Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Eliminate Webcam Worry With a Piece of Tape

Eliminate Webcam Worry With a Piece of Tape

Even webcams are susceptible to infestation from RATs, though they may not be the same creatures that haunt subway tunnels or dank basements. Remote Access Tools can be troublesome and, in some cases, invasive. RATs can be used to remotely access a computer and perform any number of functions, including turning on a device’s webcam.

Continue reading
0 Comments

AOL CEO Gets His Twitter Account Hacked and the Internet Responds Appropriately

AOL CEO Gets His Twitter Account Hacked and the Internet Responds Appropriately

Imagine that you are the CEO of a mass media organization whose Twitter has just been hacked and was now posting 20 spam-filled tweets every second. You’ve just put yourselves in the shoes of Tim Armstrong, CEO of now-Verizon-subsidiary AOL.

Continue reading
0 Comments

Think Your Business is Too Small to Get Hacked? Think Again!

b2ap3_thumbnail_hacked_pc_400.jpgMost computer users should practice the policy of ensuring optimal security on their PCs. To this end, assuming that you’ll be hacked (or at least targeted) at some point is pretty reasonable, as it allows you to plan ahead and take preventative actions. Still, there are plenty of people in the world who don’t care enough or worry enough to make security-minded decisions. Contrary to popular belief, there are countless ways that a hacker can take advantage of a hacked PC.

Continue reading
0 Comments

Now You Can Blame Hackers for Your Next Speeding Ticket

b2ap3_thumbnail_car_hack_400.jpgSince the dawn of the computing age, hackers have taken advantage of all sorts of tactics in order to crack systems and ruin lives. With the Internet of Things bringing connected devices from all over the place into the mix, there are more opportunities than ever to take advantage of unsuspecting users. In fact, even car computers are capable of being hacked.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Specifications Alert Robot eWaste Paperless Office Data Recovery Consulting Data storage Conferencing Spam Scary Stories Hard Disk Drive PowerPoint Cabling Cleaning iPhone Emoji Office 365 Writing Chatbots Notifications Physical Security Twitter Website Software Tips Development Data Security Holiday User Tips Gadget Data Management Digital Payment Company Culture Cables Ransomware LiFi Augmented Reality Windows 8 Competition Bluetooth WiFi Compliance Fleet Tracking Analyitcs Information Technology How To HIPAA Cloud Downtime Business Continuity Remote Worker Redundancy Halloween Humor Computing Employee-Employer Relationship Test Law Enforcement 3D Printing Relocation Public Speaking Internet of Things Microsoft Address Saving Money Unified Threat Management Flexibility Windows Telephony Education Managed Service Buisness IT Technicians Social Media Hosted Solutions Google Docs IT solutions Health How To Chromebook Dark Web Time Management Supercomputer Technology Data loss Government Theft App Hotspot Technology Laws Legislation Electronic Health Records Bookmarks IoT Proactive IT Computer Repair Recovery Features Solid State Drive History Automobile Error communications Mobile Office Communication Black Market Meetings Network Screen Reader Smart Technology Zero-Day Threat Customer Relationship Management Disaster Resistance Machine Learning Finance Best Practice CIO Servers Innovation Business Growth Money Knowledge Troubleshooting Scam Mouse Fraud Travel Consultation Help Desk Information IBM Printer Printing Documents Read Only Corporate Profile Lenovo USB RMM Hard Drives 5G Operations Typing Hardware Business Intelligence User Vulnerability Data Warehousing Best Practices E-Commerce Artificial Intelligence WPA3 SharePoint Computers User Error Blockchain Cameras Virtualization Save Time IT Consultant Public Cloud Smartphones Backup Refrigeration Cortana Webcam Shortcut Laptop PDF Motion Sickness Domains Chrome Microsoft Office Server Management Automation Comparison Politics Storage G Suite Legal Router Consumers Content Filtering Regulations Security Cameras Business Computing Windows 10 Cybercrime Apple Administration IP Address Business Owner Bring Your Own Device Managed IT Services Unified Communications Facebook VPN Remote Computing Quick Tips Mobile Device Management Remote Monitoring Unified Threat Management Privacy YouTube Customer Service Outlook Server Work/Life Balance Users Hard Drive Wireless Technology IT Services Google Calendar Apps Gmail Office Modem Piracy Star Wars Black Friday Mobile Backups Hiring/Firing Network Security Operating System Utility Computing Antivirus Managed IT Service Smartphone Instant Messaging Sync BYOD Business Data Breach Virtual Reality Geography IT Management Lithium-ion Battery Technology Tips Search Human Error Computer Monitoring Assessment Permission Recycling Mobile Computing Cybersecurity Managed Service Provider Statistics Techology Managing Stress High-Speed Internet Mobile Device File Sharing Cryptocurrency Managed IT Procurement Asset Tracking Favorites Collaboration Software as a Service Hacker Wireless Network Management Managed IT services Big Data Environment Word Financial MSP Staffing Networking Identities Websites Point of Sale Break Fix Trending Gadgets Private Cloud Staff Proactive Tablet IT Support Wearable Technology Cloud Computing Wi-Fi Microsoft Excel Mobile Devices Maintenance Superfish Firefox Digital Social Disaster Recovery Tech Terms VoIP Vulnerabilities Training Web Server Employer-Employee Relationship Going Green Upgrade Save Money Mail Merge Unsupported Software Telephone Systems Productivity Tip of the week Licensing Patch Management Language Smart Tech Electronic Medical Records Mirgation Samsung Dark Data Virus Tip of the Week Risk Management Phone System Deep Learning Cost Management Cooperation Mobile Device Managment Social Networking Remote Workers Malware Identity Motherboard Office Tips Internet Document Management Firewall Remote Monitoring and Management Personal Information Files Entrepreneur Digital Signature Intranet Current Events Email Vendor Management Security Cache Encryption Fun Computing Infrastructure Browser Software Undo Network Congestion Spyware Internet Exlporer Hosted Solution Social Engineering Tech Term Access Control Marketing Alerts Safety Small Business Saving Time IT service Hacks OneNote Managed Services Provider Update IT Support Bandwidth Windows 10 Touchscreen Application Productivity Nanotechnology ROI Authorization Botnet Cookies Google Maps Enterprise Resource Planning Permissions The Internet of Things Tech Support Cyber Monday Co-managed IT Business Management Two-factor Authentication Alt Codes Programming Multi-Factor Security Healthcare IT Budget Net Neutrality Monitors Taxes Processors Retail Efficiency Phishing Wires Workplace Tips Bitcoin Computer Care Crowdsourcing Cyberattacks End of Support Identity Theft WannaCry Applications Analytics Management Settings Virtual Private Network VoIP Avoiding Downtime Migration Employees Enterprise Content Management Heating/Cooling Passwords Mobile Data Backup and Disaster Recovery Administrator Tracking Project Management Business Technology Mobile Security Sports Hackers Connectivity Password Android CCTV Data Google Drive Distributed Denial of Service Hacking BDR Outsourced IT Drones GPS Upgrades Google Authentication Uninterrupted Power Supply Virtual Desktop Data Backup Disaster IT Consulting Downloads Presentation SaaS Running Cable Budget Miscellaneous Google Wallet Mobility Experience Infrastructure Display

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code