Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Thieves Materialize Most Around the Holidays

Thieves Materialize Most Around the Holidays

In terms of identity theft, data loss and good ol’ fashioned pickpocketing, the holiday season is one of the riskiest times to travel. When it comes to protecting your personal information, thieves and cybercriminals are counting on you to be distracted and make careless mistakes. In 2016, the number of fraud attempts went up by 31% during the holiday season. In addition, credit cards, mobile devices, and open Wi-Fi are common targets throughout the holidays.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Backup and Disaster Recovery Business Management Mobile Security Social Media Machine Learning Taxes Computing Infrastructure Motion Sickness Technology Automobile Microsoft Excel Customer Service Screen Reader Troubleshooting Tablet Business Intelligence Firewall Productivity Superfish Microsoft Office Office Hacks Fraud ROI Company Culture Lenovo Compliance Retail Enterprise Resource Planning Going Green Customer Relationship Management Files Google Maps Cyberattacks Google Docs Education Software USB Mobile Data Users Downloads Piracy Heating/Cooling Development Recycling IoT Point of Sale Saving Time Safety PDF Utility Computing Innovation Data Breach Remote Workers Data Touchscreen Mirgation Paperless Office End of Support Managed IT Service Operating System Health High-Speed Internet communications Politics Star Wars Computing Relocation Programming Employee-Employer Relationship Network Congestion Storage Modem Information Technology Telephone Systems Voice over Internet Protocol Test Google Drive Recovery Browser Law Enforcement Cables Phone System Business Owner Smart Technology Managed Services Provider Quick Tips Money Hosted Solutions Language Virtual Private Network Procurement Crowdsourcing Windows 10 Tracking Monitoring App Project Management Apple Administrator IBM WiFi Network Analyitcs Permission Regulations Best Practices Application Dark Data Samsung Cybercrime Technology Laws Document Management Consulting Google VoIP MSP Sports Spam Business Computing Shortcut User Error Wasting Time PowerPoint Migration Access Control Experience Miscellaneous Chrome Encryption 5G GPS Display Automation Chromebook Settings Passwords IT Services Data Backup Techology Operations Consultation Conferencing Instant Messaging Connectivity Alert Mobile Device Unsupported Software Websites Proactive Current Events Managing Stress Apps Cyber Monday IT Budget Cost Management Motherboard Privacy Financial Entrepreneur Co-managed IT Software Tips Microsoft Technology Tips Email Mail Merge Geography Trending Administration Windows 7 Hosted Solution Unified Threat Management Networking Mobile Device Management Training Enterprise Content Management Windows 8 Wearable Technology Artificial Intelligence Solid State Drive Employer-Employee Relationship Licensing Botnet Dark Web Business Technology Computers Downtime Two-factor Authentication Business Continuity Specifications Blockchain File Sharing Mobile Device Managment Social Engineering Work/Life Balance Server Public Cloud Tech Terms Features Meetings Augmented Reality Collaboration WannaCry Internet Notifications Identity Travel Website Notes WPA3 Monitors Hacking Employees Competition Identity Theft Hard Disk Drive Data storage Fun Firefox Risk Management Vulnerabilities Authorization Identities Maintenance iPhone Bookmarks Cloud Android Internet of Things Flexibility Printing E-Commerce Office 365 Alt Codes CCTV Web Server Assessment Supercomputer Business Growth Information Cybersecurity Social Networking Hard Drives Network Security Undo Staff Nanotechnology Writing Applications Staffing OneNote Save Time Cameras Favorites Cooperation Vulnerability Chatbots Remote Worker Analytics Read Only Infrastructure Smartphone Comparison Corporate Profile Authentication Google Wallet Google Calendar Knowledge Patch Management Tip of the week History Virtualization Lithium-ion Battery Security Remote Monitoring and Management Update Big Data Mobile Devices Physical Security VPN Bluetooth Holiday Hotspot Smartphones Internet Exlporer Telephony Unified Threat Management Mobile Office How To Managed IT Services IP Address Virus Antivirus IT solutions IT Support Black Market Security Cameras Printer Government Net Neutrality Documents Laptop IT Consultant Private Cloud Buisness Marketing Deep Learning Sync Uninterrupted Power Supply Mouse Phishing Bring Your Own Device Remote Computing Presentation Backup Cortana 3D Printing Alerts Smart Tech User Disaster Digital Server Management Backups Wireless Technology Electronic Medical Records Disaster Recovery Data loss IT service Outlook Workplace Tips Robot Save Money Theft Wi-Fi Domains Malware Human Error Legal Professional Services Fleet Tracking Software as a Service Saving Money Unified Communications Running Cable Data Recovery Mobility Tech Support Small Business Hiring/Firing Spyware Cryptocurrency Hardware Gadgets Intranet Digital Signature Virtual Reality Statistics VoIP Mobile Password Vendor Management Outsourced IT Word Consumers eWaste Mobile Computing Management Cache Hackers Windows Data Warehousing Remote Monitoring Disaster Resistance Typing IT Support Tip of the Week User Tips Tech Term Bandwidth Servers Multi-Factor Security Hard Drive Wireless Budget Gmail Environment RMM Wires Office Tips Permissions Public Speaking SaaS Best Practice Upgrade Facebook Healthcare Managed IT LiFi Redundancy Electronic Health Records Managed Service Provider Cloud Computing Personal Information Communication Address Productivity Legislation Cabling Bitcoin Managed Service The Internet of Things IT Technicians CIO SharePoint Halloween Emoji Business Twitter Virtual Assistant Webcam G Suite Gadget Data Management Break Fix Time Management Database Zero-Day Threat Avoiding Downtime Virtual Desktop Hacker Cookies Refrigeration HIPAA Processors Router Ransomware IT Management Scam Content Filtering Cleaning IT Consulting Social Efficiency Asset Tracking Distributed Denial of Service Help Desk Humor Computer Managed IT services Upgrades Black Friday Data Security Computer Repair Computer Care BDR Proactive IT BYOD YouTube How To Network Management Error Drones Search Digital Payment Finance Windows 10 Scary Stories

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code