Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Fishing for Answers to Keep Phishing Attacks from Sinking Your Business

Fishing for Answers to Keep Phishing Attacks from Sinking Your Business

Phishing attacks have been in the social consciousness now for a while, and for good reason: it is the predominant way that hackers gain access to secured networks and data. Unfortunately, awareness to an issue doesn’t always result in positive outcomes. In this case, hackers get more aggressive, and by blanketing everyone under a seemingly limitless phishing net, 57 billion phishing emails go out every year. If a fraction of those emails accomplish their intended goal, the hackers on the other end of them really make out.

Continue reading
0 Comments

The SamSam Ransomware Is Absolutely No Joke

The SamSam Ransomware Is Absolutely No Joke

The funny thing about ransomware is that they give them very strange names: Bad Rabbit sounds like the name of a villainous bunny who gets his comeuppance in some type of modern nursery rhyme, not malware that would ravage hundreds of European businesses. Locky seems like the son of Candado de seguridad, a character Medeco would come up with to educate kids on proper physical security. The latest in a long line of funny-named ransomware, SamSam, isn’t a pet name for your pet ferret you perplexingly named Sam, it is one of the worst ransomware strains ever, and it has caught the attention of U.S. Federal law enforcement.

Continue reading
0 Comments

Securing Your Business from the Internet of Things

Securing Your Business from the Internet of Things

Now that the holidays have come and gone, you might have a couple of new gadgets in your home or office that connect to the Internet. Depending on what these gadgets are, you might have a serious security issue sitting right in front of you without realizing it. Some devices that don’t normally connect to the Internet--also known as Internet of Things devices (IoT)--aren’t as secure as you’d like them to be, particularly in a business environment.

Continue reading
0 Comments

Uber Demonstrates the Importance of Disclosing a Data Breach

Uber Demonstrates the Importance of Disclosing a Data Breach

If your business was breached, would it be better to keep it a secret, or should you disclose it to your clients? Uber has proven that trying to hide it is a mistake, and a costly one at that.

Continue reading
0 Comments

Looking Back at This Year’s Cybersecurity Issues

Looking Back at This Year’s Cybersecurity Issues

Every business in operation today needs to have some kind of comprehensive network security. Simply put, there are too many threats that can come in through an Internet connection for them to continue doing otherwise. The past year provides plenty of anecdotal proof of this fact, as a quick glance back can show.

Continue reading
0 Comments

Tech Term: Hacker

Tech Term: Hacker

The term “hacker” is possibly one of the best-known technology-related terms there is, thanks to popular culture. Properties like The Girl with the Dragon Tattoo and the Die Hard franchise have given the layman a distinct impression of what a hacker is. Unfortunately, this impression isn’t always accurate. Here, we’ll discuss what real-life hackers are like, and the different varieties there are.

Continue reading
0 Comments

Hackers Prey on Social Media Users

Hackers Prey on Social Media Users

Social media has been an emerging technology in recent years, and has produced many threats. Hackers have learned that they can take advantage of these communication mediums to launch dangerous new attacks on unsuspecting users. With enough ingenuity on a hacker’s part, they can potentially steal the identity of a social media user. Here are some of the best ways that your organization can combat identity theft through social media.

Continue reading
0 Comments

A New Perspective on Ransomware

A New Perspective on Ransomware

We are going to switch things up a bit and walk you through a retelling of a ransomware attack through the eyes of a business owner. Usually when we talk about these types of threats, we approach it from our perspective and talk about what you should do to prepare and what the threats are, but we wanted to try to show you what an event like this could feel like, for you, in your position, and in your own eyes. We hope that this will raise awareness of how crippling an event like this can be on your company, and we hope you let us know if this perspective helps you, your colleagues, and your staff get a more personal sense of what ransomware can do. Enjoy!

Continue reading
0 Comments

Why ROBOT is a Risk After Nearly 20 Years

Why ROBOT is a Risk After Nearly 20 Years

The Internet is rife with potential threats. Some are situational, but most are deliberate actions made by malicious entities who are trying to obtain any semblance of value from you or your company. Some of these exploits have been around longer than you’d imagine possible. This has been made evident by huge Internet-based companies such as PayPal and Facebook testing positive for a 19-year-old vulnerability that once allowed hackers to decrypt encrypted data.

Continue reading
0 Comments

Is Your Security Prepared to Stop a DDoS Attack?

Is Your Security Prepared to Stop a DDoS Attack?

If your business were to be struck by a Distributed Denial of Services (DDoS) attack, would it be able to recover in a timely manner? Do you have measures put into place to keep them from hampering your operations? While most organizations claim to have sufficient protection against these dangerous attacks, over half of them have simply proven to be ineffective against DDoS.

