Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are Vigilante Hackers a Threat?

b2ap3_thumbnail_do_vigilante_hackers_present_problems_400.jpg2015 was a brutal year for major corporations, as one by one they fell victim to hacking attacks. Major organizations like Blue Cross Blue Shield, Anthem, and even the United States Office of Personnel became victims of major hacking campaigns. A fact that’s often lost amongst these details is that not all hackers use their skill for evil actions, even if they are still illegal.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Cooperation Network Management Security Monitoring Finance Outsourced IT WannaCry Remote Computing Computers Gmail Best Practices Language Geography Antivirus Android Safety Display Proactive Troubleshooting Health Identity Theft Privacy Refrigeration Save Money Break Fix Managed Services Provider IT Support Humor Specifications Data Google Cryptocurrency Apps How To Twitter Software Tips Social Media Permissions Entrepreneur Running Cable Hosted Solution IT Technicians Botnet Maintenance Business Owner Voice over Internet Protocol Point of Sale Mouse iPhone Physical Security Public Cloud Update Drones Cybersecurity Cleaning Business Technology Managed IT Services Consulting Hard Disk Drive Malware VoIP Files The Internet of Things Apple Bandwidth Technology Laws Going Green Development Downloads Financial Windows 8 Fraud Content Filtering Machine Learning Backups Multi-Factor Security Education Software as a Service Virtual Assistant Efficiency Server Management Identity Microsoft Office Workplace Tips Hard Drive Search Application Backup and Disaster Recovery Identities Productivity Tech Term Technology Samsung Legal Relocation Smart Technology Digital Signature Work/Life Balance Government Business Intelligence Hacks Asset Tracking Storage End of Support Dark Data Virus Avoiding Downtime Mirgation Remote Workers Cache Project Management Remote Monitoring Printer Legislation LiFi Comparison Processors Managed Service Social Engineering Healthcare Wireless Bring Your Own Device High-Speed Internet Mobile Office Virtual Reality Halloween Router Superfish Cables Alt Codes Wireless Technology Browser Information Technology Recycling Redundancy Network Hotspot Virtual Desktop Experience Zero-Day Threat Users Internet of Things IoT Smartphone Windows Settings Cookies App Buisness Tip of the Week Employee-Employer Relationship Theft Wearable Technology Artificial Intelligence Training Managed IT Cost Management Proactive IT Phone System Heating/Cooling Fleet Tracking Staffing Holiday Office Tips IT solutions Disaster Retail Social Scam Network Security Google Calendar Chatbots Digital Payment Bluetooth Touchscreen Tracking Backup IT service Smartphones Outlook IP Address Compliance Notifications Facebook Augmented Reality BYOD IT Services Technology Tips Piracy Lithium-ion Battery Communication Address Web Server Alerts Regulations Saving Time Software Operations ROI Access Control Hosted Solutions Security Cameras Spam Conferencing Wires Vulnerabilities Dark Web Server BDR File Sharing Taxes Information Documents 5G Office Monitors Customer Relationship Management Hardware Human Error Business Computing Professional Services Private Cloud Consumers Google Drive Miscellaneous Paperless Office Cybercrime Knowledge Internet Exlporer Remote Worker Data Management G Suite Innovation Customer Service Sports Chromebook Chrome CCTV Crowdsourcing Consultation Hacking Automobile Windows 10 Connectivity Computer Telephony Hacker Motherboard Remote Monitoring and Management Data storage Business Virtual Private Network Alert Public Speaking Flexibility History Digital User Error Business Continuity Data loss Analyitcs Co-managed IT Office 365 Screen Reader Save Time Nanotechnology Features Data Warehousing Big Data Hiring/Firing Current Events Bitcoin Law Enforcement Data Recovery Test Uninterrupted Power Supply Analytics Email Mobile Wasting Time Data Backup RMM Management Budget Environment Data Breach Spyware Migration Database WPA3 Two-factor Authentication Scary Stories Network Congestion Mobile Data Tip of the week Virtualization E-Commerce Distributed Denial of Service Phishing Unsupported Software Unified Communications Risk Management Black Market Trending Modem Mail Merge Cabling Fun CIO Enterprise Content Management Saving Money Net Neutrality Tech Support Black Friday Emoji Instant Messaging Mobile Devices Writing Company Culture Operating System Disaster Resistance Mobile Device Managment Windows 10 Assessment User Tips IBM Productivity Help Desk Recovery Star Wars Cloud Computing IT Budget Tablet Automation Password Printing Managed IT Service Wi-Fi Hackers GPS Meetings Administrator PDF Telephone Systems Programming Typing VPN MSP Small Business Laptop Vendor Management Gadgets Electronic Medical Records Quick Tips Employees Statistics Enterprise Resource Planning Ransomware Sync Deep Learning Infrastructure Staff Computer Care Google Maps Mobile Security Cloud Computing WiFi Travel HIPAA Personal Information Word eWaste User Cyberattacks Motion Sickness IT Support YouTube Servers Vulnerability Internet Authentication Mobile Device Management Disaster Recovery Domains Marketing Money Google Wallet Computer Repair SharePoint Supercomputer Politics Firewall Patch Management Presentation Hard Drives Best Practice Unified Threat Management IT Consulting Applications Networking Managing Stress IT Management Cortana Mobility IT Consultant Licensing Tech Terms Competition Windows 7 Unified Threat Management Time Management Shortcut Upgrades Social Networking Microsoft Excel Gadget Error Downtime communications Passwords Business Management Bookmarks Procurement Mobile Computing USB Firefox Encryption OneNote Permission Notes Business Growth Smart Tech Webcam Robot Techology Corporate Profile Websites How To Computing Infrastructure Read Only Cameras Employer-Employee Relationship VoIP Electronic Health Records Google Docs Blockchain Undo Utility Computing SaaS Website Data Security Favorites PowerPoint Managed IT services Managed Service Provider Authorization Lenovo Mobile Device Administration Cyber Monday 3D Printing Microsoft Collaboration Upgrade Intranet Solid State Drive Document Management

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...