Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do You Know What to Do When Involved in Identity Theft?

Do You Know What to Do When Involved in Identity Theft?

The unfortunate truth of increased technology use in the workplace is that there is a corresponding increase in the potential for cybercrime, more specifically identity theft, to strike the workplace. The question is, what can you do to help prevent it, and how should you react to it should it strike?

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Break Fix Outsourced IT IT Support Internet of Things Motherboard Tip of the week Relocation Websites Meetings Google Docs Data Breach CCTV Mail Merge Buisness eWaste Software as a Service Smartphone Shortcut Drones Digital Payment Marketing Undo Features Competition Small Business Procurement Mouse Cost Management Budget Hacking Chromebook App Analyitcs Cybercrime Staff Intranet Wires Company Culture Password Management Augmented Reality Application Managed Services Provider Consumers Development Fraud Consulting Smart Technology Asset Tracking Servers Permissions Taxes Lenovo Nanotechnology Sports Electronic Health Records Data storage Business Management Comparison PowerPoint Vulnerabilities Windows 10 Machine Learning Google Wallet Google Maps Search Writing Automation Miscellaneous Social Networking Proactive IT Lithium-ion Battery Laptop Cyber Monday Employee-Employer Relationship Internet Computers Remote Computing WiFi Disaster Resistance Vendor Management Cables Blockchain Smartphones Tech Term Disaster Recovery Saving Time How To IT Support Flexibility Enterprise Resource Planning Network Management RMM Network Security Upgrade Public Speaking Mobile Device Management Update Productivity Communication Operations Troubleshooting Cache Computing Going Green Black Friday Users Social Media Statistics Security Hard Drives Cameras Hacker Automobile Information Help Desk Storage User Business Owner IBM Business Computing Co-managed IT Wireless Technology Best Practices Operating System Business Technology Content Filtering Processors Bitcoin Superfish Managed IT Service Firewall Enterprise Content Management Travel Display Microsoft Touchscreen Connectivity Mobile Devices Unified Communications VoIP Point of Sale Tablet Dark Data The Internet of Things Network Web Server Financial Legal Cabling Settings Tip of the Week Physical Security Customer Relationship Management Data Recovery Cybersecurity Wi-Fi Current Events Screen Reader Utility Computing Software Office 365 Paperless Office End of Support Fun Access Control Security Cameras Remote Workers Website Domains Identity Theft Net Neutrality Redundancy User Error Mirgation Personal Information Server Management Test Infrastructure Data Security Politics Efficiency Error IT Technicians Hackers Spam Chatbots Experience Cookies Browser Remote Monitoring and Management Apps GPS Privacy Healthcare Bandwidth Hotspot Network Congestion Technology Employees Education Patch Management Business Continuity Save Time Business Intelligence Phone System Telephone Systems Cyberattacks Human Error Hosted Solution Robot Malware Modem Cloud Computing Instant Messaging Webcam Compliance IT service Backup and Disaster Recovery Office Recycling Finance Administrator Cooperation Passwords Firefox Technology Laws Trending Collaboration Legislation Private Cloud Outlook Migration Safety Authentication Alert Virtual Desktop Managed IT services Mobile Device Google Calendar Corporate Profile Remote Monitoring Hiring/Firing Authorization Managed Service Virtual Reality BYOD Saving Money Phishing IT Consultant Mobile Security 5G User Tips IT Services Humor Hard Drive Cryptocurrency Electronic Medical Records Managing Stress Distributed Denial of Service Software Tips Downloads Multi-Factor Security Apple Solid State Drive Black Market Hardware IT solutions Monitors Geography Retail Halloween E-Commerce Artificial Intelligence Mobile Office Big Data Risk Management Social Engineering History Avoiding Downtime Information Technology Star Wars Digital Mobility Backups Entrepreneur Gadget Fleet Tracking Project Management Technology Tips CIO Documents Conferencing Dark Web Social Money Maintenance IP Address Workplace Tips Consultation Health Microsoft Office Data Backup Hacks Bookmarks Identity ROI Virus Data Management BDR Quick Tips HIPAA Sync Ransomware Gmail Piracy Word Managed IT Services Bluetooth How To Favorites Assessment Router Downtime Windows 10 Licensing Applications Antivirus Tech Support MSP Computer Document Management Mobile Computing Employer-Employee Relationship Language Managed Service Provider Google Drive Google communications IT Management VPN Files Presentation Windows Twitter Email Training Crowdsourcing Gadgets USB Data Warehousing 3D Printing Business Growth SharePoint Save Money PDF Public Cloud OneNote Analytics Time Management YouTube Mobile Device Managment WannaCry Facebook Remote Worker Virtual Private Network Deep Learning Wireless Specifications Computer Repair Alerts Chrome Typing Administration Smart Tech Wearable Technology Server Notifications Zero-Day Threat Holiday Office Tips Alt Codes Disaster IoT Spyware Digital Signature G Suite Recovery Computing Infrastructure Uninterrupted Power Supply Environment Printing Two-factor Authentication Unsupported Software Running Cable Customer Service Techology iPhone Regulations SaaS VoIP Vulnerability Programming Printer File Sharing High-Speed Internet Proactive Cloud Cortana Business Botnet Hard Disk Drive Unified Threat Management Law Enforcement Scary Stories LiFi Telephony Backup Mobile Scam Bring Your Own Device Tracking Identities Data Tech Terms Internet Exlporer Microsoft Excel IT Consulting Mobile Data Innovation Supercomputer Virtualization Refrigeration Upgrades Managed IT Work/Life Balance Computer Care Windows 8 Heating/Cooling Knowledge WPA3 Monitoring Cleaning Theft Staffing Read Only Unified Threat Management Address Emoji Networking Best Practice Encryption Productivity Data loss Government Permission Motion Sickness IT Budget Hosted Solutions Samsung Android

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code