Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Should Companies Be Punished for Data Breaches?

Should Companies Be Punished for Data Breaches?

We’ve all seen and heard about companies and government departments that have experienced major security and data loss events. Once the event is made public, there is a media frenzy of coverage disclosing answers to questions like: Were your records compromised? How can you protect nonpublic information in the future? What should you do if you are a victim? However, as the media focus moves to another topic, the breach becomes yesterday’s news - and there is very little coverage of what repercussions and penalties those entities that were breached faced - if any.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Tech Term Staff Cryptocurrency Network Security Access Control Managed IT Tracking Data Buisness Star Wars Legislation Undo Telephone Systems Vendor Management Data Backup Applications Business Continuity Office Tips Chromebook Flexibility Touchscreen Drones Knowledge Database Digital Save Time Social Unified Threat Management Break Fix Motherboard Licensing Cortana Passwords Servers Intranet Competition Operating System Read Only Information Technology Help Desk Technology Tips Uninterrupted Power Supply Risk Management Mobile Devices Infrastructure Information Regulations Sync Customer Service Saving Money Lenovo Windows 8 Data Security Security Solid State Drive Cloud Hard Drive Backup and Disaster Recovery ROI Mouse Politics Writing OneNote Disaster Resistance File Sharing Android Digital Payment Phishing Robot Encryption Outsourced IT Compliance Upgrade Google Processors Samsung Permissions Document Management Spam Files Smart Tech Quick Tips Consulting Remote Worker Budget Crowdsourcing Company Culture Test Law Enforcement Net Neutrality Outlook Wearable Technology Mobility Tablet Apple Botnet Printing VoIP Mirgation Saving Time Cooperation HIPAA Server Management Data Breach IT Consultant Gadgets Hacks Private Cloud Alt Codes User Consumers Email Alert Time Management Software Tips Website Domains BDR Migration Modem Firewall Backups Superfish Meetings Hotspot Unified Communications Dark Web Productivity Finance Content Filtering Business Management Cleaning IT Consulting Voice over Internet Protocol Avoiding Downtime Technology Personal Information Cost Management Halloween Retail Firefox Scary Stories PowerPoint Corporate Profile Google Drive Tip of the Week Antivirus End of Support Cameras Human Error The Internet of Things Proactive IT Network Management Environment Identity Virtual Assistant Managed Service Employer-Employee Relationship Google Docs Bandwidth Mobile Device Virtualization Notifications Documents BYOD Monitors Backup Machine Learning Big Data How To Mobile Data Unsupported Software Address Productivity Computing Infrastructure Save Money Enterprise Resource Planning Motion Sickness communications Virtual Private Network Statistics Bitcoin Financial Data Warehousing IT Budget Paperless Office Artificial Intelligence Conferencing Employee-Employer Relationship Network Error Analytics Electronic Medical Records Microsoft Office Procurement Vulnerability Workplace Tips Public Speaking Virtual Reality Websites Bookmarks IT solutions Office 365 Virus Managed IT Services Hosted Solutions Comparison Windows 7 Hard Drives Gadget Storage Unified Threat Management Authentication Internet Exlporer Software as a Service Humor IT service Cloud Computing Automation High-Speed Internet Managed IT services Staffing How To Vulnerabilities User Tips Cables Redundancy USB Operations Managed Services Provider Deep Learning IT Management Theft Facebook Google Wallet Windows 10 Browser Business Computing Computer Repair Apps Refrigeration Cybersecurity Mobile Device Managment Business Intelligence IBM IT Services Chatbots Data Recovery Hard Disk Drive Programming Maintenance Specifications Recovery Troubleshooting Cabling Innovation Small Business Techology Mobile Computing Mobile Security Authorization Remote Computing Project Management Disaster Recovery Marketing Downloads Augmented Reality Professional Services Enterprise Content Management Social Engineering Communication Wireless Two-factor Authentication Fraud Collaboration Identity Theft PDF Lithium-ion Battery Data storage Remote Monitoring Word Business Owner Going Green Monitoring Settings IT Technicians Administration Office Phone System Screen Reader Government CCTV Emoji Microsoft Excel Chrome Favorites Miscellaneous Black Friday Taxes Computers Twitter Telephony Public Cloud 3D Printing Mobile Device Management Downtime Customer Relationship Management Assessment Relocation Best Practice Web Server Password Bring Your Own Device Fun IP Address Security Cameras Alerts Remote Monitoring and Management Smart Technology WannaCry Search Spyware Shortcut Windows Holiday History VPN G Suite Malware Management Wireless Technology Notes Tech Terms RMM Tech Support Business Growth Mobile Laptop VoIP Experience Windows 10 MSP GPS Mail Merge Business User Error Wasting Time Administrator Consultation Cyberattacks Cookies Blockchain Webcam Managing Stress Asset Tracking Hacker LiFi Automobile Education IT Support Printer Employees eWaste Healthcare E-Commerce Supercomputer Gmail Geography Sports Running Cable 5G Tip of the week Nanotechnology App Hosted Solution Internet Heating/Cooling Proactive Virtual Desktop Legal Typing Piracy Zero-Day Threat Work/Life Balance Privacy WiFi Best Practices Network Congestion Upgrades YouTube Cybercrime Disaster Physical Security Software Data Management Hacking Managed Service Provider iPhone Permission Features Managed IT Service Multi-Factor Security Efficiency Computer Care Patch Management Trending Remote Workers Bluetooth Fleet Tracking Development Instant Messaging Digital Signature Identities Analyitcs Application Scam Distributed Denial of Service Money Wi-Fi Display Hackers Data loss Co-managed IT Cyber Monday Update SaaS IoT CIO Hardware Smartphone Ransomware Social Media Recycling Hiring/Firing Internet of Things Google Calendar Connectivity Black Market Cache Current Events Microsoft Users Computer Computing Google Maps SharePoint IT Support Dark Data Business Technology Entrepreneur Point of Sale Language Presentation Smartphones Technology Laws Server Training Electronic Health Records Social Networking WPA3 Mobile Office Travel Networking Health Utility Computing Router Wires Safety

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...