Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The SamSam Ransomware Is Absolutely No Joke

The SamSam Ransomware Is Absolutely No Joke

The funny thing about ransomware is that they give them very strange names: Bad Rabbit sounds like the name of a villainous bunny who gets his comeuppance in some type of modern nursery rhyme, not malware that would ravage hundreds of European businesses. Locky seems like the son of Candado de seguridad, a character Medeco would come up with to educate kids on proper physical security. The latest in a long line of funny-named ransomware, SamSam, isn’t a pet name for your pet ferret you perplexingly named Sam, it is one of the worst ransomware strains ever, and it has caught the attention of U.S. Federal law enforcement.

Continue reading
0 Comments

A Ransomware Cyberattack Struck Atlanta, Georgia

A Ransomware Cyberattack Struck Atlanta, Georgia

Ransomware doesn’t discriminate with its targets, as the city of Atlanta, Georgia now knows so painfully well. The city became the target of a ransomware attack that crippled many of its critical system workflows. The municipal government suffered from one of the most advanced and sustained attacks in recent memory.

Continue reading
0 Comments

A New Perspective on Ransomware

A New Perspective on Ransomware

We are going to switch things up a bit and walk you through a retelling of a ransomware attack through the eyes of a business owner. Usually when we talk about these types of threats, we approach it from our perspective and talk about what you should do to prepare and what the threats are, but we wanted to try to show you what an event like this could feel like, for you, in your position, and in your own eyes. We hope that this will raise awareness of how crippling an event like this can be on your company, and we hope you let us know if this perspective helps you, your colleagues, and your staff get a more personal sense of what ransomware can do. Enjoy!

Continue reading
0 Comments

What the Future Holds for Ransomware

What the Future Holds for Ransomware

Ransomware is a growing problem for businesses, being one of the most difficult threats to remove from an infrastructure. Not only is it easy to spread, but difficult to avoid as a whole. How can your organization prepare for this threat? It starts by being mindful of how ransomware is spread and how your employees react to it, both now and in the future.

Continue reading
0 Comments

Targeted Ransomware Checks for Particular Attributes

Targeted Ransomware Checks for Particular Attributes

Put yourself in the shoes of a cybercriminal. If you were to launch a ransomware attack, who would be your target? Would you launch an indiscriminate attack to try to snare as many as you could, or would you narrow your focus to be more selective? As it happens, real-life cybercriminals have largely made the shift to targeted, relatively tiny, ransomware attacks.

Continue reading
0 Comments

30 Schools Shut Down In Montana After Cyber Attack

30 Schools Shut Down In Montana After Cyber Attack

Students generally love it when classes are cancelled for whatever reason, but thanks to a cybercriminal group called TheDarkOverlord Solutions, a school in Flathead Valley, Montana was disrupted for an extended period of time. This downtime resulted in a disruption of operations for over 30 schools, as well as the threat to the personal information of countless teachers, students, and administrators due to a ransomware attack.

Continue reading
0 Comments

Tip of the Week: Ransomware Is Exploding… Is Your Business Ready For The Blast?

Tip of the Week: Ransomware Is Exploding… Is Your Business Ready For The Blast?

When it comes to Internet threats, ransomware is the one that causes the most fear, especially for small and medium-sized businesses, as it should. According to the Cisco 2017 Annual Cybersecurity Report, ransomware is growing at a yearly rate of 350%. It’s time to make sure that you’re doing what you can to stop your business from becoming another ransomware statistic. Here’s five very good tips that will help you avoid becoming a victim of the next big ransomware attack!

Continue reading
0 Comments

Would You Share Your Browser History? This Ransomware Will

Would You Share Your Browser History? This Ransomware Will

Ransomware is a tricky piece of malware that locks down the precious files located on a victim’s computer, then (in theory) will return access to them when a ransom has been paid. Depending on the files stored on a victim’s computer, they might simply blow it off and not worry too much about losing access to a couple of pictures or videos--but what if this ransomware threatened to expose your web browsing history?

Continue reading
0 Comments

Software Patches Take on New Importance After the WannaCry Ransomware Fiasco

Software Patches Take on New Importance After the WannaCry Ransomware Fiasco

On May 11th, 2017, the world was introduced to the WannaCry ransomware. The ransomware spread around the globe like wildfire, infecting hundreds of thousands of devices and catching many major organizations and businesses by surprise. The full extent of the ransomware’s damage is still being assessed, yet, one thing we do know: this whole fiasco was preventable.

Continue reading
0 Comments

A Look Back at 2016’s Biggest Cyber Security Stories

A Look Back at 2016’s Biggest Cyber Security Stories

2016 saw many notorious data breaches, along with developments in malware and other threats to security. It’s always helpful to reflect on these developments so that the knowledge can be used in the future to aid in developing new strategies for taking on the latest threats. How will your business learn from the mistakes of others in 2017?

