Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The SamSam Ransomware Is Absolutely No Joke

The SamSam Ransomware Is Absolutely No Joke

The funny thing about ransomware is that they give them very strange names: Bad Rabbit sounds like the name of a villainous bunny who gets his comeuppance in some type of modern nursery rhyme, not malware that would ravage hundreds of European businesses. Locky seems like the son of Candado de seguridad, a character Medeco would come up with to educate kids on proper physical security. The latest in a long line of funny-named ransomware, SamSam, isn’t a pet name for your pet ferret you perplexingly named Sam, it is one of the worst ransomware strains ever, and it has caught the attention of U.S. Federal law enforcement.

Continue reading
0 Comments

A Ransomware Cyberattack Struck Atlanta, Georgia

A Ransomware Cyberattack Struck Atlanta, Georgia

Ransomware doesn’t discriminate with its targets, as the city of Atlanta, Georgia now knows so painfully well. The city became the target of a ransomware attack that crippled many of its critical system workflows. The municipal government suffered from one of the most advanced and sustained attacks in recent memory.

Continue reading
0 Comments

A New Perspective on Ransomware

A New Perspective on Ransomware

We are going to switch things up a bit and walk you through a retelling of a ransomware attack through the eyes of a business owner. Usually when we talk about these types of threats, we approach it from our perspective and talk about what you should do to prepare and what the threats are, but we wanted to try to show you what an event like this could feel like, for you, in your position, and in your own eyes. We hope that this will raise awareness of how crippling an event like this can be on your company, and we hope you let us know if this perspective helps you, your colleagues, and your staff get a more personal sense of what ransomware can do. Enjoy!

Continue reading
0 Comments

What the Future Holds for Ransomware

What the Future Holds for Ransomware

Ransomware is a growing problem for businesses, being one of the most difficult threats to remove from an infrastructure. Not only is it easy to spread, but difficult to avoid as a whole. How can your organization prepare for this threat? It starts by being mindful of how ransomware is spread and how your employees react to it, both now and in the future.

Continue reading
0 Comments

Targeted Ransomware Checks for Particular Attributes

Targeted Ransomware Checks for Particular Attributes

Put yourself in the shoes of a cybercriminal. If you were to launch a ransomware attack, who would be your target? Would you launch an indiscriminate attack to try to snare as many as you could, or would you narrow your focus to be more selective? As it happens, real-life cybercriminals have largely made the shift to targeted, relatively tiny, ransomware attacks.

Continue reading
0 Comments

30 Schools Shut Down In Montana After Cyber Attack

30 Schools Shut Down In Montana After Cyber Attack

Students generally love it when classes are cancelled for whatever reason, but thanks to a cybercriminal group called TheDarkOverlord Solutions, a school in Flathead Valley, Montana was disrupted for an extended period of time. This downtime resulted in a disruption of operations for over 30 schools, as well as the threat to the personal information of countless teachers, students, and administrators due to a ransomware attack.

Continue reading
0 Comments

Tip of the Week: Ransomware Is Exploding… Is Your Business Ready For The Blast?

Tip of the Week: Ransomware Is Exploding… Is Your Business Ready For The Blast?

When it comes to Internet threats, ransomware is the one that causes the most fear, especially for small and medium-sized businesses, as it should. According to the Cisco 2017 Annual Cybersecurity Report, ransomware is growing at a yearly rate of 350%. It’s time to make sure that you’re doing what you can to stop your business from becoming another ransomware statistic. Here’s five very good tips that will help you avoid becoming a victim of the next big ransomware attack!

Continue reading
0 Comments

Would You Share Your Browser History? This Ransomware Will

Would You Share Your Browser History? This Ransomware Will

Ransomware is a tricky piece of malware that locks down the precious files located on a victim’s computer, then (in theory) will return access to them when a ransom has been paid. Depending on the files stored on a victim’s computer, they might simply blow it off and not worry too much about losing access to a couple of pictures or videos--but what if this ransomware threatened to expose your web browsing history?

Continue reading
0 Comments

Software Patches Take on New Importance After the WannaCry Ransomware Fiasco

Software Patches Take on New Importance After the WannaCry Ransomware Fiasco

On May 11th, 2017, the world was introduced to the WannaCry ransomware. The ransomware spread around the globe like wildfire, infecting hundreds of thousands of devices and catching many major organizations and businesses by surprise. The full extent of the ransomware’s damage is still being assessed, yet, one thing we do know: this whole fiasco was preventable.

Continue reading
0 Comments

A Look Back at 2016’s Biggest Cyber Security Stories

A Look Back at 2016’s Biggest Cyber Security Stories

2016 saw many notorious data breaches, along with developments in malware and other threats to security. It’s always helpful to reflect on these developments so that the knowledge can be used in the future to aid in developing new strategies for taking on the latest threats. How will your business learn from the mistakes of others in 2017?

