Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This NSA Employee Made a Mistake. How Hackers Exploited it is Worrisome

This NSA Employee Made a Mistake. How Hackers Exploited it is Worrisome

One of the biggest hacks of 2016 was the United States National Security Agency, by a hacking group calling themselves the Shadow Brokers. This hack came to light after tools belonging to the NSA were discovered on the black market. How could a data breach of this magnitude happen to one of the most secure IT systems in the world? Newly released evidence may provide the answers.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Downtime Wasting Time Humor Router Windows Management Ransomware Vendor Management Backup Software Alerts Data loss CCTV Virtual Reality Computer Computers Writing Processors Intranet Hotspot Google Maps Entrepreneur IoT Patch Management Techology Small Business Smart Technology Sports Blockchain Conferencing Shortcut MSP Training Distributed Denial of Service Applications Multi-Factor Security Employee-Employer Relationship WPA3 Remote Workers Social Engineering Time Management Google Docs Content Filtering Flexibility Superfish Smartphone Outlook Disaster OneNote Security Cameras Technology Laws Money Mobility YouTube Backups Social Media Virus Data Security Electronic Medical Records Cables Mail Merge Upgrade IT Support Save Time VoIP User Error SharePoint Google Wallet Information Fleet Tracking Managed Services Provider Collaboration USB Cameras Computing Infrastructure Twitter Access Control Recovery Office Tips Monitoring Politics Staff Backup and Disaster Recovery GPS Cache Network Management Solid State Drive Printer Risk Management Buisness Data Management Scary Stories Taxes Managed IT Services BDR Miscellaneous Theft Data Backup Employees Machine Learning Drones End of Support Error Privacy Meetings ROI Law Enforcement Scam Gadgets Chrome High-Speed Internet Holiday Efficiency Licensing Firefox Saving Time Display Hard Disk Drive Break Fix Big Data Google Environment Workplace Tips Paperless Office Files Automation Halloween Windows 7 Project Management Black Market Security Business Continuity Information Technology Productivity Smartphones Managing Stress Data Warehousing Dark Web Spam Sync Document Management Avoiding Downtime Analyitcs WannaCry Remote Computing Marketing Language Tech Term Networking Presentation CIO Healthcare Phishing Lithium-ion Battery Business Growth Programming Compliance Cyber Monday Education Cost Management Procurement Quick Tips Cleaning Data Recovery Cybercrime Administration Managed Service Provider Two-factor Authentication G Suite Fraud Recycling Wi-Fi Virtual Assistant Zero-Day Threat Retail Chromebook Update Bring Your Own Device Vulnerability Infrastructure Comparison Consultation Computer Repair Maintenance Voice over Internet Protocol Windows 10 Wireless Digital Signature Point of Sale Personal Information Gadget History Private Cloud Heating/Cooling IT Technicians Encryption Documents RMM User Tips Business Owner Operating System Authentication Microsoft Excel Monitors Travel Refrigeration Social Specifications Geography SaaS Trending Going Green Identity Theft Computing Business Intelligence IBM Hacking Notifications Upgrades Redundancy Remote Monitoring Smart Tech Apple The Internet of Things Mobile Devices Legislation Unified Threat Management Unsupported Software Servers Robot Unified Threat Management Operations Mobile Data Undo Professional Services Bookmarks BYOD Laptop Permission Cybersecurity Motherboard Permissions Gmail Wearable Technology Internet of Things Supercomputer Social Networking Dark Data Artificial Intelligence How To Cloud Computing IT Consultant Automobile Hiring/Firing 3D Printing Vulnerabilities Remote Monitoring and Management Health Network Security Telephony Windows 8 Statistics Relocation Administrator Mobile Computing Firewall Mobile Security Mouse Apps Network Cabling Customer Service Digital Managed IT Service IT Support Public Speaking Test Touchscreen Tip of the week Tablet Communication Cookies Mobile Device Passwords Hosted Solutions Phone System Managed Service VPN IT Budget Virtualization Legal LiFi IT solutions Internet Connectivity Database Technology Users Nanotechnology Hard Drive Hosted Solution Government Managed IT services Star Wars Wires Facebook Typing Troubleshooting Technology Tips Save Money App Assessment WiFi Internet Exlporer Uninterrupted Power Supply Settings Public Cloud Office 365 Google Calendar Cooperation Botnet Enterprise Content Management Corporate Profile IT Services Email Enterprise Resource Planning Hard Drives Business Web Server PowerPoint Proactive IT Innovation Mobile Office Fun Mobile Bluetooth Antivirus Consumers Virtual Private Network Productivity Address IT Consulting Outsourced IT Identity Identities Best Practice Modem Search Telephone Systems Virtual Desktop Financial Digital Payment Chatbots Cortana Unified Communications Cloud Tracking Hacks VoIP Managed IT Analytics Best Practices Domains Software Tips Work/Life Balance HIPAA Instant Messaging Website Black Friday Mobile Device Management Downloads Business Management Migration Competition Development Tech Support Android Utility Computing Augmented Reality Safety Mirgation Printing Customer Relationship Management Cyberattacks Software as a Service PDF Human Error Deep Learning 5G Microsoft Office Net Neutrality File Sharing Google Drive Employer-Employee Relationship Wireless Technology Office Electronic Health Records Physical Security Word Current Events Samsung Regulations Password Bandwidth Tech Terms iPhone Emoji Help Desk Saving Money Server Storage Browser Staffing Remote Worker Spyware IP Address Read Only Motion Sickness IT Management Business Technology Co-managed IT Alert Hardware Hacker Computer Care Notes Webcam Hackers Authorization Mobile Device Managment Proactive Data storage Experience E-Commerce User Bitcoin Server Management Piracy Malware Data Running Cable Asset Tracking Windows 10 Alt Codes Finance communications Lenovo Application Disaster Recovery Microsoft Budget How To Screen Reader IT service Websites eWaste Cryptocurrency Disaster Resistance Company Culture Features Crowdsourcing Tip of the Week Favorites Business Computing Knowledge Consulting Data Breach Network Congestion

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...