Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Watch Out for Scammers During the Holidays

Tip of the Week: Watch Out for Scammers During the Holidays

Scammers find the holidays to be a wonderful time for stealing from unsuspecting victims. They know that the gift-giving season inspires others to spend a lot of money, which means that sensitive information, like credit card numbers, is up for grabs in bulk. As a consumer yourself, you’ll have to keep an eye out for these scams to make sure that you’re staying as safe as possible this holiday season.

Continue reading
0 Comments

Gift Card Scam Making Problems for Holiday Shoppers

Gift Card Scam Making Problems for Holiday Shoppers

As the modern gift certificate, the gift card has become an institution, especially around the holidays. Thousands of companies offer statically-priced and reloadable gift cards. With that much cheddar flying around it isn’t a surprise that there is big business in gift card theft. The FTC has stated that gift card scams are up a whopping 270 percent since 2015. With so much money at stake, keeping yourself out of the way of the scammers has to be priority one.

Continue reading
0 Comments

Hitman Email Scam Threatens Your Life, Instead of Your Data

Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.

Tags:
Continue reading
0 Comments

Charity Scams Are Very Real. Here’s How To Dodge Them

Charity Scams Are Very Real. Here’s How To Dodge Them

Dealing with disasters are a part of doing business. You know how difficult it is to recover from a devastating flood or storm. While businesses tend to suffer from these situations, countless individuals suffer every time a natural disaster hits. Just take a look at the United States in recent weeks. Even though you may want to donate to people suffering from hurricanes, there are illegitimate charities out there that want to make a quick buck off of your generosity.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Cooperation Monitors Operating System Laptop VPN Sports Consultation Scam Tracking Gadget IT Services Assessment Update Procurement Paperless Office Permissions Printing Employees Writing Patch Management G Suite IT Budget Wires Internet of Things Blockchain Development Legislation IT Consultant Motion Sickness Remote Computing Intranet Address Processors Identities 5G Software Tips Current Events Spam Training Regulations Money Business Computing Data Management Humor Firefox Instant Messaging Solid State Drive Wasting Time Permission Network Congestion Word Microsoft Office Software as a Service Smartphone Alt Codes Settings Computer Tech Terms SharePoint PowerPoint Relocation Augmented Reality Gmail Phishing Analytics End of Support Tech Support Avoiding Downtime Computing Uninterrupted Power Supply Trending Mouse Computer Care Backup and Disaster Recovery Fun Authorization Managed Services Provider Robot Dark Web Budget Facebook Techology Files IBM Spyware Alert Remote Monitoring and Management Networking CCTV Content Filtering Information Antivirus Backup Gadgets Heating/Cooling Virus BYOD Quick Tips IT service Cloud Computing Public Cloud Virtual Private Network Favorites Router Time Management App Enterprise Content Management Chatbots iPhone Telephone Systems Corporate Profile Cyber Monday Network Management Holiday Read Only Theft Computing Infrastructure Nanotechnology Hotspot IT solutions Mobile Device Managment 3D Printing Specifications Language Innovation Productivity Remote Workers Outsourced IT Hacks eWaste Recycling Buisness Windows 7 User Tech Term Cleaning Physical Security Application Deep Learning History Staffing Remote Monitoring Data storage Technology Consulting Data loss IT Support Hosted Solutions Maintenance Unsupported Software Screen Reader Social How To HIPAA Entrepreneur Server Management Technology Laws Managed IT Services Test Fleet Tracking Apple Proactive Applications Security Cameras Staff PDF Financial Firewall IT Support Programming VoIP Unified Communications Risk Management Running Cable Politics Mirgation Business Management Electronic Health Records Hacking Downloads Data Warehousing Alerts Chromebook Personal Information Hardware Wearable Technology Virtual Desktop Professional Services Experience Hiring/Firing Cookies Ransomware Infrastructure SaaS Google Wallet Cost Management Bandwidth Windows 10 User Tips Recovery Retail Business Continuity Business Owner Printer Licensing Automobile Meetings Outlook Features Social Networking Office Tips Modem Cabling Project Management Technology Tips Mobile Devices Environment Motherboard Save Time Customer Service Virtual Assistant Government Multi-Factor Security Hard Drives Server Legal Touchscreen Undo Mobile Computing Hackers Virtualization GPS Scary Stories Star Wars Lithium-ion Battery Asset Tracking Vulnerabilities Network Security RMM Identity Theft Microsoft Excel Management Artificial Intelligence Work/Life Balance Crowdsourcing IoT Lenovo Disaster Resistance Telephony Windows BDR CIO MSP Cortana Error Software Net Neutrality Servers Point of Sale Managed IT Mobile Data Superfish E-Commerce Managed IT services Bookmarks Data Security Supercomputer Mail Merge Managed Service Provider Halloween Private Cloud Bring Your Own Device Redundancy Document Management Business Intelligence Users IT Management VoIP Websites File Sharing Taxes High-Speed Internet Conferencing Hard Disk Drive Google Calendar Social Engineering Proactive IT Compliance Authentication Downtime Webcam IT Consulting Marketing WannaCry Data Backup Presentation Health Administration Employer-Employee Relationship Disaster Website Web Server Cache Monitoring User Error Comparison YouTube Managing Stress communications Cables Backups Cybercrime Wireless Cryptocurrency Troubleshooting Digital Signature Disaster Recovery Mobile Office Administrator Information Technology Travel Mobile Device Management Virtual Reality Bitcoin Save Money The Internet of Things Smart Tech Analyitcs Hosted Solution Business Phone System Vendor Management Education Geography Chrome Safety Google Maps Identity Internet Exlporer Botnet Google Docs Digital Access Control Best Practice Digital Payment Tip of the week Computers IP Address Zero-Day Threat Unified Threat Management OneNote Bluetooth Distributed Denial of Service Encryption Computer Repair Managed Service Finance Two-factor Authentication Security Typing Upgrades Knowledge IT Technicians Mobile Tip of the Week Flexibility Notifications Communication Shortcut Managed IT Service Collaboration Break Fix Refrigeration Browser Data Recovery Internet Company Culture Network Notes Miscellaneous Going Green Co-managed IT Google Drive Search Office Mobility Healthcare Dark Data Public Speaking Email Big Data Migration Documents Automation USB Unified Threat Management Drones Smartphones Cameras Machine Learning Android Best Practices Cybersecurity Voice over Internet Protocol Mobile Security Piracy Passwords Data Breach Law Enforcement Office 365 Operations Human Error Smart Technology Small Business Saving Money Business Growth Connectivity Business Technology Hard Drive Black Market Utility Computing Saving Time How To Workplace Tips Hacker Tablet Consumers Competition Productivity Database Mobile Device Wireless Technology Electronic Medical Records Windows 10 Emoji Efficiency Customer Relationship Management Cloud Windows 8 Malware ROI Storage LiFi WiFi Apps Sync Black Friday Upgrade Vulnerability Remote Worker Samsung Privacy Employee-Employer Relationship Domains Google Display Help Desk Data Password Enterprise Resource Planning Statistics Microsoft Cyberattacks Twitter WPA3 Fraud Social Media Wi-Fi

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code