Continue reading
0 Comments

5 Best Practices to Protect Your Business From Ransomware

5 Best Practices to Protect Your Business From Ransomware

Ransomware is an online threat that continues to develop and evolve to accommodate the motives of cyber criminals around the world. Ransomware locks down your business’s files and demands a decryption key for their safe return, which makes it difficult (or impossible) to move forward with operations. How can you prevent ransomware from destroying your business’s chances of survival?

Continue reading
0 Comments

Some Evil Genius Just Combined the Pyramid Scheme With Ransomware

Some Evil Genius Just Combined the Pyramid Scheme With Ransomware

The ransomware machine keeps moving forward, despite significant opposition. In particular, the ransomware tag-team duo of Petya and Mischa have steamrolled most attempts to block them from accessing critical systems, always finding ways to outsmart security professionals. Now, these ransomwares have adopted a Ransomware as a Service model, which has made significant changes to the way that this ransomware is distributed.

Continue reading
0 Comments

Ransomware: A Hated Malware With an Intriguing Past

Ransomware: A Hated Malware With an Intriguing Past

The short, yet devastating, history of ransomware is littered with what amounts to individual horror stories. As you may well know, ransomware, is a particularly devious and potentially devastating strain of malware that, when enacted, locks a computer’s files down so that the user can’t access them. In their stead, a message is relayed that instructs them to contact a third party to pay a ransom for access to the files. This is where the threat gets its name.

Recent Comments
JackGCombs
What a review https://www.uk.com/how-do-you-do.html... Read More
Monday, 06 August 2018 07:04
CarrollNRobinson
This post about ransomware is so useful for us to read and learn about this. For more updates visit ukbestessays review and read... Read More
Saturday, 27 October 2018 04:36
Archer Angas
https://www.fakenamegenerator.com/gen-random-au-us.php... Read More
Friday, 01 February 2019 19:46
Continue reading
3 Comments

Alert: Fake Email Invoices Contain Ransomware

b2ap3_thumbnail_ransmoware_article_400.jpgRansomware is still on the rise, and the Federal Bureau of Investigation has labeled it as one of the biggest dangers to businesses of all kinds. Compared to other methods of spreading malware, ransomware has a unique return on investment that keeps hackers wanting more. One new variant of ransomware uses a phishing attack that’s tailored to your real-world address, which is exceptionally concerning for victims.

Continue reading
0 Comments

Ransomware: A Look at Today’s Worst Cyberthreat

b2ap3_thumbnail_get_your_encryption_key_400.jpgThere are many types of malware out there, but few are as scary as ransomware. Imagine being struck by a threat that instantaneously locks down your files and keeps you from accessing them until you pay a certain amount of money. If your business is targeted by ransomware, would you be able to protect it from dragging your operations into a bitter pit of despair?

Continue reading
0 Comments

New Mac-Targeting Ransomware is a Real Bad Apple

b2ap3_thumbnail_iphone_ransomware_400.jpgRansomware has been spreading like wildfire over the past few years, but up until very recently, Mac users were spared from this troubling development. Now, security researchers at Palo Alto Networks have discovered what they believe to be the first instance of completed ransomware on an Apple device. As this threat is “in the wild,” Mac users should be wary of it and see it as a potential threat.

