Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What Hackers Are Looking For On Your Network

What Hackers Are Looking For On Your Network

When a hacker tries to infiltrate your network, they are doing so with a purpose in mind. Usually they are looking for specific information, like account credentials, personal information, or files that can be used to blackmail victims. Regardless, we’ll go over what a hacker can do with the information that they collect from you, and how you can best protect it from them.

Continue reading

The FBI Warns That DDoS Attacks are On the Rise

b2ap3_thumbnail_ddos_prevention_400.jpgIf you feel that there’s an increase in ransomware activity, don’t worry; it’s not just you. Hackers are now taking greater advantage of ransomware, a threat that locks down files and returns them in exchange for a payment. This is wreaking havoc on the computing world. Even the FBI has acknowledged the threat, and has issued a warning that the most likely type of cyber extortion users will encounter is probably going to be DDoS attacks.

Continue reading

Find Out What the Word “Hack” and Medieval Horses Have In Common

b2ap3_thumbnail_hacker_attacker_400.jpgIn today’s society, we throw the word “hack,” around without a second thought. This is especially true in the realm of cyber security for businesses. Have you ever taken a moment to think about why the term “hacker” was chosen as the title for those who partake in sketchy online activity? What exactly makes a hacker, a hacker?

Continue reading

Winter is Coming: Dyre Wolf Malware Can Leave Your Bank Account Looking Stark

b2ap3_thumbnail_phishing_attack_400.jpgWith the critically-acclaimed television series, Game of Thrones returning to viewers this spring, it seems apt to discuss a manner of hacking attack called Dyre Wolf. This particular threat is just as fierce as its name implies, and can potentially cost businesses between $500,000 to $1.5 million per attack. It takes advantage of a multi-step phishing process, and your employees should understand how to avoid attacks like these.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Server BDR Antivirus Google Calendar Knowledge Big Data Computers User Technology Permissions Backup Enterprise Content Management Google Drive Zero-Day Threat Proactive Specifications Wireless Technology Social Networking Google Digital Managed IT Services Firefox Phone System End of Support Cloud Computing Office Tips Cybersecurity Tip of the Week Operating System Sync Solid State Drive Productivity Tracking Star Wars Data storage Network Management Virus WannaCry Consumers Training Uninterrupted Power Supply Cables Physical Security Backup and Disaster Recovery 5G Unified Communications Computing Chrome Downloads Gadget User Error Bitcoin Bring Your Own Device Chatbots IBM Lenovo Office Supercomputer Firewall Technology Tips Small Business Monitors Digital Payment Personal Information PowerPoint Drones 3D Printing Saving Money Settings Undo Paperless Office Blockchain PDF VoIP Corporate Profile Microsoft Excel Programming Digital Signature Electronic Health Records Wearable Technology Security Cameras Business Technology Features Fraud Innovation communications Remote Monitoring Utility Computing Running Cable Upgrades Spam How To Authorization Current Events Legal Cabling Mobile Data ROI Bandwidth Office 365 Meetings Outsourced IT IT Technicians Windows 10 App Employee-Employer Relationship Hard Disk Drive Access Control Environment Writing Network Congestion Shortcut How To Scary Stories Cooperation Document Management Read Only Assessment Intranet Information IP Address Upgrade Politics Mobile Device Management Black Market Laptop Windows 7 Halloween Save Money Software as a Service Workplace Tips Collaboration Mobile Computing Hackers Voice over Internet Protocol SharePoint Windows 10 Microsoft Office Saving Time Printer Cookies Computer Apps Files Cyber Monday Google Maps YouTube Security Domains Entrepreneur Mobility Quick Tips IT Support Update Save Time Tablet Managed Service VPN Hacks Authentication Sports Data Managed IT services Data loss Artificial Intelligence Hacking Lithium-ion Battery Nanotechnology Wi-Fi Conferencing Webcam Procurement Law Enforcement RMM Data Security Recovery Mobile Modem Instant Messaging Wasting Time High-Speed Internet Money Infrastructure Managed IT IT solutions Employer-Employee Relationship Vendor Management IT Management Smartphone Cache Users OneNote Dark Web Miscellaneous Wires Cloud Holiday LiFi Best Practice Employees Database Operations Remote Workers Public Cloud Cyberattacks Monitoring Fleet Tracking Virtual Reality Managing Stress Marketing Business Owner Retail Augmented Reality Data Management Vulnerabilities eWaste Crowdsourcing Business Continuity Emoji Telephony Automobile The Internet of Things Presentation Typing Travel Notes IT Consulting Content Filtering Screen Reader Identity Google Wallet Tech Terms Privacy User Tips Phishing IT Support WPA3 Time Management Distributed Denial of Service Passwords Dark Data Licensing Budget Financial Network Security E-Commerce Unified Threat Management Net Neutrality Statistics Legislation Mobile Device Managment Flexibility Identities Cryptocurrency Compliance Fun Smart Technology Hosted Solution Education Outlook Asset Tracking Recycling Social Migration Analytics CCTV Business Intelligence Tip of the week HIPAA Data Backup Software Tips VoIP Application USB Language Techology Virtualization Cortana Remote Monitoring and Management Cost Management Best Practices Proactive IT File Sharing Error Remote Worker Mobile Office Windows Staffing Samsung Cleaning Refrigeration Alt Codes Permission Facebook WiFi Servers Robot Password Bluetooth Humor Vulnerability Break Fix Going Green Geography Finance Buisness Hiring/Firing Regulations Taxes Email Automation Risk Management Software Two-factor Authentication Machine Learning Virtual Assistant Gadgets Telephone Systems Mobile Security G Suite Hacker Botnet Redundancy Help Desk IT Budget GPS Alerts Data Breach Professional Services Cameras Remote Computing IT service Project Management Maintenance Printing Managed IT Service Gmail Black Friday Wireless Avoiding Downtime Display Mail Merge Patch Management Social Media Business Tech Term Efficiency Server Management Hosted Solutions Business Management IT Services Notifications Google Docs Twitter Staff Applications Android Disaster Recovery Alert Router Relocation Favorites Web Server Point of Sale Customer Relationship Management Managed Services Provider History Disaster Resistance IoT Downtime Competition Unsupported Software Public Speaking Deep Learning Internet Business Growth Human Error Processors Virtual Desktop Internet of Things Word Government Work/Life Balance Computer Repair Co-managed IT Healthcare Business Computing Analyitcs Comparison Websites Mirgation Social Engineering Electronic Medical Records Computing Infrastructure Consultation Hard Drives Scam Ransomware Browser Hotspot Hard Drive Managed Service Provider Consulting Storage Safety Network Connectivity Motherboard Chromebook Apple Smart Tech Experience Test Mobile Devices Search Superfish CIO Administration Piracy Heating/Cooling Microsoft Data Warehousing Development Productivity Virtual Private Network Technology Laws SaaS Administrator Trending Data Recovery iPhone Encryption Bookmarks Documents Enterprise Resource Planning Internet Exlporer Company Culture Disaster Troubleshooting MSP Management Multi-Factor Security IT Consultant Spyware Website Networking Hardware Customer Service Identity Theft Communication Computer Care Malware Private Cloud Smartphones Address Windows 8 Health Unified Threat Management Backups Information Technology Touchscreen BYOD Mouse Motion Sickness Tech Support Mobile Device Cybercrime Theft

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...