Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hitman Email Scam Threatens Your Life, Instead of Your Data

Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.

Tags:
Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Information Technology Proactive Notifications Users Heating/Cooling Going Green Business Intelligence Environment Automobile Data Management Hard Drives Computers Saving Time Personal Information Networking Specifications Uninterrupted Power Supply Digital Signature How To Unsupported Software Refrigeration Vulnerabilities CCTV Virtual Reality Facebook Scam Technology Laws WiFi Managed Service Provider Microsoft Office Alerts Wearable Technology Regulations Intranet Break Fix Relocation Remote Computing Data loss Websites Conferencing Google Drive Business Management Quick Tips Save Money Fleet Tracking Miscellaneous Current Events Cabling Document Management Geography Telephony Legal Wireless Technology Chrome eWaste Identity Mirgation RMM Cookies Consulting Politics How To Employer-Employee Relationship Business Technology Bandwidth Tracking IT Consultant Bluetooth Marketing Network Settings Cybersecurity Hacker Mobile Device Managment Piracy App Data Warehousing Email IoT communications Backup Utility Computing Virtual Private Network Recovery Social Networking IT Technicians Experience Google Docs PowerPoint Touchscreen Remote Monitoring Machine Learning Cybercrime Artificial Intelligence Small Business Help Desk Enterprise Resource Planning Electronic Health Records Administration Applications Computer Care Employee-Employer Relationship Microsoft Phone System Data Recovery Mobile Monitoring Social Engineering Error Best Practices YouTube IT solutions Customer Service Remote Workers Upgrade Fun Compliance Windows 8 Workplace Tips Office Tips 5G Remote Monitoring and Management Holiday Cameras Cryptocurrency Wireless User Tips Administrator Security Distributed Denial of Service iPhone Tech Term Managed IT Services IT Support Files Knowledge Smart Tech Internet of Things Public Speaking Virtual Desktop End of Support Buisness SharePoint Outsourced IT Healthcare Bookmarks Monitors Authentication Safety Entrepreneur Gadgets Financial Android Drones Dark Data Managed IT Service Social Humor Operating System The Internet of Things Mouse Authorization Firewall Bring Your Own Device Hackers Scary Stories Downloads Employees Ransomware Firefox Google Wallet Best Practice Web Server Fraud Supercomputer Smartphones Health Wires Hosted Solutions Public Cloud Hacks Computer Black Friday Efficiency Spyware Sync Customer Relationship Management Cost Management Money Trending Business Continuity Tech Support Domains Hotspot Recycling Instant Messaging Meetings Twitter Management Multi-Factor Security VoIP Computer Repair Update Cooperation Software as a Service Nanotechnology Windows Collaboration Halloween Consumers Printer Privacy Apple Asset Tracking Hacking Staffing Business Owner Project Management High-Speed Internet Managed IT services Cloud Computing Consultation Webcam Servers Data Breach Samsung Motherboard Typing VoIP Retail IT Consulting Permissions Managing Stress Patch Management Server Management Software Net Neutrality Corporate Profile BDR Printing Spam IBM Finance Managed Services Provider Mail Merge Staff Encryption Save Time Windows 10 Taxes Password Operations Vendor Management Redundancy Storage WannaCry Virtualization Flexibility Innovation Connectivity Modem Paperless Office Internet Digital Payment PDF Security Cameras Data storage Windows 10 Access Control USB Robot Business Cache Hard Drive Productivity Gmail Private Cloud Wi-Fi Hard Disk Drive GPS Running Cable Tip of the week Avoiding Downtime Shortcut Licensing Identity Theft Point of Sale Mobile Security Writing Physical Security Managed Service Favorites Business Growth Address Two-factor Authentication Solid State Drive Upgrades User Error Disaster Processors Passwords IT Services Tip of the Week Big Data Mobility Cortana Analyitcs Budget Digital Technology Network Congestion IT Budget Human Error Competition Travel Black Market ROI HIPAA Disaster Recovery Application Government Browser File Sharing Identities Botnet Network Management Techology LiFi Backup and Disaster Recovery Company Culture MSP Google Maps Technology Tips Alert Data Security Crowdsourcing Disaster Resistance Gadget Laptop User Mobile Device Management Migration IT service IP Address Emoji Documents Legislation Language Information Read Only Server Sports Presentation Cables Enterprise Content Management Mobile Office Network Security Content Filtering E-Commerce Search Website Mobile Data Cyber Monday Data Telephone Systems Tablet Programming Infrastructure Lenovo Permission Superfish Managed IT Electronic Medical Records Outlook Social Media Downtime Hiring/Firing Undo Screen Reader CIO Procurement Vulnerability Assessment Augmented Reality Troubleshooting Chromebook Office Smart Technology Display Time Management Productivity Unified Threat Management Mobile Device 3D Printing Router WPA3 Business Computing OneNote Google Internet Exlporer Risk Management Dark Web Communication Data Backup Proactive IT Remote Worker Development Co-managed IT Lithium-ion Battery Statistics Training Cloud Zero-Day Threat Features Word Comparison Test Cleaning Blockchain Deep Learning Law Enforcement Motion Sickness Tech Terms Unified Threat Management Computing Infrastructure Software Tips Cyberattacks G Suite Virus Mobile Computing Work/Life Balance Saving Money Mobile Devices Backups Unified Communications Hosted Solution Bitcoin Apps Education VPN Microsoft Excel IT Management Alt Codes SaaS Automation Computing Star Wars Smartphone Malware Phishing Theft Chatbots History Office 365 Antivirus Analytics Hardware Google Calendar IT Support Maintenance BYOD

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code