Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Acer Breach Compromised Customer Credit Cards

Alert: Acer Breach Compromised Customer Credit Cards

Users of Acer’s online store between May 12th, 2015, and April 28th, 2016, may be in for a rude awakening. Acer may be attempting to contact you to relay that your credit card’s credentials have been lifted by hackers. The breach in question resulted in 34,500 customers having their credentials stolen, including the user’s name, address, credit card number, expiration date, and security code.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

WannaCry Laptop Features Cybersecurity Environment File Sharing Geography Social Networking Read Only Browser Piracy Printer Lithium-ion Battery Computer Repair PDF Cortana Business Settings Database Public Speaking Employee-Employer Relationship Cybercrime Phone System Data storage WPA3 Managed IT Services Outsourced IT Employer-Employee Relationship Smart Technology Business Owner Knowledge Network IT Consulting IT Budget Business Continuity Backup Point of Sale Hacker Supercomputer Robot Cache YouTube Word Shortcut Wi-Fi Conferencing Office Tips Fun Utility Computing Assessment Bitcoin Mobile Device Managment Hosted Solutions Alerts Cameras Current Events Data loss GPS Servers Wires Communication Hacks Cryptocurrency eWaste Application Virtual Private Network Healthcare Humor VoIP Phishing Statistics Tech Term Google Calendar Hotspot Disaster Recovery Project Management Superfish Buisness Big Data Disaster Resistance Android Voice over Internet Protocol Computing Infrastructure Access Control Vendor Management Google Wallet Theft Security Analyitcs Development Business Intelligence Cleaning User Error OneNote IT solutions Upgrade Hard Drive Windows Electronic Health Records Specifications Network Congestion Hiring/Firing Distributed Denial of Service Saving Money Virtual Reality Identity Taxes Processors Efficiency Presentation Patch Management Twitter Tablet Computing The Internet of Things Unified Threat Management Multi-Factor Security Backups SaaS Microsoft Excel Automobile Data Staffing Best Practices Test Artificial Intelligence Heating/Cooling IT service IT Management Wearable Technology Machine Learning Software Regulations Error Mouse Virtualization Bookmarks Hackers Webcam Internet of Things Lenovo Comparison 5G Public Cloud Virtual Desktop Troubleshooting Procurement Managed IT Google Drive Websites Content Filtering Information Technology Instant Messaging Unified Threat Management IT Support Travel Computers Consumers Managed IT Service Authentication IT Technicians Health Samsung Scam User Tip of the Week IP Address Privacy Cabling Monitors Mobile Computing Disaster Managing Stress IT Support Consulting Productivity Bandwidth Writing Zero-Day Threat Motherboard Best Practice CCTV Modem Social Media Customer Service Quick Tips BYOD Favorites BDR Business Computing Cables Alt Codes Users Malware Remote Monitoring and Management Scary Stories Human Error Address Software as a Service Bring Your Own Device MSP Passwords PowerPoint Maintenance WiFi Sync Data Management Operations IoT Telephone Systems How To Vulnerability Training Infrastructure Tech Terms Workplace Tips Windows 10 Black Friday Legal Mirgation Identities Customer Relationship Management Chatbots Ransomware Law Enforcement Web Server Techology Augmented Reality Technology Tips Spyware Going Green Upgrades Social Engineering G Suite Social Search Spam Downtime Net Neutrality Internet Exlporer Mobile Data Motion Sickness Identity Theft Legislation Mobile Device Management Save Time Cloud Computing Update Compliance Enterprise Resource Planning Solid State Drive Blockchain Documents Business Technology Help Desk Work/Life Balance Digital Payment Hard Disk Drive Windows 7 Emoji Domains Fraud App Server Management Deep Learning Employees Remote Monitoring Tip of the week Digital Entrepreneur Innovation Mobile Device Chromebook Office Cookies Password Network Security RMM Marketing Digital Signature LiFi Asset Tracking Typing Dark Web Electronic Medical Records Hosted Solution Paperless Office Competition Mobile Cost Management Personal Information Facebook Virtual Assistant Document Management Star Wars Windows 10 Mail Merge VPN Analytics Wireless Technology Vulnerabilities Drones iPhone Router Business Management Wasting Time Business Growth Applications IT Services SharePoint Software Tips Files Tech Support Physical Security Notifications Mobile Devices Nanotechnology Information Networking Remote Worker Flexibility IT Consultant Cooperation Saving Time Collaboration Gadget Redundancy ROI Bluetooth Running Cable Money Windows 8 Black Market Automation Hardware History HIPAA Computer Care End of Support Politics Notes Technology Unsupported Software Wireless Backup and Disaster Recovery Programming Recovery Google Maps USB Remote Computing Migration Crowdsourcing Retail Operating System Small Business Antivirus Co-managed IT Apps Government Managed Service Gadgets VoIP Gmail Recycling Meetings Avoiding Downtime Managed Service Provider Undo Technology Laws Telephony Consultation Data Breach Network Management Smart Tech Computer Monitoring Cloud Relocation Save Money Sports Firefox Internet Cyber Monday Language Permissions Proactive Smartphone Office 365 Licensing Miscellaneous Holiday Permission Storage Downloads Finance Administration Security Cameras Hacking CIO Apple Email 3D Printing Proactive IT Financial Fleet Tracking Data Backup Staff Printing Server Microsoft Office Google Docs Refrigeration Outlook Corporate Profile E-Commerce Management Remote Workers Break Fix Managed IT services Mobility Halloween Website User Tips Screen Reader Dark Data Botnet Company Culture Administrator Education Data Recovery Data Security Encryption Productivity Connectivity communications Trending Time Management IBM Professional Services Risk Management Tracking Authorization Microsoft Touchscreen Mobile Security Cyberattacks Uninterrupted Power Supply Display Firewall Enterprise Content Management Private Cloud Data Warehousing Hard Drives Safety Budget Two-factor Authentication Alert Unified Communications Chrome Smartphones Google Virus High-Speed Internet How To Mobile Office Managed Services Provider Experience Intranet

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...