Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Fishing for Answers to Keep Phishing Attacks from Sinking Your Business

Fishing for Answers to Keep Phishing Attacks from Sinking Your Business

Phishing attacks have been in the social consciousness now for a while, and for good reason: it is the predominant way that hackers gain access to secured networks and data. Unfortunately, awareness to an issue doesn’t always result in positive outcomes. In this case, hackers get more aggressive, and by blanketing everyone under a seemingly limitless phishing net, 57 billion phishing emails go out every year. If a fraction of those emails accomplish their intended goal, the hackers on the other end of them really make out.

Continue reading
0 Comments

Learn to Use Email Safely

Learn to Use Email Safely

Email is a core component to many businesses. With 124.5 billion business emails being sent and received each day, that doesn’t seem to be in danger of ending. Are the emails that are coming and going from your business secure? That may be another story, altogether. In order to keep your email security at a premium, we have outlined the following tips:

Continue reading
0 Comments

Protect Your Business From Phishing Attacks

Protect Your Business From Phishing Attacks

Spam is a major hindrance when running a business that relies on email, but it’s easy to protect your employee’s time from the average spam messages with the right technological support. Unfortunately, hackers have adapted to this change and made it more difficult to identify scam emails. More specifically, they have turned to customizing their spam messages to hit specific individuals within organizations.

Continue reading
0 Comments

SMiShing: A New Mobile Computing Scam

SMiShing: A New Mobile Computing Scam

Chances are, you’ve heard of phishing before--emails that promise some benefit or prize if you only click on the included link, that actually only results in trouble for you and your data. Unfortunately, as technology has embraced mobility, so have phishing attempts. This is why you must also be aware of SMiShing scams.

Continue reading
0 Comments

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Phishing attacks have been around for decades, first being recorded in 1995 where scammers would pose as AOL employees and request a user’s billing information through instant messages. Nowadays, email phishing attempts have tricked users into handing over personal information of all kinds. There are many methods of identifying a phishing attempt, but today we’ll focus on one.

Continue reading
0 Comments

How a Single Hacker Stole $100 Million From Two Major Tech Companies

How a Single Hacker Stole $100 Million From Two Major Tech Companies

An unfortunate fact about the modern business world is that any organization that utilizes technology is playing with fire. Cyber attacks can circumvent even the most well-protected networks through the company’s users. This is, unfortunately, something that business owners often don’t learn until they’re on the receiving end of an attack; just like the two companies that fell victim to phishing attempts that were supposedly operated by Evaldas Rimasauskas, a Lithuanian hacker who has been accused of stealing $100 million from them.

Continue reading
0 Comments

Scammers Use Whaling Attack Emails to Pose as Upper Management

Scammers Use Whaling Attack Emails to Pose as Upper Management

The average business owner may already be aware of what are called phishing attacks - scams that attempt to deceive and trick users into handing over sensitive credentials. However, not all phishing attacks are of the same severity, and some are only interested in hauling in the big catch. These types of attacks are called “whaling,” and are often executed in the business environment under the guise of executive authority.

Continue reading
0 Comments

Tip of the Week: 5 Clues that an Email is Really a Phishing Scam

b2ap3_thumbnail_do_not_go_phishing_400.jpgOne of the most masterful arts of deception that hackers use is the phishing attack, which attempts steal sensitive credentials from unwary victims. The anonymity afforded to criminals on the Internet is what makes this possible. Using phishing attacks, hackers attempt to steal credentials or personal records by forging their identities. What’s the best way to protect your business from these attacks?

Continue reading
0 Comments

Don’t Be Duped By a Phishing Attack: 4 Signs to Look Out For

b2ap3_thumbnail_online_phishing_400.jpgYour business is literally assaulted by thousands of threats a day, and they could ruin your organization's goals in an instant if not for your defenses. With such powerful security measures at your disposal, we don’t blame you for lowering your defenses; however, it should be mentioned that your network security doesn’t protect you from all manners of threats. Attacks like phishing scams have a tendency to bypass your security measures, which makes them dangerous.

