Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Fake Email Invoices Contain Ransomware

b2ap3_thumbnail_ransmoware_article_400.jpgRansomware is still on the rise, and the Federal Bureau of Investigation has labeled it as one of the biggest dangers to businesses of all kinds. Compared to other methods of spreading malware, ransomware has a unique return on investment that keeps hackers wanting more. One new variant of ransomware uses a phishing attack that’s tailored to your real-world address, which is exceptionally concerning for victims.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Virus Law Enforcement IP Address Website Server Drones Hosted Solutions Application How To Cloud Security Cameras Gadgets 3D Printing Applications Taxes Money Development Computer Remote Computing Unified Threat Management Search Cloud Computing Vendor Management GPS Technology Laws Dark Web Financial VPN Technology Tips IoT Domains Uninterrupted Power Supply Assessment User Tips Project Management Intranet Compliance Microsoft Windows 10 WiFi Alerts Maintenance Hacking Office Tips Network Security Wearable Technology Business Intelligence Smart Technology Sync Humor communications Access Control Authentication Hiring/Firing Break Fix Permissions Authorization Managed IT Services Security Microsoft Excel Management Work/Life Balance Fun Blockchain Managed Services Provider Information Password Network Congestion Features Technology Cortana IT solutions Innovation Business Communication Customer Service Point of Sale Printing Best Practice Paperless Office Software Employee-Employer Relationship Mobile Device Managment Telephony Hotspot Word Software as a Service Virtual Assistant Address Google Maps Facebook Cybersecurity Twitter Users Co-managed IT Monitoring Microsoft Office Private Cloud Telephone Systems Computer Care Healthcare Identity Alt Codes Geography Mobile Security CIO Shortcut Budget Hard Disk Drive Motherboard Firewall Digital Google Drive Training Office Specifications Mobile File Sharing Meetings Mirgation Managed Service Small Business Data Warehousing Automobile Tech Terms Hosted Solution ROI Remote Workers Consultation Smart Tech SharePoint Patch Management Flexibility Enterprise Content Management Health Refrigeration Internet Exlporer Mobile Device Management Crowdsourcing Staff Connectivity Favorites LiFi Scam HIPAA Tip of the week User Asset Tracking Google Wallet Bluetooth IT Consulting Business Continuity Employer-Employee Relationship Business Management Government Operating System Politics Upgrade Virtual Desktop Help Desk Identities Computers Windows How To Marketing Phone System Managing Stress Tech Support Unsupported Software Data Management Tablet Redundancy Voice over Internet Protocol Remote Monitoring Vulnerabilities Distributed Denial of Service Google Calendar Artificial Intelligence Alert Save Money Hacker Disaster Recovery Passwords Data Breach Remote Worker Operations Cabling WPA3 Windows 7 IT Support Backups eWaste Social Managed IT Service Motion Sickness Company Culture OneNote Virtualization Techology Finance Avoiding Downtime Programming G Suite Solid State Drive Quick Tips Wires Net Neutrality Encryption Human Error Proactive Halloween Physical Security Disaster Comparison Smartphone Managed Service Provider Cost Management Websites Procurement Cables Mobile Computing Electronic Medical Records Social Media Documents Superfish Public Cloud Mouse Cyberattacks Cooperation Social Engineering Test Document Management Virtual Private Network Black Friday Monitors Database Holiday Analytics Customer Relationship Management Settings YouTube Upgrades Bitcoin Antivirus Retail SaaS Wireless Technology Instant Messaging Google Travel IT Management Troubleshooting Migration Two-factor Authentication Entrepreneur BYOD Business Computing Cryptocurrency VoIP Screen Reader Ransomware IT Services Outsourced IT Recycling Notes Trending USB Corporate Profile Running Cable Wireless Notifications Big Data Typing Mobile Devices High-Speed Internet Augmented Reality Data storage Licensing Phishing WannaCry Software Tips Workplace Tips Computer Repair MSP Webcam Files Productivity IBM Printer Consulting Professional Services Vulnerability Permission Collaboration Experience Consumers Electronic Health Records Update Web Server E-Commerce 5G Digital Signature Modem Theft Unified Communications Bandwidth PowerPoint Analyitcs Display Zero-Day Threat Saving Time Tech Term CCTV Spyware Disaster Resistance Sports Backup Fleet Tracking Cybercrime IT Budget Managed IT Best Practices Administration Apps Mobile Data Mail Merge Bookmarks Productivity Read Only Enterprise Resource Planning Google Docs Chrome Risk Management Buisness Android Cache Nanotechnology Information Technology User Error History Downtime Presentation IT Consultant Administrator Content Filtering Samsung VoIP Personal Information Business Owner Storage PDF Time Management Network Router Automation Public Speaking iPhone The Internet of Things Mobile Office Browser Data loss Email Office 365 Wi-Fi Outlook Remote Monitoring and Management Supercomputer Gadget Networking Spam Chatbots Computing Undo Staffing Language BDR Dark Data Safety Identity Theft Writing Infrastructure Environment Piracy Unified Threat Management Legal IT Technicians Emoji Mobility Fraud Malware Downloads Gmail End of Support Heating/Cooling Internet Save Time Deep Learning Conferencing Windows 8 Legislation Tip of the Week Business Technology Server Management Black Market Processors Firefox Social Networking Robot IT service Cleaning RMM Internet of Things Windows 10 Cookies Star Wars Hardware Managed IT services Error Hacks Laptop Hard Drives Employees Saving Money Privacy Current Events Data Wasting Time Going Green Proactive IT Education Tracking Data Recovery Digital Payment Servers Bring Your Own Device Botnet Touchscreen Hackers Business Growth IT Support Network Management Miscellaneous Hard Drive App Backup and Disaster Recovery Lenovo Lithium-ion Battery Competition Regulations Mobile Device Chromebook Data Security Cyber Monday Smartphones Efficiency Virtual Reality Data Backup Utility Computing Statistics Cameras Computing Infrastructure Machine Learning Knowledge Multi-Factor Security Relocation Recovery Apple Scary Stories

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code