Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving New Jersey since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

2-Factor, 2-Furious - How 2FA is Our Last Hope

2-Factor, 2-Furious - How 2FA is Our Last Hope

Two-factor Authentication, also referred to as Multi-Factor Authentication, or 2FA, is typically where you log in to something and have to type in a small code from your mobile device in order to finish the sign-in process. It’s really the only thing protecting your accounts anymore, so it’s critical to use it.

Continue reading
0 Comments

Let’s Go Through Some Security Best Practices

Let’s Go Through Some Security Best Practices

While there is no question that security is important to any business, there is often a disconnect between this principle and any actual implementations that it reflects. Unfortunately, this can often leave a business vulnerable. To prevent this outcome, it is important that you follow a few best practices when it comes to fortifying your business against attack.

Continue reading
0 Comments

Data Security is Essential

Data Security is Essential

Today, the threats businesses encounter from the Internet are more frequent and dangerous than any previous threats. To avoid being the victim of a cyberattack, you will need strategies and procedures aimed at mitigating them. Let’s look at some strategies you need to consider if you are to keep the threats off your network. 

Continue reading
0 Comments

We Need to Flatten the Curve of Cybersecurity Risk

We Need to Flatten the Curve of Cybersecurity Risk

People have been examining the COVID-19 pandemic and the resulting economic and social shutdown from every angle. Unfortunately, some of those people took it as the opportunity they’ve been waiting for to try and steal data and in some cases money from unprotected and unprepared people and businesses online. Let’s examine how the events surrounding COVID-19 have had an effect on cybercrime.

Continue reading
0 Comments

Tip of the Week: Best Practices to Protect Your Business

Tip of the Week: Best Practices to Protect Your Business

There are many different varieties of cybercrime that businesses need to be vigilant about. However, most of these varieties can largely be avoided through a few basic practices and behaviors. Here, we’re giving you a few tips to help you prevent attacks from successfully influencing your business, so make sure you share them with your entire team, as well.

Continue reading
0 Comments

Don’t Get Phished Out of Your Stimulus Payment

Don’t Get Phished Out of Your Stimulus Payment

Wherever there is money, there are scammers. So it may not be a big surprise that scammers are out in masses trying to get between you and your federally mandated stimulus money.  It’s bad enough that we’ve already seen a couple of phishing scams using the COVID-19 pandemic that are designed to help hackers get into accounts they have no business in, now that these scammers know that people are getting cash, the scams are kicked up a notch.

Continue reading
0 Comments

Tip of the Week: Making Sure Your Workstation is Sanitized

Tip of the Week: Making Sure Your Workstation is Sanitized

We spend a lot of time on this blog talking about virus avoidance, but today we thought we would go into things you can do to keep another type of virus--specifically COVID-19--away from you and your technology.

Continue reading
0 Comments

Protect Your Laptop from Theft

Protect Your Laptop from Theft

We talk about cybersecurity a lot. We talk about protecting your data from the illusive threat that hackers and cybercriminals bring. We don’t often talk about the more obvious type of security - preventing the physical theft of your data. I think it’s time.

Continue reading
0 Comments

Working from Home Isn’t Without Significant Cybersecurity Risks

Working from Home Isn’t Without Significant Cybersecurity Risks

The COVID-19 pandemic has greatly disrupted daily life, restricting people to their homes and preventing them from going into the office to work. In response, many companies are hurriedly changing over to a remote-capable workforce and having their employees work from home. This strategy can be highly effective, but if a company and its team isn’t careful, it can also be risky.

Continue reading
0 Comments

Biometrics Has a Privacy Problem

Biometrics Has a Privacy Problem

The inclusion of biometric security systems have been all the rage in a range of organizations, due, in large part, because of the thought that other security platforms aren’t nearly as secure. Unfortunately, the superior security they are expecting may not be able to meet their expectations. Today, we will discuss biometric security, where it fits, and how it can be problematic for the small business. 

Continue reading
0 Comments

How to Create Cybersecurity Policies for Your Company

How to Create Cybersecurity Policies for Your Company

If you’re in business today, there are three words that are critical for you keep in mind: Cybersecurity. Is. Important. As such, every business needs to have taken the time to put together a cybersecurity policy--a set of guidelines that instruct the business how to proceed with the highest level of security possible. We’ve taken the liberty of suggesting a few guidelines for your business to follow as you do so.

