Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why You Shouldn't Say “Humbug” to Your Security

Why You Shouldn't Say “Humbug” to Your Security

The IT guy, Jacob left last month: to begin with. There is no doubt whatever about that. He left without an exit interview, and he didn’t seem very pleased with the way the situation played out. You could never tell if Scrooge cared or not. His demands have never wavered. He expected perfection and when mistakes were made, they were approached as catastrophic affronts to the sustainability of the business, even if that wasn’t the reality.

Continue reading
0 Comments

Man Responsible for 27 Million Facebook Spam Messages Finally Nabbed

Man Responsible for 27 Million Facebook Spam Messages Finally Nabbed

Cyber security professionals and Internet users rejoice, for the “Spam King,” Sanford Wallace, has finally been sentenced for his longtime use of stolen Facebook credentials to spam other users. Between 2008 and 2009, he had stolen credentials for Facebook accounts, and then used the accounts to send credential-stealing web links. Now, he gets to spend the next two and a half years in prison, and pay an oddly-specific fine of $310,629.

Continue reading
0 Comments

320,000 Customer Passwords Stolen From Time Warner Cable

b2ap3_thumbnail_data_breach_400.jpgYou’ve heard about a ton of high-profile hacks over the past few years, and it’s important to note that these numbers will only continue to climb. A recent incident involving Time Warner Cable, a large ISP in the United States, shows the world that even huge companies that specialize in providing Internet for users can suffer the embarrassment of a data breach.

Continue reading
0 Comments

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Cooperation Recycling Cabling Computing Infrastructure SharePoint 5G Mobile Office Business Intelligence Assessment Notifications Drones Motion Sickness Tip of the week Lithium-ion Battery Connectivity IBM Workplace Tips Data loss Firefox Star Wars Instant Messaging Favorites Computer Upgrades Managed Service Phishing Recovery Chatbots Wireless RMM Time Management Google Wallet Files Save Money Hosted Solution Windows 10 Network Hacker Virtual Reality Modem Communication Content Filtering Redundancy Deep Learning Dark Web Security BDR Internet of Things Consumers Geography Social Media Digital Signature Google Processors Data Warehousing Cables GPS Holiday Cache Running Cable Information Technology ROI IT Management Public Cloud Browser Staffing Database Backups Wi-Fi How To Remote Monitoring and Management Fraud Apple Tech Support Co-managed IT Vulnerability Mirgation Collaboration Cloud Disaster IT Technicians Programming Websites Sports Google Calendar Remote Computing communications Training Wireless Technology Microsoft Office Best Practices Antivirus Travel Unified Threat Management Knowledge Halloween Patch Management Smartphones Telephone Systems Saving Time Enterprise Resource Planning CCTV Competition Upgrade Printing Legislation Data Bluetooth Vendor Management HIPAA Dark Data Ransomware Buisness Physical Security Relocation Outlook Data Breach Hackers Fleet Tracking WiFi Read Only IT Consulting VoIP BYOD Avoiding Downtime Consultation Bandwidth Wearable Technology Techology Regulations Management Data Recovery eWaste Typing Migration Infrastructure Mobile Devices Sync Error Smartphone Virtualization Windows 10 Solid State Drive Windows 7 Writing Supercomputer History Microsoft Excel Distributed Denial of Service Passwords Humor IoT Trending Technology Computer Repair Shortcut Automobile Fun CIO Mobile Remote Worker Productivity Settings Servers Help Desk User Tips Hard Drives Retail E-Commerce Hiring/Firing Undo Business Microsoft Employees Administrator iPhone Social Networking Theft MSP Search Artificial Intelligence Cleaning Asset Tracking Scam Black Friday Bookmarks Virus Technology Laws Managed IT Services Heating/Cooling Facebook Private Cloud Motherboard Computers Managing Stress VoIP Financial Hacks Social Virtual Assistant Conferencing Malware Black Market Corporate Profile Business Continuity Office Router Hard Disk Drive Health Internet Exlporer Outsourced IT Software Tips Presentation Permissions Cortana Cookies Features Hacking Cameras Mobile Computing Alerts Healthcare Current Events Comparison G Suite Point of Sale Government Paperless Office Software as a Service Net Neutrality Notes Cybersecurity Safety Email Finance Flexibility The Internet of Things USB Security Cameras Cloud Computing Wasting Time Electronic Health Records Personal Information Firewall Bring Your Own Device Business Technology Authentication Managed Service Provider Server Management Internet Robot Social Engineering IT solutions Public Speaking Server YouTube Software Hard Drive Remote Monitoring Lenovo Electronic Medical Records Chromebook Spam Refrigeration Politics App User Multi-Factor Security Law Enforcement Cyber Monday Analyitcs Professional Services Proactive IT Operations Nanotechnology Experience Troubleshooting Uninterrupted Power Supply Best Practice Mail Merge Environment Word Google Docs Network Congestion IP Address Password Computing Blockchain Display Encryption Enterprise Content Management Permission Two-factor Authentication Scary Stories Digital Payment Bitcoin Update Managed IT Address Downloads Managed IT Service Productivity Big Data Employee-Employer Relationship Statistics Business Owner Samsung Risk Management Document Management Mobile Device Management Tablet Google Maps Budget Network Management Windows Chrome Compliance WPA3 Information Network Security Cost Management Innovation Managed IT services Hardware Meetings Augmented Reality Web Server Human Error VPN Education Mobile Security Employer-Employee Relationship Saving Money Procurement Webcam Authorization Website Unified Communications Identity Storage Phone System Emoji Administration Cyberattacks OneNote WannaCry Digital Automation Maintenance Applications Consulting Cryptocurrency Data Security Screen Reader Gmail Tech Term Office 365 Licensing Google Drive IT Support Business Management High-Speed Internet Analytics User Error Networking Zero-Day Threat Intranet Identities Piracy Documents Technology Tips Company Culture How To Hotspot Android Backup Alert Computer Care IT service Wires Test Twitter Language Backup and Disaster Recovery Operating System Telephony Business Growth Hosted Solutions Data storage Legal Superfish Machine Learning Tracking Spyware Printer PowerPoint Virtual Desktop IT Support Tip of the Week Mobile Device Data Management Business Computing Users End of Support Access Control Entrepreneur Staff Save Time Domains Gadgets Going Green Application Customer Relationship Management PDF Privacy Customer Service Work/Life Balance Utility Computing Miscellaneous Managed Services Provider 3D Printing Crowdsourcing Gadget Money IT Consultant Alt Codes Remote Workers Project Management Unsupported Software Disaster Resistance Touchscreen Specifications Marketing Data Backup Voice over Internet Protocol Efficiency Mobility Windows 8 Apps Laptop Botnet Mouse Cybercrime Break Fix SaaS File Sharing Disaster Recovery Virtual Private Network Mobile Device Managment Unified Threat Management Office Tips Development Monitors Proactive Mobile Data Small Business Smart Tech Identity Theft Smart Technology Quick Tips Taxes Monitoring Tech Terms Downtime LiFi IT Budget Vulnerabilities IT Services

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...
QR-Code