Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Acer Breach Compromised Customer Credit Cards

Alert: Acer Breach Compromised Customer Credit Cards

Users of Acer’s online store between May 12th, 2015, and April 28th, 2016, may be in for a rude awakening. Acer may be attempting to contact you to relay that your credit card’s credentials have been lifted by hackers. The breach in question resulted in 34,500 customers having their credentials stolen, including the user’s name, address, credit card number, expiration date, and security code.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Disaster Resistance Unified Threat Management Google Maps Scam Proactive Miscellaneous Time Management Alt Codes Help Desk Downtime Wearable Technology Browser Consumers Augmented Reality IT solutions Sports Physical Security VPN 3D Printing Mobile Device Managment Company Culture Solid State Drive Politics Smartphone Infrastructure Computing Infrastructure Multi-Factor Security Superfish Security Tablet Data Warehousing Test Humor Microsoft Office Remote Worker Big Data Hosted Solution Intranet Smart Technology Social Engineering Hardware Files Staff Presentation SharePoint Licensing Retail VoIP Tech Terms Training IT service Assessment Saving Time Computers Mobile Device Management Nanotechnology Efficiency Two-factor Authentication Personal Information Managed IT Services Relocation Storage Paperless Office Competition Travel IT Services Risk Management Avoiding Downtime Dark Data Wires Compliance Technology Tips Proactive IT Going Green Mobile Computing Technology Laws Android Internet of Things IoT Backups Operations Twitter Chromebook Enterprise Content Management Social Identity Application Flexibility Health OneNote Collaboration Telephone Systems Cyber Monday Regulations Government Features Programming Disaster Recovery Environment Google Wallet BYOD Machine Learning HIPAA Geography Productivity Refrigeration Windows 10 Business Settings Monitors Law Enforcement Update Holiday Phishing Managed Service Chatbots Supercomputer Finance Scary Stories Current Events Black Market Data storage WPA3 WannaCry Managed Service Provider Data loss Saving Money Virtualization Remote Computing Black Friday Wireless Techology Deep Learning Employer-Employee Relationship Authentication Migration Mobile Devices Healthcare Business Technology Employees Data Breach Router Hard Drives Private Cloud Data Management Asset Tracking Computer Care Permission Net Neutrality Windows Administrator User Error BDR Permissions Gadget Hacks How To Server Management Smart Tech Quick Tips Distributed Denial of Service Bluetooth Cryptocurrency Electronic Medical Records Enterprise Resource Planning Modem Computing Marketing Privacy Utility Computing Remote Monitoring Analyitcs Recovery Tracking Websites Cybersecurity Business Growth Vendor Management Mobility Development Fleet Tracking Software Remote Workers Piracy Cookies Downloads Virtual Reality How To Data Heating/Cooling Mobile Security Virtual Desktop Typing App Outlook Theft Experience Google Drive Troubleshooting Digital Payment MSP Bandwidth Lithium-ion Battery Trending Hackers Business Management Google Notifications Vulnerabilities Cloud Computing Printing Office 365 Apps 5G Statistics Maintenance Public Cloud Taxes Zero-Day Threat Authorization Cache Processors IT Technicians Network Security Crowdsourcing IT Support Fraud Workplace Tips Co-managed IT Money Digital IT Budget Antivirus Analytics Work/Life Balance CCTV Writing Samsung Identity Theft Address Cables VoIP Technology Vulnerability Server Point of Sale Cloud SaaS Alerts Cabling Procurement Save Money Dark Web Windows 8 Facebook Budget Managed Services Provider Hiring/Firing Cleaning Sync Touchscreen Bring Your Own Device Consulting Office Phone System Electronic Health Records The Internet of Things Best Practices Productivity Information Language Upgrade Malware Human Error Unified Communications Redundancy eWaste Connectivity Network Upgrades User Tips Administration Drones Information Technology Cybercrime Internet Read Only Lenovo Firewall Knowledge Software Tips Halloween Managing Stress G Suite Servers Cooperation Automobile Laptop Google Calendar Cortana Mouse Customer Service History Office Tips IP Address Hard Disk Drive Blockchain Virtual Private Network Remote Monitoring and Management Encryption Bitcoin Favorites Password Staffing Content Filtering Computer Repair PowerPoint Artificial Intelligence Access Control Data Security Network Management Project Management Google Docs Wireless Technology Tech Term Communication Bookmarks Public Speaking Cyberattacks Mobile Device WiFi Wi-Fi Employee-Employer Relationship Display Emoji Cost Management Backup Fun Monitoring Digital Signature Microsoft Excel Computer Applications Screen Reader Small Business Ransomware Hard Drive Documents Disaster Document Management Patch Management communications Customer Relationship Management Hotspot Consultation Chrome Management Data Recovery USB Firefox PDF iPhone IT Consultant Managed IT Buisness Best Practice Social Networking Shortcut Hacking Motion Sickness Mobile Education Legislation Passwords User Comparison Save Time ROI LiFi Alert Microsoft Financial File Sharing Security Cameras Instant Messaging Webcam Error Automation Identities IT Support Website Gmail Network Congestion Recycling IT Management E-Commerce Innovation Managed IT services Spam Data Backup Motherboard Business Owner Software as a Service Email RMM Cameras Tip of the week Operating System Search Unsupported Software Undo Business Continuity Smartphones YouTube Windows 10 Meetings Social Media Uninterrupted Power Supply Backup and Disaster Recovery Legal IT Consulting Hacker Web Server Break Fix Business Intelligence Mail Merge Managed IT Service Business Computing Tech Support Corporate Profile Apple Unified Threat Management Mobile Office Spyware GPS Specifications Robot CIO Word Safety Botnet Running Cable Networking Entrepreneur IBM Mobile Data Internet Exlporer Conferencing High-Speed Internet Star Wars Telephony Domains End of Support Users Hosted Solutions Mirgation Outsourced IT Tip of the Week Gadgets Virus Printer

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code