Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Protect Your Business From Phishing Attacks

Protect Your Business From Phishing Attacks

Spam is a major hindrance when running a business that relies on email, but it’s easy to protect your employee’s time from the average spam messages with the right technological support. Unfortunately, hackers have adapted to this change and made it more difficult to identify scam emails. More specifically, they have turned to customizing their spam messages to hit specific individuals within organizations.

Continue reading
0 Comments

SMiShing: A New Mobile Computing Scam

SMiShing: A New Mobile Computing Scam

Chances are, you’ve heard of phishing before--emails that promise some benefit or prize if you only click on the included link, that actually only results in trouble for you and your data. Unfortunately, as technology has embraced mobility, so have phishing attempts. This is why you must also be aware of SMiShing scams.

Continue reading
0 Comments

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Phishing attacks have been around for decades, first being recorded in 1995 where scammers would pose as AOL employees and request a user’s billing information through instant messages. Nowadays, email phishing attempts have tricked users into handing over personal information of all kinds. There are many methods of identifying a phishing attempt, but today we’ll focus on one.

Continue reading
0 Comments

How a Single Hacker Stole $100 Million From Two Major Tech Companies

How a Single Hacker Stole $100 Million From Two Major Tech Companies

An unfortunate fact about the modern business world is that any organization that utilizes technology is playing with fire. Cyber attacks can circumvent even the most well-protected networks through the company’s users. This is, unfortunately, something that business owners often don’t learn until they’re on the receiving end of an attack; just like the two companies that fell victim to phishing attempts that were supposedly operated by Evaldas Rimasauskas, a Lithuanian hacker who has been accused of stealing $100 million from them.

Continue reading
0 Comments

Scammers Use Whaling Attack Emails to Pose as Upper Management

Scammers Use Whaling Attack Emails to Pose as Upper Management

The average business owner may already be aware of what are called phishing attacks - scams that attempt to deceive and trick users into handing over sensitive credentials. However, not all phishing attacks are of the same severity, and some are only interested in hauling in the big catch. These types of attacks are called “whaling,” and are often executed in the business environment under the guise of executive authority.

Continue reading
0 Comments

Tip of the Week: 5 Clues that an Email is Really a Phishing Scam

b2ap3_thumbnail_do_not_go_phishing_400.jpgOne of the most masterful arts of deception that hackers use is the phishing attack, which attempts steal sensitive credentials from unwary victims. The anonymity afforded to criminals on the Internet is what makes this possible. Using phishing attacks, hackers attempt to steal credentials or personal records by forging their identities. What’s the best way to protect your business from these attacks?

Continue reading
0 Comments

Don’t Be Duped By a Phishing Attack: 4 Signs to Look Out For

b2ap3_thumbnail_online_phishing_400.jpgYour business is literally assaulted by thousands of threats a day, and they could ruin your organization's goals in an instant if not for your defenses. With such powerful security measures at your disposal, we don’t blame you for lowering your defenses; however, it should be mentioned that your network security doesn’t protect you from all manners of threats. Attacks like phishing scams have a tendency to bypass your security measures, which makes them dangerous.