Continue reading
0 Comments

Some Hackers Are Out to Give IT Departments a Bad Reputation

b2ap3_thumbnail_email_phishing_attacks_400.jpgWe all know that hacking is one of the biggest risks we must deal with in today’s technology-based society. Most hackers out there try to take advantage of the latest vulnerabilities in software, but there are some that use a more sophisticated method. These hackers try take advantage of the weaknesses found in the human psyche, rather than the technological flaws that consistently get patched.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Cooperation Managed Service IT Technicians Heating/Cooling VoIP Digital Signature ROI Supercomputer Electronic Health Records Miscellaneous Firewall Windows 8 Retail Information Technology Sports Voice over Internet Protocol Managed Service Provider History Remote Workers Fleet Tracking Mobile Devices Upgrades Microsoft Office Saving Money Scam Display Internet Exlporer Augmented Reality Web Server WannaCry Bitcoin Robot Laptop Experience Knowledge Project Management Apps Firefox Read Only Upgrade Theft Hacking Holiday Crowdsourcing Troubleshooting Cabling Gadget Public Cloud Unsupported Software Permissions Consumers Hacker Sync Smart Technology Data Warehousing SaaS Hosted Solutions Managed IT Service Internet of Things Co-managed IT Star Wars Humor Private Cloud Refrigeration Website Cloud Computing BDR Virtual Desktop Technology Laws VPN Uninterrupted Power Supply Marketing Productivity Cameras Personal Information Cyberattacks Compliance Gmail Tech Terms Money Office 365 IT Support Router Encryption Dark Data Technology Network Management Machine Learning Undo Downloads Botnet Twitter Physical Security PowerPoint How To Smart Tech Apple Computing Settings Avoiding Downtime Solid State Drive Tip of the week Ransomware Windows 7 Data Management Efficiency Entrepreneur Notes eWaste Piracy IT Consultant Google Docs Operations Server Nanotechnology Cybercrime Identities Administration Social Networking Password Employee-Employer Relationship Tech Term Automation Applications Wasting Time Business Continuity Internet Software Tips Intranet Scary Stories Test Wires Chrome Productivity Tech Support Mobile Security Management IT Services Human Error Social Engineering Hard Drive Remote Monitoring Tracking Wireless Motherboard Downtime Maintenance Software Two-factor Authentication MSP Vulnerabilities Android Touchscreen Office Hiring/Firing Alt Codes Business Owner Education Redundancy Cables VoIP Going Green Managed Services Provider Business Management Development Geography LiFi Unified Threat Management Customer Service Blockchain Employer-Employee Relationship Database Disaster Resistance Net Neutrality Lenovo Trending Buisness Windows 10 Presentation Error Save Money Computing Infrastructure Monitoring Servers Halloween Printing Unified Communications Business Technology Corporate Profile Safety Office Tips Techology WPA3 Cybersecurity Instant Messaging Network Communication Chatbots Workplace Tips Data loss Business Utility Computing Content Filtering Wi-Fi Backup and Disaster Recovery Vulnerability Recovery IT solutions Data Backup Computer Repair IT Support Collaboration Computers Enterprise Resource Planning Cost Management RMM Cleaning Fraud Mobile Data Quick Tips User Tips Microsoft Electronic Medical Records Phone System Black Market G Suite Migration Documents Windows Network Security Mail Merge Search Lithium-ion Battery Legal Hardware Budget Asset Tracking Screen Reader Word Travel Google Calendar Alerts Permission Vendor Management Google Wallet Virtual Assistant Staff Consultation Smartphones Superfish Work/Life Balance Spam Assessment Tip of the Week Cache Business Computing Proactive Mouse Statistics Shortcut Multi-Factor Security Relocation Government Current Events Mobile Computing Spyware Websites Comparison Favorites Identity Bluetooth Distributed Denial of Service Wireless Technology Employees Hackers Data storage Computer Care BYOD Programming Environment Phishing Company Culture Licensing Remote Monitoring and Management IP Address Remote Worker Google 5G Unified Threat Management Telephony Passwords Cryptocurrency Cyber Monday Bandwidth Facebook Flexibility Data Security Legislation Taxes Professional Services CCTV Browser Document Management Cookies Computer Point of Sale Health Fun Cloud App The Internet of Things File Sharing Alert Identity Theft OneNote Gadgets Social Media USB Meetings Storage Outsourced IT Data Breach Update Authentication IT Consulting Analytics Best Practices Proactive IT Healthcare Infrastructure IoT Patch Management Webcam Files iPhone GPS Mobility Hosted Solution Notifications Virtual Reality Technology Tips Competition Public Speaking Hotspot User Connectivity CIO Zero-Day Threat Disaster IT Budget Cortana Running Cable Disaster Recovery Virus Address Operating System Finance Specifications Software as a Service User Error Business Growth Artificial Intelligence Customer Relationship Management Deep Learning Conferencing Email Drones Managed IT Application Networking Network Congestion Black Friday SharePoint Security Remote Computing Data Smartphone Motion Sickness Managing Stress Mobile Device Monitors Small Business Google Maps Typing Server Management Backup YouTube Paperless Office Risk Management HIPAA Best Practice Break Fix Hard Drives WiFi Administrator Virtual Private Network Chromebook Law Enforcement IBM How To Mobile Office Writing Automobile Time Management Procurement Domains Managed IT Services Enterprise Content Management Virtualization Printer Outlook Backups Help Desk Financial IT service Users Staffing Digital Hacks Wearable Technology Mobile Device Management communications Information Dark Web Mobile Tablet Innovation Hard Disk Drive Emoji Recycling Managed IT services Data Recovery Authorization Big Data Consulting Malware Bring Your Own Device Regulations Access Control Mobile Device Managment Training Samsung Analyitcs High-Speed Internet Saving Time IT Management Mirgation Windows 10 Business Intelligence Digital Payment Google Drive Social End of Support PDF E-Commerce Security Cameras Microsoft Excel Antivirus Features Modem Bookmarks Language Politics Processors Privacy Telephone Systems Save Time 3D Printing

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code