Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are Vigilante Hackers a Threat?

b2ap3_thumbnail_do_vigilante_hackers_present_problems_400.jpg2015 was a brutal year for major corporations, as one by one they fell victim to hacking attacks. Major organizations like Blue Cross Blue Shield, Anthem, and even the United States Office of Personnel became victims of major hacking campaigns. A fact that’s often lost amongst these details is that not all hackers use their skill for evil actions, even if they are still illegal.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Mobile Security Cost Management Assessment Unified Threat Management Financial Outlook The Internet of Things Cooperation Windows 10 PDF Avoiding Downtime Buisness Facebook Vulnerabilities Cables Recovery Troubleshooting eWaste Education Apps Downloads HIPAA Hardware Big Data IP Address VoIP Gadget Bandwidth Travel Error Management Electronic Health Records Wireless Technology IT service Internet Exlporer Domains Remote Worker Identity Theft PowerPoint Staff Test Twitter Touchscreen Downtime Language Apple Security Cameras Hiring/Firing CIO LiFi Data Breach BDR Mobile Device Statistics Training Smartphones MSP Deep Learning Solid State Drive Telephony Document Management Help Desk Mirgation Virtual Desktop Procurement Cybersecurity Networking Hacker Saving Money Wires Paperless Office Features Electronic Medical Records Managed IT Service Encryption Undo Collaboration Analytics Hackers Business Computing 3D Printing Holiday Drones Display Servers Instant Messaging Virtual Private Network Business Management Taxes Public Cloud Cookies Mobile Device Management Privacy Managed Service Provider Windows 8 Wi-Fi Two-factor Authentication Asset Tracking Computer Care Phishing Data loss Social Networking History Hard Drive Proactive Managed IT Network Hacking Human Error Mail Merge IT Technicians IoT Computers Microsoft Excel Motion Sickness Bookmarks Meetings Relocation Enterprise Resource Planning IT Support Microsoft Office Identities Robot Tablet Cyberattacks Business Intelligence Communication Private Cloud Customer Service Halloween Social Engineering Black Friday Time Management Saving Time Remote Monitoring and Management Mobile Computing Mobile Device Managment Computing Infrastructure Websites Social BYOD Samsung Personal Information Windows Running Cable Productivity Redundancy Cloud Website Bluetooth Data Recovery Cleaning Operating System Customer Relationship Management Distributed Denial of Service Automobile Favorites Google Drive Analyitcs Legal Employee-Employer Relationship Managed IT services Motherboard SharePoint Heating/Cooling Internet of Things Application Managed Service Authorization Disaster Resistance Business Zero-Day Threat Law Enforcement YouTube Cyber Monday Screen Reader Google Wallet Cache Current Events Webcam Word Refrigeration High-Speed Internet Virus Internet Miscellaneous Applications Permissions Remote Monitoring Business Growth Mobile Smart Tech Mobile Devices Files Access Control Save Time Bitcoin Server Management Quick Tips Proactive IT Lithium-ion Battery Gadgets Infrastructure Data Security Digital Payment Hard Disk Drive Google Maps Competition Computing Marketing Physical Security File Sharing Scam Supercomputer Chrome Disaster Recovery Microsoft Remote Workers Chatbots Business Continuity Project Management Licensing Star Wars Superfish Chromebook Conferencing Data Management Enterprise Content Management Gmail Malware Compliance Humor Cryptocurrency Dark Data Innovation Storage Processors WannaCry CCTV Vendor Management IT Support Unsupported Software Best Practices Retail Update Technology Laws Router Employees Save Money User Typing How To Black Market Network Security Backup and Disaster Recovery Entrepreneur Utility Computing Managing Stress Data Risk Management Consulting Specifications Flexibility Connectivity Scary Stories Windows 10 Best Practice Company Culture Antivirus Tip of the week Artificial Intelligence User Error Work/Life Balance Firewall Notifications Smartphone OneNote IT Consulting Office 365 Health Dark Web Consumers iPhone Trending Hotspot Corporate Profile Software as a Service Uninterrupted Power Supply Office Wearable Technology IT Consultant Mouse Experience IT solutions Cortana Google Calendar Nanotechnology User Tips Development Botnet E-Commerce Computer Repair Digital Authentication Network Congestion Technology Tips Smart Technology Emoji Spyware Business Technology Patch Management Passwords Data Warehousing Employer-Employee Relationship Comparison Bring Your Own Device communications Piracy Software Tips Machine Learning Sports Read Only Hosted Solutions Virtual Reality G Suite Politics Office Tips Environment Spam GPS Augmented Reality Presentation Google IT Services Search Software ROI Android Finance Programming Upgrade Point of Sale IT Budget Content Filtering Tech Terms USB Server Migration Backups Efficiency Writing Government SaaS Regulations Hacks How To Tech Support Web Server Alert Staffing Information Permission Tracking Outsourced IT Small Business Maintenance Computer App Crowdsourcing VPN Fun Identity Fleet Tracking Knowledge Browser Tech Term Phone System Email Telephone Systems Intranet Cabling WPA3 Managed IT Services Monitoring WiFi Information Technology Remote Computing End of Support Fraud Modem Firefox Going Green Net Neutrality Cybercrime Technology Consultation Mobility IBM Tip of the Week Workplace Tips Legislation Automation Sync Business Owner Password Social Media Break Fix Google Docs Money Budget Disaster Lenovo Digital Signature Alerts Co-managed IT Multi-Factor Security Public Speaking Administrator Network Management Productivity Geography Administration Vulnerability Alt Codes Unified Threat Management Unified Communications Printer Upgrades Mobile Data Cameras IT Management Data storage Backup Techology Documents Printing Managed Services Provider Hard Drives Hosted Solution Blockchain Laptop Theft Settings Ransomware Operations 5G Data Backup Shortcut Address Virtualization RMM Healthcare Users Recycling Mobile Office Monitors VoIP Wireless Cloud Computing Safety

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...