Continue reading
0 Comments

Why Your Business Should Be Concerned About CryptoWall

b2ap3_thumbnail_new_ransomeware_400.jpgRansomware is one of the most devastating computer viruses in today’s computing landscape. You may have heard of one of its most famous variations, Cryptolocker. It received a lot of attention when it dramatically hit the scene two short years ago. Thankfully, the threat from CryptoLocker has decreased after the GameOver Zeus botnet was taken down last year. Although, now we’ve got a new, more contagious strain of this ransomware to deal with known as Cryptowall.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Education IT service Mobile Computing Spam How To Employer-Employee Relationship RMM Deep Learning Computer App Cost Management Hiring/Firing IT Services Saving Time Techology Robot Internet Mail Merge Meetings History Money Software as a Service Public Cloud Mobile Devices Permissions Innovation Healthcare Gadget Twitter Utility Computing Downloads Windows Risk Management Writing Browser Migration Files Authorization Outlook Hard Drive Phone System Data loss Employee-Employer Relationship Managed IT Motion Sickness Motherboard Printer E-Commerce Identity Patch Management Sports Botnet Hackers Managed IT Services Asset Tracking Electronic Health Records Halloween Legislation The Internet of Things Settings Alt Codes Antivirus Presentation Zero-Day Threat Social Engineering Trending High-Speed Internet Domains Computing Uninterrupted Power Supply Tech Support Server Google Drive Geography Best Practice Small Business Microsoft 5G Work/Life Balance Mobile Business Intelligence Point of Sale Hacker eWaste Office Tips Sync Private Cloud Remote Worker Alerts Mobile Device Management IT Support Smart Tech Knowledge WiFi Vulnerabilities Android Personal Information Test Screen Reader Drones Tracking Employees Business Technology Managed IT services Language Technology Taxes Google Wallet Avoiding Downtime Mobile Device Wi-Fi Human Error Google Maps Public Speaking Blockchain Software Tips Cortana Relocation Cryptocurrency Black Friday Business Continuity Operating System Proactive Fraud Privacy Collaboration Smartphone Budget Assessment Networking Data Artificial Intelligence Marketing Business Tech Term Chromebook Printing Time Management Identity Theft Websites Security Cameras Cache Flexibility Finance Information Data Backup Infrastructure Specifications communications Running Cable Cooperation Smartphones Automobile PDF Dark Web Black Market Workplace Tips Managed Service Cyberattacks Hosted Solution Going Green Email Error Net Neutrality Update IBM Vulnerability Office Legal Bitcoin Webcam WPA3 Web Server Hardware Solid State Drive Security Search Cyber Monday Application Network Management IT solutions IoT Fun Internet Exlporer Business Growth Microsoft Excel Google Calendar Physical Security Help Desk Passwords Troubleshooting Apple Piracy Firefox Save Money Disaster Recovery Features Administrator File Sharing Microsoft Office Hacks Mobile Security Data Management Router Cleaning Unsupported Software Bluetooth Financial Scam Spyware Office 365 Customer Relationship Management Mirgation Wearable Technology Apps Cloud Computing Hacking Enterprise Content Management IT Consulting Augmented Reality Environment Staff Windows 10 BYOD Automation Dark Data Multi-Factor Security Miscellaneous Remote Workers Google Mobile Data Encryption Samsung Enterprise Resource Planning Law Enforcement Mobile Office Database Cabling Intranet Mobility IT Budget Wasting Time Read Only Managed Services Provider Virtual Assistant Digital Payment Backup and Disaster Recovery Undo How To Chrome Modem IP Address Software Cloud Digital Windows 10 Retail Development Cybersecurity Operations Shortcut Bring Your Own Device Health User IT Consultant Best Practices Communication SharePoint Typing Programming Productivity Favorites Virtual Reality VoIP IT Support Hosted Solutions Gmail Electronic Medical Records Mobile Device Managment Consultation Monitoring Cameras Smart Technology End of Support Telephone Systems Crowdsourcing Management Co-managed IT Staffing Business Computing Notes Bandwidth Machine Learning Licensing Computer Care Administration Theft Saving Money Company Culture MSP Internet of Things Mouse Touchscreen Monitors Display Remote Monitoring Tablet Document Management Unified Communications LiFi Business Management Refrigeration Alert Customer Service Consumers Statistics Analytics Upgrades Backups Network Congestion Social Wireless Save Time Humor Big Data Training User Tips Documents Network Security Experience Data Security Managing Stress 3D Printing Website Holiday Computer Repair Scary Stories Bookmarks Data Recovery Outsourced IT Unified Threat Management Lenovo Supercomputer Safety Conferencing BDR Heating/Cooling HIPAA Computers User Error Managed Service Provider Access Control Efficiency Remote Computing Gadgets Processors ROI Content Filtering Proactive IT Competition Emoji Paperless Office Data storage Project Management Virtual Desktop Two-factor Authentication PowerPoint Users iPhone Firewall Social Networking Business Owner VoIP Recycling OneNote Address Google Docs Virtualization YouTube Procurement Storage Data Warehousing IT Technicians Windows 7 Consulting VPN Recovery Superfish Quick Tips Remote Monitoring and Management Upgrade Downtime Travel CCTV Identities Ransomware Permission Facebook Fleet Tracking Authentication Wireless Technology Comparison Server Management G Suite Malware Technology Tips Unified Threat Management Phishing Windows 8 WannaCry Instant Messaging Tip of the week Tech Terms Virtual Private Network Nanotechnology Network Break Fix Redundancy Technology Laws Disaster Resistance Social Media Productivity Cybercrime Lithium-ion Battery Maintenance Connectivity Compliance Current Events Hotspot Backup Government Data Breach Telephony Notifications Digital Signature Voice over Internet Protocol Tip of the Week Buisness Word Politics CIO Applications Servers GPS Virus SaaS Regulations Computing Infrastructure USB Corporate Profile Star Wars Wires Entrepreneur Professional Services Vendor Management Analyitcs Distributed Denial of Service Password Disaster Information Technology IT Management Hard Drives Cookies Chatbots Hard Disk Drive Managed IT Service Laptop Cables

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...
QR-Code