Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Watch Out for Scammers During the Holidays

Tip of the Week: Watch Out for Scammers During the Holidays

Scammers find the holidays to be a wonderful time for stealing from unsuspecting victims. They know that the gift-giving season inspires others to spend a lot of money, which means that sensitive information, like credit card numbers, is up for grabs in bulk. As a consumer yourself, you’ll have to keep an eye out for these scams to make sure that you’re staying as safe as possible this holiday season.

Continue reading
0 Comments

Gift Card Scam Making Problems for Holiday Shoppers

Gift Card Scam Making Problems for Holiday Shoppers

As the modern gift certificate, the gift card has become an institution, especially around the holidays. Thousands of companies offer statically-priced and reloadable gift cards. With that much cheddar flying around it isn’t a surprise that there is big business in gift card theft. The FTC has stated that gift card scams are up a whopping 270 percent since 2015. With so much money at stake, keeping yourself out of the way of the scammers has to be priority one.

Continue reading
0 Comments

Hitman Email Scam Threatens Your Life, Instead of Your Data

Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.

Tags:
Continue reading
0 Comments

Charity Scams Are Very Real. Here’s How To Dodge Them

Charity Scams Are Very Real. Here’s How To Dodge Them

Dealing with disasters are a part of doing business. You know how difficult it is to recover from a devastating flood or storm. While businesses tend to suffer from these situations, countless individuals suffer every time a natural disaster hits. Just take a look at the United States in recent weeks. Even though you may want to donate to people suffering from hurricanes, there are illegitimate charities out there that want to make a quick buck off of your generosity.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Business CIO Money Time Management Firewall Physical Security High-Speed Internet 3D Printing Access Control Tech Terms Data Management Remote Workers Managed Service Servers Digital PowerPoint Firefox Server Migration Tip of the Week Programming Employer-Employee Relationship Licensing Wires Tech Support Legal Security ROI Cooperation Humor Efficiency Project Management Fleet Tracking Remote Monitoring and Management Smart Technology Analyitcs Upgrade Disaster Recovery Windows 10 Windows 10 Solid State Drive Remote Worker Mirgation IT service Laptop eWaste Multi-Factor Security Remote Computing Phone System IBM Dark Data WiFi Retail Printing WannaCry Scam Data loss Gadgets Fraud IoT Electronic Medical Records Hiring/Firing Microsoft Office Uninterrupted Power Supply The Internet of Things User Cyberattacks Digital Payment Cookies LiFi Net Neutrality Touchscreen Telephone Systems Identity Collaboration MSP How To Alt Codes Tip of the week Quick Tips Remote Monitoring Disaster Zero-Day Threat Social Engineering Software as a Service Supercomputer Data Breach Cabling Entrepreneur Facebook Privacy Wireless Mobile Data Assessment Customer Service Healthcare Passwords Environment SharePoint Blockchain Security Cameras Webcam Google Calendar Staffing Cloud Computing Business Continuity Software Bring Your Own Device Business Intelligence Risk Management iPhone Break Fix YouTube Information Technology Managed IT services Internet Automobile Printer communications Mobile Device Management Authentication Authorization Dark Web Wireless Technology Enterprise Resource Planning Drones E-Commerce Software Tips Statistics Notifications Document Management Compliance Education Training Mail Merge Alert Save Money Monitors Troubleshooting Content Filtering Bandwidth Connectivity GPS Technology Laws Unified Threat Management Bluetooth Piracy Cryptocurrency Cyber Monday Wearable Technology Hosted Solutions VoIP Hackers VoIP Cables Crowdsourcing Identities Data Warehousing Storage Processors Personal Information Infrastructure Legislation Modem Customer Relationship Management Virtualization Mobile Devices Scary Stories IT Consulting Language Going Green Hotspot Favorites Data Hacker Computing IT Management Managing Stress Server Management Computers Electronic Health Records Backups Innovation Unified Threat Management IT Services Digital Signature Data storage Proactive IT Word Black Market Best Practice IT solutions IT Technicians WPA3 Bookmarks Meetings Health Lithium-ion Battery Malware SaaS Business Computing Identity Theft CCTV Superfish Mobile Device Staff Mobile Device Managment VPN Screen Reader Small Business Cost Management Upgrades History Two-factor Authentication IT Consultant Users Botnet Hard Drives Business Technology Redundancy Network Congestion Virtual Private Network Twitter Hacking Flexibility Mouse Trending Financial Intranet Employees Presentation Administrator Smartphone Unsupported Software Tablet Vulnerability Recycling Geography BYOD Telephony Password Experience Cache Competition Budget Email Halloween Network Management Writing Vendor Management Tech Term Microsoft Star Wars USB Specifications HIPAA Permissions Managed IT Instant Messaging Consulting Office Internet of Things Google Maps Typing Google Drive Internet Exlporer IT Support Public Cloud Buisness Network Computer Utility Computing Maintenance Saving Money Browser Co-managed IT Business Owner Shortcut Proactive Outsourced IT Google Docs Smartphones Managed IT Services Gmail End of Support Router OneNote Theft Display Features Networking Virus File Sharing Information Development Robot Distributed Denial of Service Techology Big Data Company Culture Help Desk Mobility Automation User Error Office Tips G Suite Cloud Taxes Microsoft Excel Antivirus Human Error Current Events Chrome Augmented Reality Knowledge Test Politics Phishing Paperless Office Business Growth Search Recovery Apps Spyware Hard Disk Drive Business Management Workplace Tips Operations Travel Regulations Smart Tech Technology Tips Relocation Files Motion Sickness Vulnerabilities How To Windows 8 Tracking App Downloads Windows Asset Tracking Downtime Miscellaneous IP Address Save Time Social Media Unified Communications Management Ransomware Refrigeration Spam Android Technology Permission Sports Patch Management Address Error User Tips Monitoring Public Speaking Conferencing Law Enforcement Government Point of Sale Heating/Cooling Apple Deep Learning Holiday Motherboard Consultation Running Cable Black Friday Data Backup Undo Gadget Productivity Read Only Comparison Cleaning Websites Social Networking Virtual Desktop Data Security Saving Time 5G Application Documents Chatbots BDR Managed Service Provider Mobile Security Mobile Computing Website Disaster Resistance Mobile Cybercrime Hacks Computer Repair Emoji Procurement Fun Analytics Backup Network Security Operating System Best Practices Hardware Applications Hard Drive Computer Care Office 365 Social Domains Employee-Employer Relationship Data Recovery Managed Services Provider Encryption Update Work/Life Balance Communication Finance Marketing Chromebook Enterprise Content Management Hosted Solution Computing Infrastructure RMM PDF Lenovo Machine Learning Cameras Managed IT Service Productivity IT Support Bitcoin Backup and Disaster Recovery Outlook Safety Consumers Settings Nanotechnology Cybersecurity Wi-Fi Alerts Google Wallet Administration Virtual Reality Google Web Server Sync Corporate Profile IT Budget Private Cloud Cortana Artificial Intelligence Samsung Mobile Office Avoiding Downtime

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code