Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Gift Card Scam Making Problems for Holiday Shoppers

Gift Card Scam Making Problems for Holiday Shoppers

As the modern gift certificate, the gift card has become an institution, especially around the holidays. Thousands of companies offer statically-priced and reloadable gift cards. With that much cheddar flying around it isn’t a surprise that there is big business in gift card theft. The FTC has stated that gift card scams are up a whopping 270 percent since 2015. With so much money at stake, keeping yourself out of the way of the scammers has to be priority one.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Managed Services Provider Customer Service Law Enforcement Going Green Access Control Government Vulnerabilities Financial Recovery Crowdsourcing Writing Proactive IT Firefox Disaster Resistance Google Analyitcs Disaster Recovery Backup Bring Your Own Device Bluetooth Office 365 CCTV BDR Nanotechnology Router Permissions Mobile Data Geography Administration Big Data Motion Sickness Antivirus Public Speaking Security Mobile Devices Network Operating System 3D Printing Superfish Cleaning IoT Cortana Taxes Data Breach Unsupported Software Address Compliance Mobile Multi-Factor Security Servers Travel Encryption Augmented Reality Webcam Test Scary Stories IT Support Browser Cyberattacks Employees Digital Signature Outsourced IT Smart Technology Microsoft Finance Consumers Specifications Microsoft Office Robot Processors Spyware Computer Repair Statistics Connectivity Running Cable Patch Management Cloud Office Hacks Features Paperless Office Digital Remote Monitoring and Management Hacker Samsung Deep Learning Best Practice Hacking Enterprise Content Management eWaste Consultation Maintenance Wires Budget Co-managed IT WannaCry Piracy Managing Stress Firewall Hiring/Firing Backup and Disaster Recovery Mobile Office Software Tips Privacy Android Knowledge Machine Learning Innovation Analytics Domains Virtual Private Network Training Technology Laws SharePoint Buisness Troubleshooting Mobile Device Network Security Business Management Alert Cybercrime Microsoft Excel Gadgets Instant Messaging Workplace Tips Identities Management Files Star Wars Server Halloween Scam Malware Save Money Cookies Refrigeration Regulations Alerts Redundancy Cooperation How To Applications Wearable Technology Development Storage Entrepreneur Managed IT Work/Life Balance Error communications Recycling Users CIO Computing Information Procurement Experience Employee-Employer Relationship User Error ROI Windows IT solutions Data storage Network Congestion Hackers Supercomputer Computers Ransomware Environment Language Computer Care Monitoring E-Commerce Lenovo Politics Saving Money Backups Retail Help Desk YouTube Holiday Cameras Techology Undo Virtual Desktop GPS Hotspot Safety USB Cables Hard Drive 5G Health Assessment Productivity Blockchain Point of Sale Google Wallet Virtualization Bandwidth RMM Bitcoin Internet Tech Terms Zero-Day Threat Humor Cyber Monday Mobile Security Unified Threat Management Mobility Printer Collaboration Twitter Laptop Disaster Sync Cybersecurity Settings Outlook Downtime Printing Information Technology Internet of Things Business Technology Managed IT Service Technology IT service Comparison Security Cameras Project Management Legal WPA3 Chatbots IT Services Utility Computing IP Address Favorites Social Engineering Mail Merge Theft IT Technicians Communication Intranet Spam Dark Data Email Managed Service Technology Tips Programming IT Consulting Vulnerability Unified Threat Management Software Personal Information Web Server Data Backup Business Continuity Digital Payment Internet Exlporer SaaS Miscellaneous Wireless Technology Tablet Computing Infrastructure Infrastructure Google Maps Relocation Document Management Vendor Management Motherboard Quick Tips Touchscreen Heating/Cooling Conferencing Screen Reader Automobile Managed Service Provider Fraud Tracking Phishing Remote Worker Wireless Fleet Tracking IT Budget Cache Mobile Device Managment Modem IT Consultant Public Cloud Lithium-ion Battery Virus Authorization LiFi Read Only Smartphone Corporate Profile Licensing How To Search Tech Support Business Owner Smartphones Password Upgrade Mirgation Google Calendar Marketing Competition Server Management Permission Legislation IT Support Customer Relationship Management Upgrades IBM Windows 8 Notifications Distributed Denial of Service Break Fix Remote Workers High-Speed Internet User Trending Flexibility Telephone Systems Operations Apple Mobile Computing Productivity Data Security Saving Time Business Intelligence Meetings Tip of the week VPN Cost Management Risk Management Efficiency Black Market Sports Hard Disk Drive Content Filtering Employer-Employee Relationship Monitors Downloads Wi-Fi Electronic Medical Records Staffing Dark Web Automation Computer Authentication BYOD Chrome Business Growth Data Management IT Management Cabling Windows 10 Identity Theft Current Events G Suite Tip of the Week Gmail Mobile Device Management Education Smart Tech Chromebook Proactive Uninterrupted Power Supply Money Solid State Drive Network Management Staff Small Business Shortcut Social The Internet of Things Hardware Business Computing Data Recovery Google Docs Private Cloud Business Software as a Service Bookmarks Electronic Health Records Fun Windows 10 Phone System Black Friday Websites Company Culture HIPAA Google Drive Hard Drives Mouse Managed IT Services Website WiFi Managed IT services Unified Communications Data loss PDF Botnet Data Warehousing End of Support Presentation Artificial Intelligence Office Tips Net Neutrality Social Media Typing Asset Tracking Remote Monitoring Emoji PowerPoint Hosted Solution Healthcare Save Time App Migration Data Hosted Solutions Best Practices Word Facebook Enterprise Resource Planning Tech Term Drones Documents Apps iPhone VoIP Two-factor Authentication Passwords MSP File Sharing Alt Codes User Tips Virtual Reality Telephony Update Human Error Application OneNote Identity Networking Cloud Computing Physical Security History VoIP Gadget Social Networking Cryptocurrency Consulting Remote Computing Avoiding Downtime Administrator Display Time Management

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code