Continue reading
0 Comments

30 Schools Shut Down In Montana After Cyber Attack

30 Schools Shut Down In Montana After Cyber Attack

Students generally love it when classes are cancelled for whatever reason, but thanks to a cybercriminal group called TheDarkOverlord Solutions, a school in Flathead Valley, Montana was disrupted for an extended period of time. This downtime resulted in a disruption of operations for over 30 schools, as well as the threat to the personal information of countless teachers, students, and administrators due to a ransomware attack.

Continue reading
0 Comments

Charity Scams Are Very Real. Here’s How To Dodge Them

Charity Scams Are Very Real. Here’s How To Dodge Them

Dealing with disasters are a part of doing business. You know how difficult it is to recover from a devastating flood or storm. While businesses tend to suffer from these situations, countless individuals suffer every time a natural disaster hits. Just take a look at the United States in recent weeks. Even though you may want to donate to people suffering from hurricanes, there are illegitimate charities out there that want to make a quick buck off of your generosity.

Continue reading
0 Comments

The Most Popular Domains Make the Biggest Targets for Email Spoofing

The Most Popular Domains Make the Biggest Targets for Email Spoofing

Let’s say that you receive an email from a software vendor, say, Microsoft. When you are contacted by a major company like this, do you automatically assume that it’s secure, or are you skeptical that it’s a scam? Ordinarily, it might not seem like a big issue, but all it takes is one click on an infected attachment or malicious link to infect your business’s infrastructure.

Continue reading
0 Comments

Too Many Smart Devices Have Dumbed-Down Security Protocols

Too Many Smart Devices Have Dumbed-Down Security Protocols

In both the home and the business, security cameras are becoming more and more commonplace as a means of preserving security. However, some malware can turn these devices, and others, into cyber security threats.

Continue reading
0 Comments

Forget Reading Data, These Ingenious Hackers Listen to Data

Forget Reading Data, These Ingenious Hackers Listen to Data

Computing systems are always vulnerable to some obscure hack or another, and researchers are always trying to find ways to shore them up and prevent future attacks. One previously undiscovered hack literally sounds far-fetched. It uses the sounds that your hard drive makes to help a hacker steal data from your machine, including encryption keys designed to keep your data safe and secure.

Continue reading
0 Comments

A Zombified Botnet is as Scary as it Sounds

A Zombified Botnet is as Scary as it Sounds

Botnets are proving to be a difficult hurdle for security professionals, and it’s easy to understand why. Distributed Denial of Service attacks that can knock down servers or services, as well as hordes of remote-controlled zombie computers, are two of the most dangerous ways that hackers use botnets to serve their purposes. What can you do to protect your business from botnets?

Continue reading
0 Comments

Hackers Target Voter Information Databases to Steal Personal Data

Hackers Target Voter Information Databases to Steal Personal Data

Hackers are always getting their hands into sticky situations, but one of the hot topics in world politics--the 2016 United States presidential election--is one of the nastier ones in recent years. In the past few months alone, hackers have reportedly breached not only the Democratic National Committee, but have also infiltrated at least two state election databases.

Continue reading
0 Comments

This NSA Employee Made a Mistake. How Hackers Exploited it is Worrisome

This NSA Employee Made a Mistake. How Hackers Exploited it is Worrisome

One of the biggest hacks of 2016 was the United States National Security Agency, by a hacking group calling themselves the Shadow Brokers. This hack came to light after tools belonging to the NSA were discovered on the black market. How could a data breach of this magnitude happen to one of the most secure IT systems in the world? Newly released evidence may provide the answers.

Continue reading
0 Comments

Shhhh! Library of Congress Hacked

Shhhh! Library of Congress Hacked

Not since the British burned the Library of Congress to the ground in the War of 1812 has there been a more devastating attack on the famous library. Only this time, the recent attack was of the digital variety and King George III had nothing to do with it.

