Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Should Companies Be Punished for Data Breaches?

Should Companies Be Punished for Data Breaches?

We’ve all seen and heard about companies and government departments that have experienced major security and data loss events. Once the event is made public, there is a media frenzy of coverage disclosing answers to questions like: Were your records compromised? How can you protect nonpublic information in the future? What should you do if you are a victim? However, as the media focus moves to another topic, the breach becomes yesterday’s news - and there is very little coverage of what repercussions and penalties those entities that were breached faced - if any.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Computing Instant Messaging User Tips Disaster Resistance Managed Services Provider Co-managed IT Botnet Business Continuity Cryptocurrency Proactive Bookmarks Compliance Migration VoIP Remote Monitoring Programming Consumers Development Microsoft Outsourced IT Relocation Bandwidth Internet Productivity CIO Safety Web Server Users Authentication Alert Telephone Systems Artificial Intelligence Mouse OneNote The Internet of Things Customer Relationship Management Google Maps eWaste Cybercrime Mobile Device Managment WannaCry IP Address Managed IT Service Administration Augmented Reality Law Enforcement Business Management Government Holiday Display Going Green Firewall Hard Disk Drive Administrator Legal Office 365 Business Growth Internet Exlporer YouTube Mobile Security Notifications Telephony Statistics Malware Address Printer Vulnerability Hosted Solutions Cloud Techology Access Control Black Friday Wires Google Docs Maintenance Enterprise Content Management Chrome Paperless Office Uninterrupted Power Supply Cortana Saving Time Enterprise Resource Planning Screen Reader Disaster IT Budget Data Management communications Lithium-ion Battery Gadget Backup and Disaster Recovery Cache Networking Retail Finance Automation Encryption Business Computing Word Cybersecurity Mobile Data WPA3 Laptop IBM Error Cost Management Financial History Smartphones Automobile Bring Your Own Device App Lenovo Halloween Running Cable Work/Life Balance MSP End of Support Downtime Productivity Microsoft Excel Analyitcs Licensing Social Networking Best Practice Google Calendar Tablet Apps SaaS Best Practices Virtualization Settings Data Backup Bluetooth IoT LiFi Mobility VPN Managed IT services Sync Asset Tracking Staffing Save Time Health Drones Intranet Mobile Computing Processors Chromebook VoIP Managing Stress Social Media Saving Money Identity Theft Innovation WiFi Project Management Virtual Reality Twitter Fun Scam Smart Tech Entrepreneur Gmail GPS Antivirus Flexibility Business Owner Refrigeration Documents How To CCTV USB Features Cooperation Servers Avoiding Downtime Digital Computer Care Politics Wearable Technology Presentation Search High-Speed Internet IT Consulting Star Wars Miscellaneous Tech Support Superfish Vendor Management Disaster Recovery Upgrade Smartphone Cloud Computing IT Services Virtual Private Network Backup Utility Computing Mobile Device Physical Security Business Data Warehousing Social Engineering Test Motion Sickness E-Commerce Domains Applications Legislation Information Technology 5G Printing Conferencing Sports Buisness Facebook Current Events Spyware Alerts Public Speaking Ransomware Network Management Browser Technology Tips Trending ROI Mobile Office Motherboard Redundancy Dark Web IT service Managed Service Provider Help Desk Hard Drive Internet of Things Budget Blockchain Software as a Service Office Crowdsourcing Business Intelligence Unified Threat Management Communication PowerPoint Application Electronic Medical Records Piracy Remote Workers Humor Computing Infrastructure Data loss Cameras Data Breach Undo Security Authorization Competition Big Data Mirgation Upgrades Point of Sale Regulations Websites Data Recovery Dark Data Email Hotspot Hackers Meetings Webcam Outlook Company Culture Remote Monitoring and Management Robot Employees Two-factor Authentication Taxes Data storage Private Cloud Corporate Profile HIPAA Windows 10 IT Support Server BDR Unified Threat Management Managed IT Management Unified Communications Data Security Cyber Monday Storage Zero-Day Threat Tracking Solid State Drive Windows 10 Office Tips Social IT Consultant Theft Android Update Time Management Customer Service Machine Learning Recovery Network Congestion Technology Laws Google Drive Password Wi-Fi Business Technology Experience Managed Service SharePoint Router Small Business Procurement Writing Favorites Multi-Factor Security Fraud G Suite Human Error IT solutions Training User Error IT Technicians Wireless How To Remote Worker Unsupported Software Break Fix Phone System Server Management Operating System Cyberattacks Vulnerabilities Computer Repair Hardware Tip of the week Personal Information Virus Identity Money Cables User BYOD Heating/Cooling Computers Managed IT Services Environment Scary Stories Education Public Cloud Workplace Tips Network Security Microsoft Office Website Quick Tips Hacks IT Management Downloads Spam Efficiency Distributed Denial of Service Consultation Information Mail Merge Gadgets Infrastructure Electronic Health Records Wireless Technology Marketing Travel Nanotechnology Alt Codes Identities Technology Modem Hiring/Firing Black Market iPhone Windows 8 Hosted Solution Assessment Proactive IT Net Neutrality Content Filtering Fleet Tracking Chatbots Knowledge Hacking Collaboration RMM Smart Technology IT Support Read Only Windows Tech Term Tip of the Week Permissions Analytics Software Geography Hacker Connectivity Consulting Operations Emoji Mobile Devices Software Tips Samsung Typing Data Touchscreen Hard Drives Cookies File Sharing Patch Management Specifications Google Backups Staff Mobile Device Management Language Monitors Permission Google Wallet Healthcare Security Cameras Digital Signature Troubleshooting Employee-Employer Relationship Shortcut Remote Computing Digital Payment Computer Tech Terms Network Bitcoin Deep Learning PDF Comparison Recycling Employer-Employee Relationship Virtual Desktop Firefox Apple Risk Management Monitoring Supercomputer 3D Printing Cabling Document Management Passwords Mobile Phishing Save Money Privacy Files Cleaning

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...