Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This NSA Employee Made a Mistake. How Hackers Exploited it is Worrisome

This NSA Employee Made a Mistake. How Hackers Exploited it is Worrisome

One of the biggest hacks of 2016 was the United States National Security Agency, by a hacking group calling themselves the Shadow Brokers. This hack came to light after tools belonging to the NSA were discovered on the black market. How could a data breach of this magnitude happen to one of the most secure IT systems in the world? Newly released evidence may provide the answers.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Enterprise Content Management Lenovo Disaster Resistance Assessment Upgrade Network Congestion Project Management Money Company Culture Unsupported Software Lithium-ion Battery Managed IT services Miscellaneous Theft Hard Drives Staff Customer Relationship Management Social LiFi Hiring/Firing Cleaning Politics Cameras Search Finance Instant Messaging Websites Application IT Technicians Cooperation eWaste Consultation Features Tip of the week Data Zero-Day Threat Smart Technology Electronic Medical Records IT service Laptop Tech Term Notifications Taxes Flexibility Net Neutrality Business Owner Microsoft Excel High-Speed Internet Cabling 3D Printing Financial Entrepreneur Software Motion Sickness User Tips Domains Star Wars Digital Signature GPS Mobile Office Firefox Sync User Network Hard Drive IT Budget Networking Distributed Denial of Service Undo Data Recovery E-Commerce Tech Terms YouTube Windows 10 Computing Infrastructure Healthcare IP Address Saving Time Mobile Data Management Buisness Google Information Technology Current Events Technology Tips USB BYOD Hosted Solution Automation Fraud Consulting OneNote Website Managed IT Service Relocation Tip of the Week Mobile Computing Fleet Tracking Enterprise Resource Planning Chatbots Chromebook Proactive Smartphones Customer Service Typing How To Smartphone Writing Shortcut Google Drive Security Cameras Save Money Public Speaking Cookies WPA3 Superfish Motherboard Mobile Device Employees Monitors Windows Cost Management Uninterrupted Power Supply IT Support Chrome Procurement Workplace Tips Update Small Business Unified Threat Management IT Consultant Test PowerPoint Privacy Sports Office Business Growth Employee-Employer Relationship Experience Personal Information How To Computing Error Save Time Efficiency Holiday Recycling Data Warehousing VoIP PDF Remote Workers Identities Virtualization Microsoft Cloud Computing Malware Modem Hardware Identity Theft Network Management Internet Exlporer Alerts Printing Router Computer Repair Cybersecurity Administration Business Computing Deep Learning Digital Mobility Compliance Bookmarks Gadget Unified Threat Management Document Management Permission Applications Humor Recovery Analytics Cyberattacks Wi-Fi Co-managed IT Cloud Hacks Techology Mobile Device Management Language Windows 8 Heating/Cooling Tech Support Intranet Tracking Server Scary Stories Scam Disaster Recovery Crowdsourcing Vulnerabilities Cables Facebook Piracy Data Management Productivity Trending Cyber Monday Wireless Marketing Data Breach Digital Payment Virus Black Friday Spyware Files Private Cloud Patch Management Robot VoIP Authentication Cybercrime Twitter Asset Tracking Processors Proactive IT Managed Service Provider Bandwidth Upgrades RMM Refrigeration Physical Security Knowledge Mobile Security Geography Corporate Profile Infrastructure Specifications Operations ROI Help Desk Supercomputer End of Support Authorization Connectivity Virtual Reality Vendor Management Backup and Disaster Recovery Webcam G Suite Virtual Desktop Legal Mirgation Safety Microsoft Office Business Intelligence Internet of Things Permissions Cryptocurrency Machine Learning Social Media Backups Blockchain Troubleshooting Downtime Firewall Read Only IT Consulting Encryption Downloads Samsung Utility Computing WannaCry Point of Sale Network Security App Google Docs File Sharing Mobile Server Management Dark Data Internet Settings Alt Codes Software as a Service Remote Monitoring and Management Education iPhone Identity BDR Google Calendar Alert Wearable Technology Remote Computing Spam Public Cloud Break Fix Health Communication Emoji Black Market Business Password Development Work/Life Balance Bitcoin Travel User Error Managed IT Unified Communications Ransomware Licensing IT solutions Documents Screen Reader Technology Risk Management Mobile Devices History Favorites Security Users Outsourced IT Mouse Dark Web Display Training Artificial Intelligence Content Filtering Data Backup Legislation MSP Retail Cortana Access Control Remote Worker Government Paperless Office Running Cable Smart Tech Fun Employer-Employee Relationship Office 365 Apple Disaster WiFi 5G Windows 10 Computer Electronic Health Records Printer Managed IT Services Best Practice Data storage Avoiding Downtime Hackers Vulnerability SaaS Virtual Private Network Hacking Monitoring Managing Stress Operating System VPN Maintenance Mail Merge Information Meetings Remote Monitoring Wireless Technology Regulations Augmented Reality Competition Best Practices Hosted Solutions Two-factor Authentication Business Management Presentation Environment Halloween Data Security Computer Care CCTV Quick Tips Nanotechnology Backup IT Management Web Server IoT Time Management Innovation Apps Antivirus Drones SharePoint Google Maps Going Green Passwords Collaboration Programming Redundancy Managed Service Automobile Outlook Cache Analyitcs Touchscreen The Internet of Things Productivity Gadgets Business Continuity IT Services Solid State Drive Social Engineering Android Hotspot Computers Data loss Google Wallet Botnet Address Word communications Tablet Business Technology Comparison Bluetooth Staffing Phone System Technology Laws Wires Telephone Systems Statistics IT Support Hacker Servers HIPAA Gmail Bring Your Own Device Mobile Device Managment Saving Money Budget Conferencing Managed Services Provider Storage Consumers Email Multi-Factor Security Telephony Social Networking Phishing Hard Disk Drive Human Error IBM Software Tips Law Enforcement Office Tips CIO Administrator Big Data Browser Migration

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...