Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Should Companies Be Punished for Data Breaches?

Should Companies Be Punished for Data Breaches?

We’ve all seen and heard about companies and government departments that have experienced major security and data loss events. Once the event is made public, there is a media frenzy of coverage disclosing answers to questions like: Were your records compromised? How can you protect nonpublic information in the future? What should you do if you are a victim? However, as the media focus moves to another topic, the breach becomes yesterday’s news - and there is very little coverage of what repercussions and penalties those entities that were breached faced - if any.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Tracking Zero-Day Threat 5G Chrome Staff Communication Vulnerability Redundancy Mouse BYOD Troubleshooting Digital Payment Wi-Fi Workplace Tips Android App Managed IT Service Work/Life Balance eWaste Virtual Assistant Alert Saving Money Websites Cooperation Artificial Intelligence Microsoft Office Digital Facebook Internet Permissions Blockchain Information Technology Retail Hackers Undo Migration WannaCry Windows IP Address Software as a Service Data Security IT Management Business Continuity File Sharing Document Management Screen Reader Virtualization User Error Alerts Managed Services Provider Wires Health How To Operations BDR OneNote Automation IT service Modem Phone System Human Error Utility Computing Licensing Hacks Heating/Cooling Save Money Dark Web Managed Service Provider Vendor Management Wireless Access Control Server Business Growth Statistics Botnet Digital Signature Address 3D Printing Telephone Systems Safety Halloween Cortana User Tips Network Save Time Hard Drive Domains CIO Remote Monitoring Managed Service Telephony Piracy Small Business Managed IT services Mobile Devices Tech Term MSP Proactive IT Budget Security Data Warehousing Data loss Display Mobile Computing CCTV Saving Time ROI Programming Downtime Malware Passwords Financial Money Mobile Device Managment Best Practices Google Maps Computing Notifications Ransomware Backups Black Market Employer-Employee Relationship Social Business Computing Privacy Legal Office 365 Windows 8 Analyitcs Mobile Data Quick Tips IBM Data Management Windows 10 Computer Repair Software Tips Conferencing Hard Disk Drive Data storage Black Friday Smartphone Mobile Security Consumers Analytics Efficiency User Customer Relationship Management VoIP Enterprise Resource Planning Asset Tracking Fleet Tracking Management Virtual Private Network Cloud Encryption Chatbots Employees Cloud Computing Productivity Augmented Reality Tip of the week Antivirus Google Wallet Productivity iPhone Flexibility Typing Lenovo Outlook Firefox Deep Learning WiFi Physical Security Windows 10 Nanotechnology Star Wars Techology Upgrades Cookies Big Data Outsourced IT Wireless Technology Business Owner SaaS Innovation Backup Cache Finance Public Speaking Servers Computing Infrastructure Bookmarks Miscellaneous Operating System Mobile Corporate Profile Word Sports Microsoft Phishing Private Cloud Automobile Proactive Google Docs Instant Messaging Network Security Microsoft Excel Co-managed IT Entrepreneur Company Culture Help Desk Fraud Mobile Device Computers Authentication Apple Refrigeration Marketing Smart Tech Going Green Monitoring PowerPoint Backup and Disaster Recovery Cybersecurity Tablet Downloads Mobile Office Disaster Resistance Hosted Solutions Data Backup Samsung Server Management Remote Monitoring and Management Managed IT Services Customer Service Virtual Reality Humor Voice over Internet Protocol Employee-Employer Relationship Applications Test Social Media Crowdsourcing Meetings Assessment Printing HIPAA Drones Office Tips Two-factor Authentication Regulations Consulting Twitter RMM YouTube Connectivity Emoji Development Spyware Smart Technology Alt Codes Features IoT Tech Support Break Fix Spam Content Filtering Data Breach Project Management Upgrade Windows 7 Intranet VoIP Infrastructure Bluetooth SharePoint Bring Your Own Device Fun Apps Cleaning Gadget Firewall Documents E-Commerce Bitcoin Business Intelligence Networking Database Disaster Technology Laws Computer Care Administrator Files Lithium-ion Battery Data Managed IT Monitors Holiday Theft Virtual Desktop Dark Data Cryptocurrency Personal Information Disaster Recovery Smartphones Politics Taxes Buisness Best Practice Time Management WPA3 Cyberattacks Mobility The Internet of Things Trending Search Favorites Hardware Computer Wearable Technology communications Update Vulnerabilities Error LiFi Permission How To Language Browser Recycling Hiring/Firing Printer Running Cable Remote Workers Procurement IT Technicians Software Travel Application Remote Worker Bandwidth Business Technology IT Support IT Budget VPN Identity Theft Gadgets Relocation Law Enforcement Competition Network Congestion Supercomputer Point of Sale USB End of Support Superfish Read Only Distributed Denial of Service Writing Robot Hosted Solution Electronic Health Records Hard Drives Chromebook Electronic Medical Records Uninterrupted Power Supply Training Gmail Presentation Experience Webcam Risk Management Motherboard Machine Learning Staffing Social Networking Cyber Monday Web Server Data Recovery Mirgation Authorization IT Services Avoiding Downtime Scary Stories Knowledge Professional Services Consultation Net Neutrality History Geography Hotspot Laptop Cybercrime Legislation Healthcare Hacker Paperless Office Education Router IT Support Identity Website Wasting Time Internet Exlporer Patch Management Virus Cost Management Social Engineering Public Cloud Google Storage Scam Internet of Things Users IT Consultant Solid State Drive Password Current Events Environment Enterprise Content Management Managing Stress PDF Unified Threat Management High-Speed Internet Multi-Factor Security Business Shortcut Technology Network Management Office Hacking Motion Sickness Identities Recovery Security Cameras Processors Technology Tips Settings Notes Information Unified Threat Management Google Calendar Comparison Cables Maintenance Unified Communications IT Consulting IT solutions Mobile Device Management Unsupported Software Mail Merge Tech Terms Business Management Remote Computing Government Cameras Specifications Sync Cabling Email G Suite Collaboration Administration GPS Compliance Google Drive Tip of the Week Touchscreen

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...