Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Should Companies Be Punished for Data Breaches?

Should Companies Be Punished for Data Breaches?

We’ve all seen and heard about companies and government departments that have experienced major security and data loss events. Once the event is made public, there is a media frenzy of coverage disclosing answers to questions like: Were your records compromised? How can you protect nonpublic information in the future? What should you do if you are a victim? However, as the media focus moves to another topic, the breach becomes yesterday’s news - and there is very little coverage of what repercussions and penalties those entities that were breached faced - if any.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Tip of the Week Refrigeration End of Support Bring Your Own Device Remote Monitoring and Management Virtualization Augmented Reality Assessment Display Analyitcs Disaster iPhone communications Solid State Drive Cortana Regulations Files Microsoft Office Remote Worker Disaster Recovery Business Continuity Alert Multi-Factor Security Distributed Denial of Service Vendor Management IoT Gmail Point of Sale LiFi Documents Dark Data Domains Printing Test Knowledge eWaste Browser Managing Stress Permission Information Trending Blockchain Office 365 Infrastructure Bandwidth Server Management Unified Threat Management Quick Tips Procurement Recovery Sync Migration HIPAA Techology Geography Data Recovery Website Zero-Day Threat Laptop Downloads RMM Nanotechnology Deep Learning Writing OneNote The Internet of Things Applications IT Consulting Corporate Profile Electronic Health Records Government Maintenance Malware Buisness WannaCry Mobile Device Office Notifications Users Processors Word Wireless Phone System Favorites Touchscreen E-Commerce Mobility MSP Star Wars Halloween Managed IT Service Motion Sickness Content Filtering Encryption Network WiFi Router Black Market Social Engineering Ransomware Google Docs CCTV Backup Humor Antivirus Smartphone Software as a Service Cloud Computing Compliance Save Time Read Only Managed Services Provider Politics Hacks Upgrades Artificial Intelligence Unified Threat Management Legal Access Control Computer Care Data Backup User Tips Mobile Devices Wearable Technology Cybersecurity Cybercrime PowerPoint Emoji Cabling Piracy Network Security Finance Motherboard Technology Laws Development Budget Current Events IT Consultant Innovation Law Enforcement Bitcoin Business Growth Consulting Firewall Network Congestion Typing YouTube Lenovo Comparison Error Screen Reader Risk Management Administrator Outsourced IT Marketing Identity Theft Experience Android Networking How To Windows 10 Unified Communications Identity Miscellaneous Tablet 5G Computer Repair Mobile Security VPN Electronic Medical Records Web Server Travel Internet Dark Web App WPA3 SaaS Bluetooth Data Breach Computers Windows 10 Update Employee-Employer Relationship Operations Specifications Managed IT Hiring/Firing Programming Productivity Business Technology Virus G Suite Chrome Windows 8 Flexibility Hacking Monitors Public Speaking Cyber Monday Productivity Social Media Chromebook Security Cameras Remote Workers Managed IT services Drones PDF IT Services Digital Payment Tip of the week Information Technology Staffing Facebook Healthcare Recycling Websites Phishing IBM Virtual Reality Gadget Hosted Solution Virtual Private Network Managed IT Services Redundancy Data Botnet Scary Stories IT Support Mobile Computing Mobile Device Managment Apple Google Drive Virtual Desktop Upgrade Backups Gadgets Crowdsourcing Webcam Proactive Licensing Collaboration Telephony Spyware Robot IT Support Cyberattacks Google Calendar Workplace Tips Data Warehousing File Sharing Mail Merge Retail Sports Saving Money Technology Tips Financial Presentation Tracking Cooperation Software Tips Software Social Networking Consumers Microsoft Excel Connectivity Business Intelligence Management Meetings Mirgation Employer-Employee Relationship Uninterrupted Power Supply Disaster Resistance Company Culture Alerts Authorization Internet of Things Avoiding Downtime Smart Tech Conferencing Telephone Systems Best Practice Machine Learning Relocation Security Taxes Physical Security Running Cable Hard Drives Scam Address Smartphones Remote Monitoring Co-managed IT Heating/Cooling Windows Safety Net Neutrality Office Tips Data Management Managed Service Downtime Apps Cables Supercomputer Google Wallet SharePoint Vulnerabilities Hard Drive Bookmarks Backup and Disaster Recovery Remote Computing Storage Cost Management Analytics Outlook Entrepreneur Document Management Data loss IT Management Operating System Big Data Time Management Technology Microsoft Small Business Network Management Settings Staff Wires IT Budget Saving Time Asset Tracking Hacker Theft Health Fun Mouse Training Smart Technology IT solutions Patch Management CIO High-Speed Internet Twitter Business Language Competition Utility Computing Wireless Technology Hackers Tech Support Paperless Office Customer Service Google Maps Fraud Printer Fleet Tracking Employees Passwords Instant Messaging User Hard Disk Drive Work/Life Balance Private Cloud Going Green Tech Term Environment BYOD Shortcut Digital Signature Wi-Fi Best Practices Cache Money Hosted Solutions Identities USB Statistics Alt Codes Mobile Device Management 3D Printing Efficiency Servers Password Automation Troubleshooting Mobile Office Holiday VoIP GPS Lithium-ion Battery Human Error Personal Information Project Management Social Spam Black Friday Two-factor Authentication Cleaning Digital Consultation Features Superfish IT Technicians Mobile Data Data storage Education Public Cloud Intranet Automobile Business Owner How To Firefox Legislation Administration Business Management Proactive IT User Error Break Fix Google Computing Infrastructure Hardware IP Address Vulnerability Permissions Computer IT service Unsupported Software Application Privacy Mobile Email Server Hotspot Internet Exlporer VoIP History Cameras Modem Search Enterprise Content Management Tech Terms Managed Service Provider Monitoring Cloud Cookies Samsung Undo Authentication Chatbots Data Security Computing Save Money Enterprise Resource Planning Communication Customer Relationship Management Cryptocurrency BDR Business Computing Help Desk ROI

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code