Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Opening the Spam Folder

Tech Term: Opening the Spam Folder

Spam is a tricky subject to talk about, as it seems everyone has a different definition for it. Yet, most have come to the conclusion that spam is a bad thing. For today’s Tech Term, we want to delve deep into the different kinds of spam out there, as well as theorize where the term even came from.

Continue reading
0 Comments

How to Get a Grip On Your Email Inbox

b2ap3_thumbnail_email_best_400.jpgEmail is an aging communication protocol, but it’s still an important asset nonetheless. Even though society continues to push toward bigger and greater things, the modern office still depends on having an email solution for a communication medium. While we can’t get away from email completely, it’s important to make sure that using it is as easy as possible, especially for the busy business owner.

Continue reading
0 Comments

Protect Yourself From Email Attacks By Knowing What to Look For

b2ap3_thumbnail_security_for_email_400.jpgAt the frontlines of the battle to secure your network is your company’s email accounts. Facing an onslaught of spam, malicious links, virus-filled attachments, and more, it’s up to each user to know what to look for and not let it through. This is a task that’s easier said than done.

Continue reading
0 Comments

Don’t Be Duped By a Phishing Attack: 4 Signs to Look Out For

b2ap3_thumbnail_online_phishing_400.jpgYour business is literally assaulted by thousands of threats a day, and they could ruin your organization's goals in an instant if not for your defenses. With such powerful security measures at your disposal, we don’t blame you for lowering your defenses; however, it should be mentioned that your network security doesn’t protect you from all manners of threats. Attacks like phishing scams have a tendency to bypass your security measures, which makes them dangerous.

Continue reading
0 Comments

Some Hackers Are Out to Give IT Departments a Bad Reputation

b2ap3_thumbnail_email_phishing_attacks_400.jpgWe all know that hacking is one of the biggest risks we must deal with in today’s technology-based society. Most hackers out there try to take advantage of the latest vulnerabilities in software, but there are some that use a more sophisticated method. These hackers try take advantage of the weaknesses found in the human psyche, rather than the technological flaws that consistently get patched.

Continue reading
0 Comments

Winter is Coming: Dyre Wolf Malware Can Leave Your Bank Account Looking Stark

b2ap3_thumbnail_phishing_attack_400.jpgWith the critically-acclaimed television series, Game of Thrones returning to viewers this spring, it seems apt to discuss a manner of hacking attack called Dyre Wolf. This particular threat is just as fierce as its name implies, and can potentially cost businesses between $500,000 to $1.5 million per attack. It takes advantage of a multi-step phishing process, and your employees should understand how to avoid attacks like these.

Continue reading
0 Comments

Does Your Company’s Email Solution Optimize Security and Productivity?

