Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Thieves Materialize Most Around the Holidays

Thieves Materialize Most Around the Holidays

In terms of identity theft, data loss and good ol’ fashioned pickpocketing, the holiday season is one of the riskiest times to travel. When it comes to protecting your personal information, thieves and cybercriminals are counting on you to be distracted and make careless mistakes. In 2016, the number of fraud attempts went up by 31% during the holiday season. In addition, credit cards, mobile devices, and open Wi-Fi are common targets throughout the holidays.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Black Friday Zero-Day Threat Sync Identity Theft IT Budget Politics Cybercrime Cameras Tech Terms Data YouTube Multi-Factor Security Tech Term 5G Current Events Blockchain Software Tips LiFi Assessment 3D Printing Downloads Human Error Risk Management Website Smartphones Gadgets Corporate Profile Business Owner Smartphone PowerPoint Hacking Paperless Office Efficiency Favorites Passwords Employees Point of Sale Documents Co-managed IT Save Time Patch Management Alerts Consultation BYOD Information Technology Fleet Tracking Computers GPS Connectivity PDF Update Recycling Staff Bandwidth Scam Government Collaboration Supercomputer Motion Sickness Technology Laws Virtual Desktop User Tips Content Filtering Flexibility Piracy Migration MSP Cabling Google Calendar Data Security Information Break Fix Alert Search Business Android Windows 8 IT Services IT Consultant Tracking IP Address Bitcoin Hacker Cyberattacks VPN Unified Threat Management WannaCry Halloween Disaster Resistance Application Refrigeration Marketing IT service Security Company Culture Finance Tablet Enterprise Resource Planning Smart Technology Malware Language Domains Spam IT Consulting Outlook Two-factor Authentication Social Engineering Apple Remote Workers Data Warehousing How To Procurement Competition Digital Virtual Reality Electronic Health Records IBM Upgrade Shortcut User Social Media Management Hiring/Firing Email ROI Managed Service Provider Read Only Time Management Communication Customer Relationship Management iPhone Bluetooth Budget communications Licensing Wireless Technology Webcam Augmented Reality Entrepreneur Firefox Machine Learning Productivity Google Drive IT Management Modem Safety Identities Business Continuity Outsourced IT Mobile Office Networking Ransomware Authentication Administration Infrastructure Document Management Unified Communications Web Server Remote Monitoring Wires BDR Display Password Touchscreen Fun Consumers Cloud Computing Storage Remote Worker Test Public Cloud Chromebook Cortana Drones Redundancy Privacy WiFi Maintenance Google Wallet Law Enforcement Managed IT services Operating System Office Deep Learning Mirgation Encryption Miscellaneous Save Money Social Monitoring Saving Time Authorization Business Intelligence CCTV Internet Exlporer Star Wars Superfish Managed Services Provider Scary Stories Regulations Hard Drive Technology Tips Phone System Printer Techology Network Management File Sharing Unified Threat Management Health Private Cloud Proactive IT Tip of the week Workplace Tips End of Support Disaster Recovery Microsoft Digital Signature Chrome IT Support Public Speaking Hard Disk Drive Cables Black Market High-Speed Internet Applications Lenovo Mobile Device Data loss Server Management Motherboard Apps Cache HIPAA Chatbots IT Technicians Solid State Drive Internet of Things Relocation Geography Productivity Lithium-ion Battery Hacks Mobile Hackers Robot Files eWaste Office 365 Virtual Private Network Writing Tech Support Avoiding Downtime IT solutions Remote Monitoring and Management Spyware Mobile Security Specifications Mouse Development Crowdsourcing Disaster Business Computing WPA3 Digital Payment Cookies Bring Your Own Device G Suite Managed IT Service Computer Repair Analytics Help Desk Programming Social Networking Administrator Google Maps Backups Environment Education Heating/Cooling Vendor Management Vulnerabilities Downtime Undo Microsoft Excel Data Backup Network Congestion Healthcare Office Tips Mobile Device Management Firewall Utility Computing Websites Humor Address Hosted Solutions Hardware Employee-Employer Relationship Quick Tips Permissions Saving Money Mail Merge Monitors Money Typing Technology Analyitcs Data Management Best Practice Wearable Technology Customer Service Artificial Intelligence Innovation Identity Wi-Fi Business Management Virus Distributed Denial of Service Unsupported Software Instant Messaging Compliance Word Network Servers Legal Security Cameras Work/Life Balance Sports Network Security Backup and Disaster Recovery Mobility Error Software as a Service Computer Care Bookmarks OneNote Going Green Managed IT SharePoint Hosted Solution Settings Physical Security VoIP Troubleshooting Mobile Data CIO Enterprise Content Management Experience VoIP Permission Travel Uninterrupted Power Supply User Error Software Facebook Data Recovery Mobile Device Managment Cybersecurity Buisness Gmail Mobile Devices Dark Data Mobile Computing Automation Data storage Business Growth Notifications Small Business Business Technology Browser Antivirus How To Smart Tech App Intranet Cloud IoT Microsoft Office Data Breach Twitter Windows Operations Presentation Laptop Internet Computing Infrastructure Recovery Theft Virtualization Backup Tip of the Week Consulting Upgrades Financial Project Management Remote Computing Telephony Alt Codes Cyber Monday Computer Big Data Windows 10 Google Docs RMM Samsung Screen Reader Cryptocurrency Holiday Best Practices Hard Drives Windows 10 Statistics Fraud Meetings Retail The Internet of Things E-Commerce Managed IT Services Hotspot USB Automobile Gadget Computing Telephone Systems Conferencing Trending Comparison Personal Information Staffing Cost Management Running Cable Vulnerability Proactive Asset Tracking Cleaning Users Features Botnet IT Support Router Managing Stress Net Neutrality Wireless Managed Service Nanotechnology Employer-Employee Relationship Electronic Medical Records SaaS Processors History Google Phishing Server Dark Web Legislation Access Control Cooperation Emoji Training Printing Knowledge Taxes

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code