Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hitman Email Scam Threatens Your Life, Instead of Your Data

Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

CIO Project Management Physical Security Machine Learning Business Intelligence IT Support Sync Phone System Operations Automation Privacy Utility Computing Motion Sickness Language Access Control Cybersecurity End of Support Crowdsourcing Monitors Tech Support Save Money Cybercrime Black Friday Chatbots Software as a Service Documents Environment Word Customer Service Emoji Internet of Things Outsourced IT Virtual Private Network Administrator Cleaning Address Big Data Redundancy Update Productivity Disaster Resistance Search Undo Storage IT Services Apple Cabling IT service Alerts Taxes Data Security Proactive IT Health Email Wireless Technology Work/Life Balance Windows 7 Social Networking Analytics Small Business BYOD Business Management Favorites Operating System Humor Bitcoin Microsoft Excel Electronic Medical Records Employees Touchscreen Sports Wireless Software Read Only Hard Drive Unified Threat Management WiFi YouTube Customer Relationship Management Proactive Vulnerabilities Infrastructure Experience Content Filtering Virtualization Cables Bring Your Own Device Help Desk Flexibility Encryption IT Consulting Cameras Enterprise Resource Planning Law Enforcement Remote Worker Hackers Network Tip of the Week Alt Codes IP Address Virtual Assistant Vendor Management Office Disaster Recovery Business Paperless Office Test Google Docs Dark Web 3D Printing Spyware Mobile Computing Google Drive Marketing Cloud Computing Zero-Day Threat Wearable Technology Artificial Intelligence Bluetooth Government Collaboration Intranet Web Server Files Hard Drives Security Cameras Cloud Drones Break Fix Upgrade Mirgation Social Office 365 Best Practices Staffing Webcam ROI High-Speed Internet File Sharing Management WannaCry Patch Management Digital Payment Money Hacks Notifications Blockchain User Tips Notes Cache Network Congestion Windows Cost Management Solid State Drive Distributed Denial of Service Knowledge Internet Exlporer The Internet of Things Managed IT Mobile Device Budget Lithium-ion Battery Safety IBM Smart Technology Business Owner VoIP Time Management Server Management Microsoft Office Hacker Virtual Reality eWaste Disaster Programming Technology Laws LiFi Downtime Mail Merge Legal Piracy Firewall Wasting Time Recovery 5G Supercomputer Monitoring Mobile Devices Consultation IT Support Statistics Samsung Analyitcs Information Technology WPA3 Smartphone Politics OneNote Entrepreneur User Error Migration Remote Monitoring and Management Multi-Factor Security E-Commerce Business Growth Save Time Compliance Current Events Recycling Data storage Computers Digital Signature Cookies Presentation Hiring/Firing Retail Vulnerability Data Warehousing Theft Remote Computing Saving Money Gmail Apps Tech Terms Smart Tech Internet Backup Cryptocurrency Efficiency Printing Managed IT Services Voice over Internet Protocol Conferencing Fun Geography Upgrades SaaS User Electronic Health Records Backup and Disaster Recovery Security Trending Augmented Reality Database Writing Mobile Security IT Management Fleet Tracking Mobility Telephony Gadget Corporate Profile Saving Time Windows 10 Quick Tips Cyberattacks Co-managed IT Domains Nanotechnology Computer Care Technology Tips Data Backup Troubleshooting Mobile Office Running Cable Public Cloud Hard Disk Drive Staff Shortcut Wi-Fi Hotspot Travel CCTV Chromebook Telephone Systems Dark Data Comparison USB Business Computing Spam Computer Uninterrupted Power Supply Relocation Servers Applications IT solutions Microsoft Identities Innovation Processors Authorization Training Typing Competition Software Tips Remote Monitoring Social Engineering Passwords Techology VoIP Backups Unified Communications Two-factor Authentication Private Cloud Wires Tablet Mobile Device Managment Automobile Twitter Employer-Employee Relationship Google Calendar Risk Management BDR How To Consulting Information IT Budget Antivirus Halloween Employee-Employer Relationship Google Technology SharePoint Password Mobile Data Downloads Smartphones Hacking Regulations GPS Net Neutrality Managed IT services Remote Workers Google Wallet Settings Hosted Solution Cooperation Permission Windows 8 Networking Digital Network Security Laptop Asset Tracking Productivity Document Management Chrome G Suite Website Communication Gadgets Black Market Network Management Education Permissions Malware Financial Refrigeration Connectivity PowerPoint Buisness Users Cortana Unified Threat Management Social Media Error Browser App Legislation Android Consumers Fraud Managing Stress Robot Heating/Cooling Scam Display iPhone Bandwidth Administration How To Procurement History Point of Sale Holiday Healthcare Data Recovery Instant Messaging Firefox Facebook Finance IoT Assessment Unsupported Software Server Data Breach IT Technicians Managed Service Provider Miscellaneous Human Error Tech Term Professional Services Public Speaking Scary Stories Business Technology Router Mobile Device Management Licensing HIPAA Tip of the week Managed Services Provider Data MSP Office Tips IT Consultant Alert Computing Enterprise Content Management Motherboard Outlook Specifications Hosted Solutions Application Bookmarks Cyber Monday Hardware Mobile Computing Infrastructure Lenovo Virus Managed IT Service Personal Information Going Green Star Wars Identity Theft Superfish PDF Identity Company Culture Meetings Botnet Tracking Screen Reader Virtual Desktop Authentication Websites Avoiding Downtime Ransomware VPN Deep Learning Google Maps Modem Printer Best Practice Computer Repair Development Data Management Managed Service Windows 10 Data loss Phishing Features Business Continuity Maintenance Workplace Tips RMM Mouse communications

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...