Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Star Wars IT Support Document Management Features Application Productivity Remote Worker Software Passwords Running Cable Motion Sickness Consultation Best Practices CCTV HIPAA File Sharing Identity Theft Mobile Device Modem Technology Tips IT Technicians Bookmarks Consulting Authorization Piracy Superfish Managed IT Service Permissions Point of Sale Storage Analytics Monitoring Training Managed Service Business Computing Social Networking Programming Twitter Networking Internet of Things Heating/Cooling Statistics Network Congestion Outlook Microsoft Office Disaster Resistance Customer Relationship Management Cybercrime Security Cameras Regulations Windows 7 Cloud Computing Processors Drones Avoiding Downtime Personal Information PowerPoint Lenovo Mail Merge Finance ROI Techology Company Culture Vulnerabilities Buisness Smart Tech History Sync Current Events Business Intelligence Computer Repair Mirgation Typing Recovery Physical Security Proactive Innovation Asset Tracking Unified Threat Management Applications Corporate Profile Computers VoIP Antivirus Work/Life Balance IT Consulting Alt Codes VPN Miscellaneous Search Tech Terms Facebook Productivity Employee-Employer Relationship Virtual Reality Saving Time Gadget Favorites IBM Cryptocurrency Data storage Co-managed IT WannaCry Gmail Telephony Saving Money Server Management Laptop Taxes Travel Wasting Time Printing Bitcoin Marketing Read Only Computing Telephone Systems Security Data Phone System Database Sports WPA3 RMM Mobile Devices How To Quick Tips End of Support Redundancy Employer-Employee Relationship Healthcare Theft PDF Router Google Drive Websites Data Breach Maintenance Malware Hacks Touchscreen Backup SaaS Intranet Remote Monitoring and Management Cache Hacker Encryption Managed Services Provider User Cameras Social Help Desk Paperless Office Hotspot Competition Managed IT services Cooperation OneNote Mobile Office E-Commerce Administrator Customer Service Robot Government Alert IT Support Tablet Presentation Printer Education Smartphones IT solutions Chromebook Automation Windows 8 Wireless IoT Zero-Day Threat Distributed Denial of Service Windows 10 User Error Website Workplace Tips Android Tip of the Week Wearable Technology Relocation Augmented Reality Best Practice Unified Threat Management Unified Communications Documents Emoji Remote Monitoring Lithium-ion Battery Business Technology Humor Mobile Device Managment Firefox Halloween Virtual Assistant Software Tips Procurement Hard Drives Law Enforcement Two-factor Authentication Blockchain Hosted Solutions Bring Your Own Device Google Wallet Address Chrome Undo Flexibility Staffing Writing Electronic Health Records Computer Care Cortana Cookies Entrepreneur Fun Remote Workers Phishing Health Managing Stress Computer Nanotechnology Mobility IT Consultant Dark Web Notifications Cabling IT service Managed Service Provider Digital Payment Unsupported Software Budget LiFi iPhone Digital Signature Update Management Permission Analyitcs Assessment Managed IT Services Botnet Deep Learning Google Docs Remote Computing Content Filtering Troubleshooting Migration Social Media IT Budget Electronic Medical Records Servers Google Calendar Information Technology Privacy Money Human Error Proactive IT Development The Internet of Things Enterprise Resource Planning Display 5G Cloud Vulnerability MSP Mobile Security Wi-Fi Mobile Data Public Speaking Managed IT Smart Technology Alerts Social Engineering Geography Mobile Device Management Language Tracking Infrastructure Safety Internet Break Fix Hosted Solution Backups Instant Messaging Hacking Upgrade eWaste Wireless Technology Microsoft Excel Spam Voice over Internet Protocol Recycling 3D Printing Business Authentication Digital Mobile Data Backup Data Management Downtime Conferencing Legislation Password Business Continuity Virtualization Utility Computing Project Management Cybersecurity Big Data Information VoIP Screen Reader Test Virus Domains Disaster Recovery Webcam Data Security Office 365 Data Warehousing Windows 10 Comparison Machine Learning Outsourced IT Tech Term Public Cloud Access Control Backup and Disaster Recovery Server Downloads Artificial Intelligence Web Server Smartphone Enterprise Content Management Operations Gadgets Net Neutrality Email Network Business Growth Settings Retail Going Green GPS Virtual Desktop Chatbots Spyware Internet Exlporer BDR Data Recovery IP Address Collaboration Cyber Monday Environment Office Tips Dark Data Financial Staff Cables Operating System Shortcut Legal BYOD Hard Drive Small Business Software as a Service Error Microsoft Administration Automobile Technology Laws Black Market Time Management USB Experience Consumers Disaster Multi-Factor Security Supercomputer App Windows Licensing CIO Apps Private Cloud IT Management Notes Solid State Drive Tech Support Samsung Ransomware Mouse High-Speed Internet G Suite Bandwidth Efficiency Black Friday Vendor Management Refrigeration Computing Infrastructure Cleaning Data loss Identity Hard Disk Drive Technology Save Money IT Services SharePoint Patch Management Fraud Word Motherboard Google Maps Trending YouTube Knowledge Google Browser Users Identities Cyberattacks Monitors Compliance Hiring/Firing Business Owner User Tips Hackers Apple communications Network Management Scary Stories Holiday Virtual Private Network Wires Crowdsourcing Professional Services Employees Meetings Communication Connectivity How To Bluetooth Scam Risk Management Politics Save Time Firewall Files Office Hardware Uninterrupted Power Supply Specifications Network Security WiFi Upgrades Mobile Computing Fleet Tracking Cost Management Tip of the week Business Management

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...