Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What Hackers Are Looking For On Your Network

What Hackers Are Looking For On Your Network

When a hacker tries to infiltrate your network, they are doing so with a purpose in mind. Usually they are looking for specific information, like account credentials, personal information, or files that can be used to blackmail victims. Regardless, we’ll go over what a hacker can do with the information that they collect from you, and how you can best protect it from them.

Continue reading
0 Comments

The FBI Warns That DDoS Attacks are On the Rise

b2ap3_thumbnail_ddos_prevention_400.jpgIf you feel that there’s an increase in ransomware activity, don’t worry; it’s not just you. Hackers are now taking greater advantage of ransomware, a threat that locks down files and returns them in exchange for a payment. This is wreaking havoc on the computing world. Even the FBI has acknowledged the threat, and has issued a warning that the most likely type of cyber extortion users will encounter is probably going to be DDoS attacks.

Continue reading
0 Comments

Find Out What the Word “Hack” and Medieval Horses Have In Common

b2ap3_thumbnail_hacker_attacker_400.jpgIn today’s society, we throw the word “hack,” around without a second thought. This is especially true in the realm of cyber security for businesses. Have you ever taken a moment to think about why the term “hacker” was chosen as the title for those who partake in sketchy online activity? What exactly makes a hacker, a hacker?

Continue reading
0 Comments

Winter is Coming: Dyre Wolf Malware Can Leave Your Bank Account Looking Stark

b2ap3_thumbnail_phishing_attack_400.jpgWith the critically-acclaimed television series, Game of Thrones returning to viewers this spring, it seems apt to discuss a manner of hacking attack called Dyre Wolf. This particular threat is just as fierce as its name implies, and can potentially cost businesses between $500,000 to $1.5 million per attack. It takes advantage of a multi-step phishing process, and your employees should understand how to avoid attacks like these.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Social Engineering File Sharing Alt Codes Technology Laws OneNote Infrastructure Data Backup Backup Travel Managed IT Data Security Smart Technology iPhone Time Management Remote Monitoring Monitoring Firewall Halloween Word Virtual Private Network Mobile Device Management Mobile Devices Computer Downloads Social Media Screen Reader Permissions Microsoft Office Android communications PDF Conferencing Application Hackers Error Features Refrigeration Tablet Sports Security Cameras Document Management Specifications Superfish Google Wallet Hiring/Firing Consultation Router Websites Flexibility Competition CIO Backup and Disaster Recovery Physical Security Google Drive Remote Workers Computer Repair Authorization Legal Scam Mirgation Windows 8 Vulnerability Server Statistics Mobile Device Managment Smartphone Public Speaking Regulations Education Data storage Telephony Bitcoin Cloud Windows 10 Efficiency Business Owner Wireless Innovation Legislation Mobile Virtual Desktop Communication Deep Learning WiFi Internet of Things Comparison Tip of the week Computing Data Data Management Mobile Security Piracy Government Cabling Social Networking Tech Terms Environment IT Consulting Proactive IT Wi-Fi How To Cables Techology Robot Gadgets Business Computing Password USB Domains Supercomputer Digital Payment Windows Authentication IT Services Automation Private Cloud Notifications Training Proactive Finance Virus WPA3 Gmail Operating System IT service Unified Communications Mobile Data Samsung Recovery Uninterrupted Power Supply Data loss PowerPoint Network Congestion Tech Support Black Market Small Business Mobility Customer Relationship Management User Tips Internet Collaboration Technology Tips Virtualization Users Webcam Downtime Experience Hacks IBM Mobile Office Safety Company Culture Meetings Politics Motion Sickness SharePoint Development Going Green Lithium-ion Battery Entrepreneur Remote Monitoring and Management Microsoft Website MSP Business Management Quick Tips Software Tips Bookmarks Google Read Only Enterprise Resource Planning LiFi ROI Trending Patch Management BDR Electronic Medical Records VPN Search Cortana Zero-Day Threat Cybercrime Outsourced IT Office Taxes Presentation IT Consultant Business Technology Antivirus Save Money Language Disaster Recovery Money Troubleshooting Managed Service Marketing Employee-Employer Relationship Computers IP Address Mail Merge Virtual Reality Solid State Drive Automobile Modem Wireless Technology Utility Computing Alert Undo Fun Point of Sale Holiday Cookies Network Management Tech Term Big Data Cloud Computing Data Warehousing Consumers Phone System Display Business Growth Disaster Artificial Intelligence Maintenance Managing Stress IoT Ransomware Touchscreen Business Intelligence Emoji SaaS Electronic Health Records Information Technology Tip of the Week VoIP Buisness Alerts Office 365 Facebook Digital Distributed Denial of Service Motherboard Public Cloud End of Support Unsupported Software Twitter Saving Money Sync Unified Threat Management Augmented Reality Phishing Access Control Malware Data Recovery IT Budget Blockchain Spyware Analytics Health Tracking Workplace Tips Storage Botnet Avoiding Downtime Shortcut Cost Management VoIP Update IT Support IT Support Hotspot Gadget User Error Redundancy Test Hacker Analyitcs Data Breach Wires Hard Disk Drive Upgrades Windows 10 Managed IT services Management Programming Migration Business Files Bandwidth Technology Chatbots Machine Learning Chrome Printer Typing Information History Human Error Permission Healthcare Customer Service Printing Corporate Profile How To Network Cache Theft Law Enforcement Humor Consulting Smartphones Running Cable Managed IT Services WannaCry Managed Services Provider Two-factor Authentication Chromebook Backups G Suite Assessment Dark Web Computing Infrastructure GPS Lenovo Passwords Employer-Employee Relationship Paperless Office Procurement Web Server Operations Risk Management Wearable Technology Instant Messaging Unified Threat Management Upgrade Server Management Office Tips App Identity Business Continuity IT Technicians Content Filtering Miscellaneous Intranet Hardware Apps Internet Exlporer Network Security Compliance Disaster Resistance Current Events Cyber Monday Co-managed IT Hard Drive Servers Favorites Address Budget Productivity Hacking Project Management Geography Save Time Mouse Break Fix Connectivity Help Desk Software as a Service Applications RMM Google Docs Security Mobile Computing Personal Information Financial Privacy Asset Tracking eWaste BYOD YouTube Work/Life Balance Spam Bring Your Own Device Documents Administration Mobile Device Cleaning Laptop Crowdsourcing Software Employees Staffing Fleet Tracking Fraud Knowledge 5G Cyberattacks Identity Theft Retail The Internet of Things Networking Cooperation High-Speed Internet Vendor Management E-Commerce Processors Managed IT Service Outlook Browser Firefox Telephone Systems Multi-Factor Security Net Neutrality Cryptocurrency Nanotechnology Star Wars Remote Computing Identities Hosted Solutions Social Managed Service Provider 3D Printing HIPAA Cybersecurity Best Practices Recycling Heating/Cooling Hard Drives Remote Worker Apple Computer Care User Vulnerabilities Microsoft Excel IT Management Black Friday Monitors Drones Email IT solutions Settings Licensing Google Maps Writing Administrator Bluetooth Enterprise Content Management Digital Signature Cameras Productivity Dark Data CCTV Relocation Smart Tech Scary Stories Saving Time Staff Encryption Google Calendar Hosted Solution Best Practice

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code