b2ap3_thumbnail_email_productivity_400.jpgEmail has revolutionized the way we communicate, but in some cases it can be a dangerous distraction to productivity. This is especially true if your company is trying to maintain its own Exchange mail server. Does having email on the brain give you a headache? If so, you might consider looking into our hosted email Exchange solution.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Maintenance Monitors Net Neutrality Black Friday Content Filtering Printer Virus Computers Mobile Devices Budget Managed IT services Wireless SaaS Refrigeration Disaster Authentication Computer Business Growth Business Owner Twitter Managing Stress Tech Support Point of Sale Microsoft Office Digital Payment Time Management Cache CCTV Notes Smartphones Remote Monitoring Public Speaking Cyberattacks Remote Monitoring and Management IT Consulting Blockchain PDF Utility Computing Quick Tips Automation Troubleshooting The Internet of Things Business Management Outsourced IT Spam Saving Time Wi-Fi Going Green Search Hard Disk Drive Networking Programming Privacy Hiring/Firing Storage Information Printing Cryptocurrency Network Security ROI Hard Drive Innovation Hosted Solution Google Docs Save Time Windows 8 Lenovo Workplace Tips SharePoint Consultation Enterprise Resource Planning Permission Machine Learning Motherboard Solid State Drive Public Cloud Uninterrupted Power Supply 5G WPA3 Saving Money Mobile Device Safety Mobile Office Gadget Network Congestion Bookmarks Tip of the Week Firefox App Recovery Downloads Consulting Entrepreneur Settings Project Management Business Facebook IT Budget Upgrades Sync Vulnerabilities Proactive Training VPN Remote Computing Cookies WannaCry Managed Services Provider USB Apple Current Events Spyware Employee-Employer Relationship Augmented Reality Specifications Employees Motion Sickness Software Unified Communications LiFi Humor Mobile Mobile Security IT service Security Cameras Touchscreen Hard Drives Hotspot YouTube Hacking Virtual Desktop Software as a Service G Suite Bluetooth Cloud VoIP Features Work/Life Balance Multi-Factor Security Firewall Cabling Botnet Corporate Profile eWaste Tech Terms Microsoft Excel Monitoring Taxes Sports Notifications End of Support Data storage Patch Management Router Windows 10 Money Compliance Identity Assessment Save Money Black Market Samsung IoT Hosted Solutions Software Tips Dark Data Unified Threat Management Drones Fraud Education Hacks Mobile Data Data loss Apps History Windows 7 Asset Tracking Analytics Competition Office 365 Private Cloud Operations Office Tips Two-factor Authentication Typing Shortcut Screen Reader Mobile Device Management Mirgation Passwords User Tips Cortana Voice over Internet Protocol Health Webcam Miscellaneous Comparison Legal Digital Signature Social Engineering Vendor Management Business Computing Alt Codes IT Consultant Tech Term Cooperation Piracy Mail Merge Professional Services IT solutions Digital Virtual Private Network Backup and Disaster Recovery Computer Repair PowerPoint Internet of Things Smartphone Gmail Backup Zero-Day Threat Bitcoin Technology Tips Meetings Disaster Recovery Customer Service Files Hackers Mobility Managed IT Office Error Website Company Culture Healthcare IBM Risk Management Regulations Windows 10 Favorites Managed IT Service Phishing Vulnerability Avoiding Downtime Data Backup Finance Customer Relationship Management Cyber Monday Migration Business Technology Chromebook Servers Staffing Cables Conferencing Administrator Network Management Wireless Technology Licensing Alerts User Human Error Robot Proactive IT RMM Internet Exlporer How To Paperless Office Dark Web Personal Information Star Wars Statistics Data Recovery Documents Android Server Management Social Networking Marketing Knowledge Virtual Assistant HIPAA User Error Read Only Data Security Update Physical Security Fun BYOD E-Commerce Encryption Financial IT Technicians IT Services Presentation IT Support Unsupported Software IT Management Experience Computer Care Computing Technology Laws Theft Phone System IT Support Intranet Employer-Employee Relationship Break Fix Microsoft Upgrade Buisness Laptop Network Cleaning Technology Crowdsourcing Websites Techology Connectivity Email Virtualization Data Management Nanotechnology Business Intelligence Flexibility Collaboration Users Help Desk Staff Identities Automobile Permissions Trending IP Address Information Technology Remote Workers Unified Threat Management Ransomware Test Artificial Intelligence Computing Infrastructure Heating/Cooling Address Google Maps Small Business Fleet Tracking Productivity Redundancy Deep Learning Telephony Tablet Environment Social Hacker Management Mobile Computing Applications Wasting Time Wearable Technology Scary Stories Writing Electronic Medical Records Best Practice Managed Service Provider Cloud Computing Alert Display How To Disaster Resistance CIO File Sharing MSP Cybercrime Tracking Superfish Word Google Wallet Communication communications Development Identity Theft Data Scam Social Media Efficiency Consumers Managed Service Outlook Infrastructure Password Running Cable Procurement Co-managed IT Bring Your Own Device Lithium-ion Battery Backups WiFi Google BDR Distributed Denial of Service Chatbots Politics Mobile Device Managment Database Language Domains Holiday Hardware Instant Messaging Big Data Cost Management Google Drive Legislation Processors Electronic Health Records Law Enforcement Server Windows Cameras iPhone Modem Cybersecurity Gadgets Malware Undo Telephone Systems Managed IT Services Government Productivity Wires Authorization Internet Application Mouse Supercomputer 3D Printing Document Management Smart Tech Smart Technology Security Bandwidth Emoji OneNote Retail High-Speed Internet Enterprise Content Management Remote Worker Travel Data Breach Recycling Virtual Reality GPS Operating System Google Calendar Web Server Halloween Tip of the week Antivirus Relocation Data Warehousing Access Control Business Continuity Browser Administration Downtime Best Practices Analyitcs Chrome Geography VoIP

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code