Continue reading
0 Comments

5 Best Practices to Protect Your Business From Ransomware

5 Best Practices to Protect Your Business From Ransomware

Ransomware is an online threat that continues to develop and evolve to accommodate the motives of cyber criminals around the world. Ransomware locks down your business’s files and demands a decryption key for their safe return, which makes it difficult (or impossible) to move forward with operations. How can you prevent ransomware from destroying your business’s chances of survival?

Continue reading
0 Comments

Some Evil Genius Just Combined the Pyramid Scheme With Ransomware

Some Evil Genius Just Combined the Pyramid Scheme With Ransomware

The ransomware machine keeps moving forward, despite significant opposition. In particular, the ransomware tag-team duo of Petya and Mischa have steamrolled most attempts to block them from accessing critical systems, always finding ways to outsmart security professionals. Now, these ransomwares have adopted a Ransomware as a Service model, which has made significant changes to the way that this ransomware is distributed.

Continue reading
0 Comments

Ransomware: A Hated Malware With an Intriguing Past

Ransomware: A Hated Malware With an Intriguing Past

The short, yet devastating, history of ransomware is littered with what amounts to individual horror stories. As you may well know, ransomware, is a particularly devious and potentially devastating strain of malware that, when enacted, locks a computer’s files down so that the user can’t access them. In their stead, a message is relayed that instructs them to contact a third party to pay a ransom for access to the files. This is where the threat gets its name.

Recent Comments
JackGCombs
What a review https://www.uk.com/how-do-you-do.html... Read More
Monday, 06 August 2018 07:04
CarrollNRobinson
This post about ransomware is so useful for us to read and learn about this. For more updates visit ukbestessays review and read... Read More
Saturday, 27 October 2018 04:36
Continue reading
2 Comments

Alert: Fake Email Invoices Contain Ransomware

b2ap3_thumbnail_ransmoware_article_400.jpgRansomware is still on the rise, and the Federal Bureau of Investigation has labeled it as one of the biggest dangers to businesses of all kinds. Compared to other methods of spreading malware, ransomware has a unique return on investment that keeps hackers wanting more. One new variant of ransomware uses a phishing attack that’s tailored to your real-world address, which is exceptionally concerning for victims.

Continue reading
0 Comments

Ransomware: A Look at Today’s Worst Cyberthreat

b2ap3_thumbnail_get_your_encryption_key_400.jpgThere are many types of malware out there, but few are as scary as ransomware. Imagine being struck by a threat that instantaneously locks down your files and keeps you from accessing them until you pay a certain amount of money. If your business is targeted by ransomware, would you be able to protect it from dragging your operations into a bitter pit of despair?

Continue reading
0 Comments

New Mac-Targeting Ransomware is a Real Bad Apple

b2ap3_thumbnail_iphone_ransomware_400.jpgRansomware has been spreading like wildfire over the past few years, but up until very recently, Mac users were spared from this troubling development. Now, security researchers at Palo Alto Networks have discovered what they believe to be the first instance of completed ransomware on an Apple device. As this threat is “in the wild,” Mac users should be wary of it and see it as a potential threat.

Continue reading
0 Comments

Why Your Business Should Be Concerned About CryptoWall

b2ap3_thumbnail_new_ransomeware_400.jpgRansomware is one of the most devastating computer viruses in today’s computing landscape. You may have heard of one of its most famous variations, Cryptolocker. It received a lot of attention when it dramatically hit the scene two short years ago. Thankfully, the threat from CryptoLocker has decreased after the GameOver Zeus botnet was taken down last year. Although, now we’ve got a new, more contagious strain of this ransomware to deal with known as Cryptowall.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

