA3 Corporate Profile Smart Tech E-Commerce Paperless Office Personal Information Managed Service Provider Best Practice Halloween Productivity Features Social Networking Experience Monitoring Network Management Apps Consultation Remote Workers Mail Merge Data Backup Chatbots Display Computer Care Websites IT Services 3D Printing Bookmarks Lenovo Tech Terms Managed IT Services Legislation Software Hacks Mobile Office Procurement Financial Network Security Favorites Chromebook Remote Monitoring Healthcare Administrator Customer Service Meetings Current Events Cables Mobile Security Technology Laws Processors Cabling Travel Risk Management Mobile Data Scary Stories Utility Computing Mobile Computing Black Market Patch Management App MSP Work/Life Balance Backup

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...