Continue reading
0 Comments

Some Hackers Are Out to Give IT Departments a Bad Reputation

b2ap3_thumbnail_email_phishing_attacks_400.jpgWe all know that hacking is one of the biggest risks we must deal with in today’s technology-based society. Most hackers out there try to take advantage of the latest vulnerabilities in software, but there are some that use a more sophisticated method. These hackers try take advantage of the weaknesses found in the human psyche, rather than the technological flaws that consistently get patched.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Solid State Drive Best Practices Server Management Enterprise Resource Planning Software Tips Telephone Systems Language Relocation Proactive IT Cloud Google Maps Chromebook Collaboration IT Support Hacks Undo Virtual Desktop Smart Tech Mail Merge Automation Computing Infrastructure Point of Sale Emoji Machine Learning Information Technology Fleet Tracking Mobile Office Deep Learning Tip of the week Geography Break Fix Saving Time Remote Monitoring WPA3 Network Business Help Desk Disaster Resistance Mobile Device Managment Crowdsourcing Cables Heating/Cooling Employee-Employer Relationship Analytics Public Speaking Digital Signature Microsoft Office Consulting Fun Star Wars Windows 8 Bandwidth MSP Alt Codes Programming Finance Automobile Social Engineering Firefox Cloud Computing Motion Sickness Big Data Social Media Asset Tracking Lenovo LiFi Employees Assessment Identities Halloween Upgrades Safety Time Management Business Owner Computers Search Electronic Medical Records Business Computing Network Congestion Android Project Management Bluetooth Compliance Mobility Alert Tablet VoIP Firewall Office Virtual Reality Servers Statistics Security Cameras Save Time Augmented Reality Phishing Permissions Processors Software How To Proactive Spyware Mobile Computing Dark Data Password Private Cloud Paperless Office Laptop Error Maintenance Operating System Holiday Wireless Permission Spam Going Green Customer Service OneNote Recovery User Error Apple Modem Bring Your Own Device Miscellaneous USB Productivity Employer-Employee Relationship Meetings Antivirus Website Management Specifications Smartphones Botnet Test Trending Flexibility Scam Migration Social Technology Tips IT service Comparison Presentation Display Settings History IP Address Customer Relationship Management Managing Stress Managed Service Google E-Commerce Wireless Technology Virus Typing Mobile Hacking Office 365 Update Artificial Intelligence Business Management Printing Entrepreneur Cybercrime HIPAA Co-managed IT Server Human Error Disaster Recovery eWaste Vendor Management Facebook Managed IT Services Screen Reader IoT Healthcare Data loss Scary Stories Documents Multi-Factor Security Taxes Encryption Access Control The Internet of Things Social Networking Managed IT Service G Suite GPS Redundancy Cameras Sports Managed IT iPhone Computer Training Hacker Legal Google Docs Public Cloud Supercomputer IT Technicians Hosted Solutions Law Enforcement Cabling IT Consulting Corporate Profile Tracking Authorization Risk Management Tip of the Week Wi-Fi Marketing Data Warehousing Wearable Technology Web Server Company Culture Staffing Physical Security Computer Repair Cyberattacks Windows 10 Privacy Consumers IT Management Hardware Blockchain Business Technology Domains Data Backup Work/Life Balance Backup Printer Procurement WannaCry Features Malware Distributed Denial of Service Gmail Intranet Administrator Monitors Operations IT Services Chrome YouTube Mobile Device Management Budget CCTV Motherboard Dark Web Email Education Managed Services Provider Cortana Downloads Internet Exlporer Money Mobile Devices Smartphone Hiring/Firing Business Continuity Backup and Disaster Recovery Instant Messaging Politics Address Uninterrupted Power Supply Managed IT services Smart Technology Electronic Health Records Mouse Superfish Mobile Device Productivity Theft Administration Security Data Breach Government Twitter Save Money Notifications Data Disaster Hackers Document Management Hard Drives Unsupported Software Connectivity Cooperation IT Support Enterprise Content Management Infrastructure Chatbots IT Budget Licensing Upgrade Buisness Remote Worker Environment Virtualization How To Apps Avoiding Downtime Ransomware File Sharing Legislation App Read Only Monitoring Patch Management Remote Computing Passwords Bookmarks Cybersecurity Content Filtering 3D Printing Sync VPN Knowledge Troubleshooting Telephony Black Market SharePoint IBM ROI Business Growth Computing Browser Business Intelligence CIO Backups Identity Hard Disk Drive Vulnerabilities Consultation Windows 10 Retail Router Microsoft Excel Cleaning Managed Service Provider Technology Digital Gadget Virtual Private Network Writing Outsourced IT VoIP Communication Users Lithium-ion Battery Net Neutrality Networking Analyitcs Internet of Things Vulnerability Small Business BYOD SaaS IT Consultant Regulations Zero-Day Threat 5G Mirgation Digital Payment Drones Running Cable Files Downtime Current Events Cyber Monday Data Recovery Robot Google Calendar Hard Drive Experience Authentication Favorites User Outlook Efficiency Cookies Computer Care Windows Health Webcam Microsoft Identity Theft Financial Storage End of Support RMM IT solutions Information Data Management Workplace Tips Techology Mobile Security Travel Tech Support PowerPoint Cache BDR Alerts Unified Communications Quick Tips Refrigeration Data storage Word Technology Laws Fraud Hotspot Humor Samsung Innovation PDF Applications Websites Conferencing Personal Information Tech Term WiFi Unified Threat Management communications Remote Monitoring and Management Cost Management Gadgets Staff Cryptocurrency Utility Computing Internet Shortcut Phone System Nanotechnology Recycling Tech Terms Network Security Unified Threat Management Competition Data Security Office Tips Two-factor Authentication Touchscreen Software as a Service Best Practice Google Drive Google Wallet Application Network Management Bitcoin User Tips Development Mobile Data Saving Money Black Friday High-Speed Internet Remote Workers Wires Piracy Hosted Solution

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code