Continue reading
0 Comments

Are Your Biggest Threats Coming From Inside Your Company?

Are Your Biggest Threats Coming From Inside Your Company?

Most businesses that really lean on their IT go to great lengths and expense to keep those systems secure. Sometimes, however, all those firewalls and antivirus software don’t stop threats that come in from your staff. Today, we are going to go through the three different types of human error that your staff can undertake, and how to deal with each.

Continue reading
0 Comments

Tip of the Week: 3 Easy Actions That Will Protect Your Data

Tip of the Week: 3 Easy Actions That Will Protect Your Data

The modern business has to deal with a lot of potential security problems. Today’s threat landscape is filled with people looking to prosper off of your misfortune. As a result, doing what you can to maintain the security of your network and data is essential. Today, we will discuss how maintaining your organizational cybersecurity doesn’t have to be costly or time consuming.The best way we’ve found to go about doing this is by highlighting a few key actions that you can take to keep your network secure and your data safe.

Continue reading
0 Comments

Microsoft is Finding Leaving Windows 7 Users Behind Difficult

Microsoft is Finding Leaving Windows 7 Users Behind Difficult

Windows 7 might not be supported by Microsoft any longer, but millions of people are still using PCs that run the antiquated operating system. Since Microsoft has put an end to extended support for Windows 7 OS, a couple bugs have been found. Let’s take a look at what exactly is behind these issues and discuss your options.

Continue reading
0 Comments

Tip of the Week: Activate Microsoft’s Two-Step Verification

Tip of the Week: Activate Microsoft’s Two-Step Verification

Nowadays a lot of accounts give you the option to set up two-step authorization; and, most of the time you probably should. The security and privacy benefits that your business can gain are substantial. Today, we’ll describe how to enable what Microsoft calls two-step verification. 

Continue reading
0 Comments

Taking a Look at the Current Cybercrime Statistics

Taking a Look at the Current Cybercrime Statistics

Organizational cybersecurity has to be a priority for every business. These days, companies are getting hacked left and right and being exposed to some of the very worst malware ever created. Today, we will take a look at some cybercrime statistics that will put in perspective just how damaging cybercrime is.

Continue reading
0 Comments

Privacy Laws Are Changing Compliance

Privacy Laws Are Changing Compliance

Most companies have some sort of regulation they need to stay compliant to, and 2020 seems to be a landmark year. This year, companies have to deal with end-of-life upgrades, the development of new privacy laws, as well as the existing regulatory landscape. Let’s take a look at why compliance is important and what to expect in the year ahead.

Continue reading
0 Comments

Tip of the Week: Simple Practices to Secure Your Wi-Fi

Tip of the Week: Simple Practices to Secure Your Wi-Fi

Wi-Fi has swiftly become one of those amenities that we just expect to have, including in the workplace. While it does make work around the office more convenient, it should not be at the cost of your security. To help prevent this, we’re reviewing a few key Wi-Fi security considerations to keep in mind.

Continue reading
0 Comments

Promoting Data Privacy

Promoting Data Privacy

Today, everything we do on the computer and on our phones creates data. Organizations that are good at utilizing this data, often look to capture everything that they can. This can leave the individual searching for a way to keep his/her data secure. Let’s take a look at some of the best practices used to prioritize individual data privacy.

Continue reading
0 Comments

Baseline Cybersecurity

Baseline Cybersecurity

More than any time before, cybersecurity has to be a major consideration for businesses. It is, in fact, one of the biggest problems the modern business has to face day-in and day-out. Shortage in cybersecurity talent and antiquated strategies are making it difficult for businesses to find the knowledgeable resources that will help them work to secure their network and data from threats to the business.  

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Top Blog

Data security and protection solutions that can scale to any business size. You’ll be able to identify and prevent threats, assure business continuity and keep everyone confident. Learn more here: oal.lu/123s1 Contact us to find out more: sales@tconnection.com...
QR-Code dieser Seite