Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Gift Card Scam Making Problems for Holiday Shoppers

Gift Card Scam Making Problems for Holiday Shoppers

As the modern gift certificate, the gift card has become an institution, especially around the holidays. Thousands of companies offer statically-priced and reloadable gift cards. With that much cheddar flying around it isn’t a surprise that there is big business in gift card theft. The FTC has stated that gift card scams are up a whopping 270 percent since 2015. With so much money at stake, keeping yourself out of the way of the scammers has to be priority one.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Mobile Office Technology High-Speed Internet Administration Finance Mail Merge Employer-Employee Relationship Server Management Security Cameras Customer Relationship Management Conferencing Administrator Undo Physical Security Phone System G Suite Identities Remote Worker Information Scam Passwords Travel Migration PowerPoint Cabling Black Friday IT Consultant OneNote Training Electronic Health Records Hiring/Firing Gadgets Healthcare Business Big Data Nanotechnology Smartphone Work/Life Balance Crowdsourcing Save Money Uninterrupted Power Supply Avoiding Downtime Encryption Infrastructure USB Collaboration Risk Management Public Cloud Smart Tech Google Software Hard Drive Samsung Unsupported Software Computing Microsoft Excel Data Breach IBM Best Practices BDR Internet of Things Best Practice Law Enforcement Cryptocurrency Human Error Unified Threat Management Managed Service Geography Tablet Identity Theft Cooperation Tip of the Week Buisness WannaCry Mobile Data Asset Tracking Websites ROI Apple Connectivity Wireless Consumers IT solutions Managed IT services Windows Monitoring Software as a Service Password HIPAA Hotspot Sync Computer Repair Address Shortcut Hosted Solution Information Technology Miscellaneous Augmented Reality Windows 10 Government Operating System Voice over Internet Protocol Technology Tips Browser Entrepreneur Experience Chromebook Social GPS YouTube Personal Information Remote Monitoring and Management Facebook Networking Deep Learning Laptop Firefox Monitors Tech Term Retail Features Humor Computer Care Android Staffing Domains Identity Education Upgrade Lenovo User Tips Virtual Reality IT Budget Test Notes Motherboard Emoji Network Management Robot Managed Services Provider Mobile Device Managment Comparison Bring Your Own Device Motion Sickness Disaster Unified Threat Management Spyware Access Control Employee-Employer Relationship Mobile Security Downloads Hard Disk Drive Alert MSP Wearable Technology Permission IT Services Competition Disaster Resistance Router Computers Redundancy Technology Laws Assessment Enterprise Resource Planning Staff Phishing Google Drive Legal Virus Google Maps Business Growth Hard Drives Cables Recycling Zero-Day Threat SharePoint Google Docs Multi-Factor Security Two-factor Authentication Private Cloud Read Only Wireless Technology Statistics PDF Servers Help Desk Users Spam Ransomware Unified Communications Bluetooth Microsoft Operations Tech Support Malware Office 365 Utility Computing The Internet of Things Business Management IT Support Cyber Monday Applications Lithium-ion Battery Touchscreen communications Network Automobile Enterprise Content Management Cache Botnet Social Networking History Machine Learning Software Tips Patch Management Marketing Twitter Proactive Vulnerability Data End of Support Paperless Office Analyitcs Mouse Co-managed IT Content Filtering Employees Smart Technology Network Security Environment Vulnerabilities Saving Time Language Printing How To Business Intelligence Procurement IT Technicians Automation Data Warehousing Permissions Fleet Tracking Database Mobile Computing User Cybercrime Development LiFi E-Commerce Typing Time Management Windows 10 Webcam Running Cable Cameras IT Management Cybersecurity Wi-Fi Bandwidth Social Media Politics Virtual Assistant Bookmarks Office Tips Cookies Authorization Remote Monitoring Consultation 5G File Sharing Public Speaking Trending Notifications Proactive IT Windows 8 Consulting Hosted Solutions Documents Storage Remote Computing Cyberattacks Printer Superfish Halloween Artificial Intelligence Chatbots Innovation Professional Services Cleaning Licensing Internet Data Management Favorites Backup Web Server eWaste Relocation Knowledge Data Recovery Save Time Tip of the week Word Alerts Dark Web IT Support Backup and Disaster Recovery Taxes Digital Payment Corporate Profile Holiday WPA3 Theft Mobile Device Management Wasting Time Update Hardware Specifications Hacking Small Business Quick Tips Going Green Managing Stress Fun Firewall Virtual Private Network Files Flexibility Fraud Windows 7 Processors Regulations Company Culture Backups Website Cloud Computing Budget Digital Presentation Meetings Managed IT Services Google Calendar BYOD CIO Mobile Devices Alt Codes Supercomputer Drones Mobile Device Gadget VoIP Legislation Managed IT Data storage VPN Application 3D Printing Outlook Email App Data Security IT service Instant Messaging Current Events Business Computing Writing Virtual Desktop Network Congestion Management Telephony Business Technology Data loss Break Fix Customer Service Wires Server Programming Google Wallet Troubleshooting Piracy Refrigeration Mirgation Vendor Management Mobility Social Engineering Mobile Downtime Screen Reader Error Intranet Managed Service Provider Digital Signature Telephone Systems Cost Management Computing Infrastructure How To Computer Office Gmail Workplace Tips Safety Document Management Modem Managed IT Service Authentication Business Continuity Hacker Bitcoin Productivity Security Business Owner Communication Net Neutrality WiFi Recovery User Error Hackers Dark Data Techology Data Backup Maintenance Cortana VoIP iPhone Internet Exlporer Distributed Denial of Service Microsoft Office Black Market Heating/Cooling Tracking Search IP Address Scary Stories Electronic Medical Records Solid State Drive CCTV Productivity SaaS Blockchain Hacks Point of Sale Antivirus Tech Terms Display Apps Sports RMM Financial Health Compliance Disaster Recovery Settings Efficiency Analytics Star Wars Remote Workers Smartphones Virtualization IoT IT Consulting Project Management Cloud Money Privacy Upgrades Saving Money Chrome Outsourced IT

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...
QR-Code