Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Eliminate Webcam Worry With a Piece of Tape

Eliminate Webcam Worry With a Piece of Tape

Even webcams are susceptible to infestation from RATs, though they may not be the same creatures that haunt subway tunnels or dank basements. Remote Access Tools can be troublesome and, in some cases, invasive. RATs can be used to remotely access a computer and perform any number of functions, including turning on a device’s webcam.

Continue reading
0 Comments

AOL CEO Gets His Twitter Account Hacked and the Internet Responds Appropriately

AOL CEO Gets His Twitter Account Hacked and the Internet Responds Appropriately

Imagine that you are the CEO of a mass media organization whose Twitter has just been hacked and was now posting 20 spam-filled tweets every second. You’ve just put yourselves in the shoes of Tim Armstrong, CEO of now-Verizon-subsidiary AOL.

Continue reading
0 Comments

Think Your Business is Too Small to Get Hacked? Think Again!

b2ap3_thumbnail_hacked_pc_400.jpgMost computer users should practice the policy of ensuring optimal security on their PCs. To this end, assuming that you’ll be hacked (or at least targeted) at some point is pretty reasonable, as it allows you to plan ahead and take preventative actions. Still, there are plenty of people in the world who don’t care enough or worry enough to make security-minded decisions. Contrary to popular belief, there are countless ways that a hacker can take advantage of a hacked PC.

Continue reading
0 Comments

Now You Can Blame Hackers for Your Next Speeding Ticket

b2ap3_thumbnail_car_hack_400.jpgSince the dawn of the computing age, hackers have taken advantage of all sorts of tactics in order to crack systems and ruin lives. With the Internet of Things bringing connected devices from all over the place into the mix, there are more opportunities than ever to take advantage of unsuspecting users. In fact, even car computers are capable of being hacked.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Two-factor Authentication Laptop Cooperation Collaboration Data Recovery Heating/Cooling Physical Security Monitoring Antivirus Retail Passwords IT Consultant Cortana Email Webcam Apple Current Events Digital Augmented Reality Shortcut Software Authentication Financial Networking Employee-Employer Relationship User PowerPoint Network Management Emoji The Internet of Things Training Computer Repair Fun Cloud Computing Virtual Private Network Android Upgrades Development How To Smartphone Politics Google Maps Hacking Word Mobile Office File Sharing CCTV 3D Printing Digital Signature Project Management Recycling Backups End of Support Cybersecurity Domains Technology Laws Analytics Social Networking Programming Relocation Security Maintenance Avoiding Downtime Identity Theft Software as a Service User Tips Compliance Utility Computing Outlook Machine Learning Dark Data Hard Disk Drive GPS Internet Exlporer Personal Information Screen Reader How To Remote Worker WPA3 Consulting Healthcare Innovation Nanotechnology Star Wars Managed IT Services Wearable Technology Address Notifications Content Filtering Techology Gmail Knowledge 5G Bluetooth Apps WannaCry Unsupported Software Sync Managed Service Provider Customer Relationship Management Database Features Staff Chrome Settings Procurement Fleet Tracking SaaS Refrigeration Disaster Permission Trending Browser Spam Facebook Mobile Device Management Business Computing Big Data Enterprise Content Management Operating System Hosted Solution Infrastructure Environment Drones Spyware Human Error Statistics IP Address Malware Computer Care Health Travel Electronic Health Records Zero-Day Threat Efficiency Tech Term Software Tips Connectivity Uninterrupted Power Supply Alert Office 365 IT Budget Mobile Device Managment Privacy Point of Sale Telephone Systems Technology History PDF Microsoft Office Undo Mobile Device App Risk Management Gadget Mobile Devices Miscellaneous Mouse communications Money Going Green Scam Downloads Flexibility Save Money Paperless Office Tech Terms Blockchain Alerts Identities SharePoint Google Calendar Samsung Voice over Internet Protocol Servers Comparison Data Breach Managed IT Service Managed IT Hacks Router Business Continuity Cleaning Backup and Disaster Recovery Staffing Cloud RMM Government Windows 10 Education Marketing Cost Management Permissions Automobile Remote Monitoring and Management Multi-Factor Security Windows 7 User Error iPhone G Suite Microsoft Excel Taxes Printer Hard Drive Mail Merge Virtualization Cameras Google Docs Business Technology Holiday Conferencing Employees Supercomputer Sports Buisness Office Tips Touchscreen Read Only Time Management Language Google Meetings Alt Codes USB Corporate Profile E-Commerce Gadgets Black Friday Business Management Technology Tips BYOD Error Saving Money Microsoft Mirgation Network Congestion Piracy Motherboard Break Fix Safety Remote Monitoring Superfish Halloween Website Best Practice Migration Application Regulations Cybercrime Storage Files Cyberattacks Data storage Assessment Bookmarks VoIP IT Support Outsourced IT CIO Consultation Mobile Computing Tracking Internet of Things Tech Support Document Management Dark Web HIPAA Bitcoin Running Cable Firewall Virtual Assistant Hotspot Modem Office Botnet Patch Management Managed IT services Geography Wires Computers Legislation Cookies Data Backup IT service Chromebook Hosted Solutions Upgrade Business Intelligence IoT Smart Tech Social Documents Twitter Virtual Desktop VPN Work/Life Balance Operations Electronic Medical Records Cabling Theft Password Display Favorites Productivity Processors VoIP IBM Mobility LiFi Hacker Bandwidth Digital Payment Management Network Security Artificial Intelligence Budget WiFi Wireless Public Speaking Smart Technology Enterprise Resource Planning Crowdsourcing Vulnerability Cryptocurrency Tip of the Week Mobile Security Search Test Wi-Fi Applications MSP Customer Service Help Desk Hackers Notes IT solutions Update Business Growth IT Technicians Best Practices Computing Law Enforcement Private Cloud Mobile Data Black Market Disaster Resistance Server Management Lithium-ion Battery Information Technology Server Writing Company Culture Specifications Legal eWaste Windows 8 Data loss ROI Instant Messaging Social Engineering Wasting Time IT Consulting Troubleshooting Business Entrepreneur Cables Small Business Social Media Proactive IT Workplace Tips Hard Drives Encryption Unified Threat Management Analyitcs Professional Services Lenovo Licensing Hiring/Firing Ransomware Chatbots Virtual Reality Google Wallet Deep Learning Monitors Windows Tablet Bring Your Own Device Fraud Net Neutrality Managing Stress Proactive Computing Infrastructure Hardware Information Telephony Typing Managed Services Provider Computer Scary Stories Administrator Humor Finance Quick Tips Data Management Automation Recovery Unified Threat Management Access Control Public Cloud Presentation Saving Time Experience Co-managed IT Remote Workers IT Management Users Internet Tip of the week Solid State Drive Phone System Firefox Virus Intranet Managed Service Printing Data Warehousing OneNote Employer-Employee Relationship Business Owner Identity BDR Cyber Monday Distributed Denial of Service Remote Computing Vulnerabilities Competition Phishing Authorization Mobile Robot Consumers Administration Redundancy Cache Data Security IT Services High-Speed Internet Save Time Websites Communication Web Server Google Drive IT Support Network Vendor Management Wireless Technology Unified Communications Downtime Asset Tracking Data Smartphones Productivity YouTube Disaster Recovery Windows 10 Backup Security Cameras Motion Sickness

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code