WannaCry IT Management Workplace Tips Maintenance Cloud Business Technology Uninterrupted Power Supply Undo Refrigeration Augmented Reality Motherboard Antivirus Dark Web IT Support Mobile Data Instant Messaging Monitoring Development Vulnerabilities Intranet eWaste SharePoint Google Drive Word Running Cable Collaboration Application Server Hackers Downtime Innovation Computing Consulting Software as a Service Avoiding Downtime Politics Operations Communication Star Wars Saving Money Legal Read Only Servers YouTube Office Gmail Entrepreneur Twitter IT Technicians Samsung Password IT Support Spam IT Consulting Facebook Webcam Telephony Malware Lithium-ion Battery Emoji Identity Theft Best Practice Cables Content Filtering Smart Technology Server Management Public Cloud Theft Computer Care Big Data Laptop Networking Troubleshooting Website Computer Repair Specifications Hacking Alerts Search GPS Technology Heating/Cooling High-Speed Internet Multi-Factor Security Asset Tracking Fun Lenovo Managing Stress Customer Service Phone System Government Botnet Technology Tips Company Culture E-Commerce Best Practices Hosted Solutions Managed Service Typing Address Current Events Managed IT Services IBM VPN Access Control Display Mobile Computing Enterprise Resource Planning Safety Documents Data loss Virtualization End of Support Mobile Device Management Employees Meetings Android Chrome History Upgrades Patch Management Going Green Smartphones Network Security Cortana IT Budget Firewall Business Owner Managed Services Provider Router LiFi Productivity Gadgets Compliance OneNote Tip of the Week Proactive IT Quick Tips Files Holiday Digital Payment Mobile Device Private Cloud Cybercrime IT Consultant Mobile Device Managment Flexibility Redundancy Computing Infrastructure Healthcare Buisness Windows 10 Machine Learning Screen Reader Websites Migration Environment Physical Security Mobile Security Managed Service Provider Monitors Tech Term Management Microsoft Excel Sync BDR Data Warehousing Cost Management Upgrade Health Solid State Drive Wireless Technology Wireless Spyware Business Management Fleet Tracking PowerPoint Automobile Virtual Private Network Cleaning Printing Alt Codes Financial Cooperation Language Marketing Error Education Browser Cameras Work/Life Balance Employer-Employee Relationship Software Analytics Wi-Fi Information Technology Encryption Knowledge Data Breach Computers Security Domains Permissions Test RMM Backups Customer Relationship Management Training Google Calendar Business Intelligence Social Networking Consultation Piracy Bring Your Own Device Saving Time Cabling Apps Operating System Features Recycling Hard Drives Paperless Office Virtual Desktop Experience Cache G Suite Remote Computing Disaster Resistance Proactive Hardware Update Virus Retail USB Telephone Systems PDF Recovery Windows Tracking Hotspot Security Cameras Efficiency Managed IT Service Email Statistics Authorization Hiring/Firing Time Management Blockchain Automation Identity The Internet of Things Outsourced IT Personal Information Google Docs Storage Mail Merge Managed IT Wires Ransomware Business Growth Help Desk Writing Apple Shortcut Cybersecurity Internet Exlporer Consumers Favorites User Error Software Tips Business Enterprise Content Management Assessment Social Engineering Unified Threat Management BYOD Competition Scam Artificial Intelligence Applications File Sharing Social Tip of the week Passwords Save Time Electronic Health Records Wearable Technology Employee-Employer Relationship Bitcoin Smart Tech Black Market Social Media Remote Worker CCTV Privacy Miscellaneous Comparison Office Tips Bluetooth How To Save Money Office 365 Analyitcs Point of Sale Motion Sickness Distributed Denial of Service Utility Computing IT solutions Data Backup Chromebook Administrator Microsoft Office Windows 8 Web Server Small Business Mobile Supercomputer Connectivity Staff IP Address Mobility Outlook 3D Printing Zero-Day Threat Hacker Network Congestion Superfish Vulnerability Staffing Nanotechnology Halloween Net Neutrality IT service Remote Workers Trending Geography Touchscreen Data Management Licensing Cryptocurrency Firefox Drones IT Services Hard Drive Google Wallet Permission Google Crowdsourcing HIPAA Project Management Phishing Technology Laws Unsupported Software Unified Communications Travel Managed IT services Black Friday ROI Mobile Office Administration Settings Alert Break Fix Downloads Legislation Network Management Relocation Public Speaking Vendor Management Users Google Maps Cookies Computer communications Digital WiFi CIO Conferencing Digital Signature Fraud Virtual Reality Scary Stories Remote Monitoring 5G Printer Money Identities Chatbots Dark Data Microsoft Human Error Hacks Corporate Profile Data Security VoIP Cyberattacks Data storage IoT Mobile Devices Smartphone Presentation Taxes Tech Support Deep Learning Infrastructure Disaster Recovery MSP Productivity Hosted Solution iPhone Notifications Mouse Mirgation Authentication Data Recovery Modem Remote Monitoring and Management Techology User Tips Network Tech Terms SaaS Backup Regulations Business Continuity App Backup and Disaster Recovery Risk Management VoIP Electronic Medical Records Procurement User Bandwidth Unified Threat Management Cloud Computing Robot Hard Disk Drive Bookmarks How To Finance Windows 10 Cyber Monday Programming Co-managed IT Two-factor Authentication Processors Internet of Things Disaster Business Computing WPA3 Data Budget Document Management Gadget Humor Law Enforcement Internet Sports Information Tablet

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code