Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Fake Email Invoices Contain Ransomware

b2ap3_thumbnail_ransmoware_article_400.jpgRansomware is still on the rise, and the Federal Bureau of Investigation has labeled it as one of the biggest dangers to businesses of all kinds. Compared to other methods of spreading malware, ransomware has a unique return on investment that keeps hackers wanting more. One new variant of ransomware uses a phishing attack that’s tailored to your real-world address, which is exceptionally concerning for victims.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Browser Running Cable Remote Computing Touchscreen Safety Multi-Factor Security Disaster Resistance Identities Artificial Intelligence Mobile Device Managment Computers Software as a Service Hacker Business WiFi communications Theft Analyitcs Comparison Tip of the Week Paperless Office Business Intelligence Quick Tips Cache PowerPoint Business Owner Relocation Software Tips Training The Internet of Things Typing Fun Vendor Management IT solutions Router Social Server VPN Emoji Smartphones Information Money Tech Support G Suite Government Law Enforcement Address Encryption Net Neutrality Computer Repair Fraud Hardware Network Congestion Data storage Google Docs Hosted Solution Regulations IT Support Lithium-ion Battery OneNote Best Practice Wi-Fi Writing Google Maps Update Windows 10 Motherboard Managed IT services Botnet Two-factor Authentication Printer Mail Merge Display Security Screen Reader Specifications BDR SharePoint Information Technology Staff IT Consultant Language Email Vulnerability Managed IT Innovation IT service Smartphone Presentation Automobile Maintenance Remote Workers Tablet Business Continuity Risk Management Disaster Managed Service Provider Malware Identity Theft Application Mobile eWaste Technology Laws Downloads Staffing Communication Antivirus Connectivity Smart Tech Ransomware IT Consulting Patch Management Hard Drive Cyberattacks Business Technology Trending Alert Private Cloud Saving Time Redundancy Cookies Networking Solid State Drive Chatbots Search Piracy Undo Network Windows 8 Geography Outlook Disaster Recovery User Backup Wireless Technology Virtualization Recycling Business Growth User Error Google Drive Employee-Employer Relationship Legislation Tip of the week Servers Sync Phishing Save Money Windows 10 Black Friday High-Speed Internet Business Computing Electronic Health Records Going Green Cables Vulnerabilities Travel IT Support Knowledge Tracking Mobile Office Drones Supercomputer Consulting IT Management Wires Compliance Automation Finance Software Bring Your Own Device Dark Web Data loss Instant Messaging Big Data Notifications Monitors IBM Crowdsourcing Black Market Unified Threat Management Google Wallet Point of Sale Data Breach Proactive IT Conferencing Apple Mobile Security Management Consumers Access Control Best Practices Webcam Windows Network Management Websites Cortana Taxes Efficiency File Sharing Mobile Devices Social Engineering Humor Features Data Warehousing Wireless Microsoft Enterprise Resource Planning Saving Money Data Management Cooperation Gadgets Remote Monitoring Refrigeration Entrepreneur Time Management Infrastructure Virus Technology Tips Word Gmail Wearable Technology Hotspot IT Technicians Bitcoin Authentication How To Customer Relationship Management Migration App GPS Remote Worker Assessment Collaboration Managed Services Provider Intranet Identity Chromebook Settings Politics Privacy Modem Storage Hard Disk Drive Marketing Mobility Favorites Computer Chrome VoIP Managed IT Services Human Error Tech Term Processors WannaCry Digital Signature Backup and Disaster Recovery Licensing Environment Virtual Private Network CIO Gadget Error Deep Learning Managing Stress SaaS Small Business Applications Co-managed IT VoIP Buisness Work/Life Balance Administrator Hacking Bluetooth Computer Care Tech Terms Data Recovery Dark Data Documents IT Services Procurement Content Filtering E-Commerce Scary Stories Administration Mobile Device Management Computing Infrastructure Utility Computing Laptop Managed Service Network Security Fleet Tracking Smart Technology Machine Learning Twitter MSP Cleaning Avoiding Downtime Zero-Day Threat Files Budget HIPAA Techology Electronic Medical Records Mouse Authorization User Tips Cabling 3D Printing Alt Codes Cryptocurrency BYOD Downtime Customer Service Business Management Lenovo Cybersecurity Asset Tracking IP Address Website Hacks Hard Drives Flexibility Motion Sickness Mobile Data Employer-Employee Relationship Virtual Desktop Backups Shortcut Project Management Save Time End of Support Google Calendar Hackers Users Cameras Hosted Solutions Operations LiFi Heating/Cooling Legal Recovery Cloud Statistics Experience Facebook Public Speaking Read Only Android Bandwidth Health Corporate Profile Development Hiring/Firing Office Tips Miscellaneous Unified Threat Management Office Company Culture Mobile Device History Upgrades Holiday Internet of Things Permission Microsoft Excel Digital Telephone Systems Productivity Robot Competition Passwords Operating System Current Events Meetings Internet Google Break Fix Cybercrime Firewall Firefox Bookmarks Internet Exlporer Permissions Scam Cloud Computing Digital Payment Technology Phone System Outsourced IT Social Media Virtual Reality Server Management IT Budget Managed IT Service Samsung Remote Monitoring and Management Cyber Monday PDF iPhone Data Telephony Cost Management Office 365 Consultation Personal Information Programming CCTV Printing Augmented Reality WPA3 Sports Uninterrupted Power Supply Data Security How To Education USB Help Desk Distributed Denial of Service Microsoft Office Computing Superfish YouTube Workplace Tips Halloween Financial Nanotechnology ROI Public Cloud RMM Password Mirgation Upgrade Troubleshooting Enterprise Content Management Domains Unified Communications Data Backup Apps Web Server Spyware Analytics Mobile Computing Healthcare Test Monitoring Physical Security Employees Productivity Spam Security Cameras Social Networking Star Wars Retail Document Management Proactive Blockchain Unsupported Software IoT Alerts 5G

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...