Continue reading
0 Comments

Some Evil Genius Just Combined the Pyramid Scheme With Ransomware

Some Evil Genius Just Combined the Pyramid Scheme With Ransomware

The ransomware machine keeps moving forward, despite significant opposition. In particular, the ransomware tag-team duo of Petya and Mischa have steamrolled most attempts to block them from accessing critical systems, always finding ways to outsmart security professionals. Now, these ransomwares have adopted a Ransomware as a Service model, which has made significant changes to the way that this ransomware is distributed.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Cloud Paperless Office IT solutions Wires Cortana Alert Connectivity Training Mobile Device Managment Administration Specifications Router Cabling Robot History Alerts Big Data Data Security eWaste Customer Service Cooperation Dark Web Software Tips Net Neutrality USB Saving Time VoIP BDR Company Culture Microsoft Employer-Employee Relationship Project Management Meetings Business Intelligence Professional Services Tablet Mobile Device Lenovo Google Experience Miscellaneous VPN Google Docs Network Congestion Machine Learning Mobile Devices Managed Service Provider Procurement Computer Care Scary Stories Emoji Retail Monitors LiFi Black Friday Running Cable Identity Theft Files Hacking Managed Services Provider Virtual Reality Webcam Operations PowerPoint OneNote Nanotechnology Public Speaking Regulations Firewall Hotspot Outlook Private Cloud Analytics Domains Business Technology IT service Networking Apple Software Unified Threat Management Remote Worker Smart Technology Telephony Asset Tracking Efficiency Deep Learning Bookmarks Education Environment Solid State Drive Virtual Desktop Technology Laws Save Time Vulnerabilities Disaster Resistance Notifications Privacy Artificial Intelligence Social Networking Consultation Social Engineering Wi-Fi Upgrades Trending Computing Competition Crowdsourcing Instant Messaging E-Commerce Computers iPhone Application Disaster Recovery Development Internet Exlporer Unified Communications Digital Payment Financial Cameras Augmented Reality Dark Data Hard Drive 5G Halloween Technology Tips Human Error Licensing Mobile Device Management MSP Touchscreen Collaboration Mouse HIPAA End of Support Buisness Typing Personal Information Hard Drives Legislation Cybercrime Windows 10 Website Web Server Relocation Star Wars Law Enforcement Spyware Virtual Private Network The Internet of Things Printer Remote Monitoring Data Breach Mobile Data Supercomputer Documents Websites Search Gadgets Health Mobile Taxes Analyitcs Hacks Antivirus Chromebook Tech Support Authorization Employee-Employer Relationship Hosted Solutions Unsupported Software Conferencing Lithium-ion Battery Monitoring Access Control Apps Managed IT services Tip of the Week CIO Document Management Error Notes Virus Presentation Facebook Piracy WPA3 Hackers Distributed Denial of Service Assessment Tech Terms Save Money Remote Monitoring and Management Office Windows 8 Break Fix Microsoft Excel Government Identity Spam IP Address Work/Life Balance CCTV Consulting Zero-Day Threat Information IT Technicians Money Hard Disk Drive Staffing Business Continuity Database Information Technology Microsoft Office Malware Mobile Office Data Language Managed Service ROI Tip of the week IT Support Password BYOD Social Managed IT Services Phishing Modem Bandwidth Communication Internet Storage Business Management IT Consultant Cloud Computing Marketing Redundancy Phone System Wireless Technology Data Management Troubleshooting Update Remote Computing Cybersecurity Android communications Statistics Travel Best Practices IT Budget Encryption Managed IT Identities Workplace Tips Bluetooth Two-factor Authentication Time Management Ransomware Administrator Point of Sale Sync Entrepreneur Compliance Intranet Downloads Undo Budget Mail Merge Network Management Scam IoT Email Electronic Medical Records Security IT Consulting Cost Management Chrome Read Only Smartphone Management Test Server Wasting Time Technology Saving Money Google Drive Migration Backup IT Support Software as a Service Operating System Maintenance Best Practice Display G Suite IT Services Backups Servers Managed IT Service Hiring/Firing Co-managed IT Physical Security Avoiding Downtime GPS Printing WiFi Settings Windows 7 VoIP Techology Telephone Systems Knowledge SharePoint Applications Heating/Cooling App Business Owner Wireless Botnet Sports Windows 10 Current Events Users Blockchain Alt Codes Black Market Backup and Disaster Recovery Laptop Outsourced IT Productivity Browser Public Cloud Virtualization Vendor Management Word Multi-Factor Security Social Media WannaCry Passwords Computer Authentication Finance Risk Management Superfish Server Management Cyber Monday Data loss Hardware User Tips Patch Management Cookies Employees Business Computing Smart Tech Google Maps Gmail Google Wallet Features Mobile Security Security Cameras Fun Proactive IT Data storage Customer Relationship Management Data Backup Mirgation Managing Stress Network Security Quick Tips Holiday Computer Repair SaaS Going Green RMM Automation How To Writing YouTube Hosted Solution Business Growth Refrigeration Digital Signature Hacker Screen Reader Innovation Content Filtering Twitter Uninterrupted Power Supply Wearable Technology Programming Enterprise Resource Planning User Computing Infrastructure Legal Disaster Business Vulnerability Staff Office Tips Upgrade Permission Cryptocurrency Shortcut 3D Printing User Error Safety How To Cyberattacks Consumers Help Desk Productivity Geography Chatbots Network Tech Term Samsung Firefox Small Business Virtual Assistant Google Calendar Cables Recovery Motherboard Permissions File Sharing High-Speed Internet Drones Bring Your Own Device PDF Downtime Electronic Health Records Utility Computing Motion Sickness Humor Mobility Tracking Processors Enterprise Content Management Voice over Internet Protocol Fleet Tracking IBM Unified Threat Management Data Warehousing Infrastructure Office 365 Corporate Profile Address Cache Politics Flexibility Bitcoin Theft Cleaning Fraud Smartphones Windows Internet of Things IT Management Mobile Computing Gadget Data Recovery Remote Workers Automobile Favorites Comparison Recycling Proactive Digital Healthcare

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...
QR-Code