Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Gift Card Scam Making Problems for Holiday Shoppers

Gift Card Scam Making Problems for Holiday Shoppers

As the modern gift certificate, the gift card has become an institution, especially around the holidays. Thousands of companies offer statically-priced and reloadable gift cards. With that much cheddar flying around it isn’t a surprise that there is big business in gift card theft. The FTC has stated that gift card scams are up a whopping 270 percent since 2015. With so much money at stake, keeping yourself out of the way of the scammers has to be priority one.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Tech Terms Managed IT Services Unified Communications Business Management Computing Scam Smart Tech Safety Virus Data Breach Managed Service Provider Servers Computers Search Password Tech Support Flexibility Hacker Files Save Time Staffing Storage MSP Proactive WiFi Heating/Cooling Administrator Private Cloud Quick Tips Piracy Efficiency Customer Relationship Management LiFi Windows Hosted Solution Bandwidth Health Wasting Time Mobility Consulting Managed IT Service Telephony IP Address Authentication Gadget USB Geography Hard Disk Drive Business Budget Deep Learning Server IT Support Encryption Finance Virtual Reality G Suite Proactive IT Data Backup Wireless Technology Information Technology Hacks Virtualization IT Budget Marketing Redundancy Business Continuity Travel Unified Threat Management Hiring/Firing Identities Collaboration 5G Disaster Resistance Cabling Smart Technology Fleet Tracking Phishing Paperless Office Productivity Backup Security Software Tips Business Growth Relocation Politics Company Culture ROI Nanotechnology The Internet of Things Office Tips Current Events Error Data Management Update Alt Codes Intranet Digital Network Congestion Internet Gadgets Tablet Remote Monitoring and Management Emoji Tip of the week Money Employees Router BYOD Point of Sale Environment Android Recovery Printing Knowledge Downloads Superfish Monitoring YouTube Help Desk PowerPoint Blockchain Google Maps Mobile Security Sync Retail OneNote Undo Hard Drives Techology Windows 10 Law Enforcement iPhone Productivity Read Only Managed IT services Government Hotspot Alert Lithium-ion Battery Cyberattacks Identity Theft Best Practices Writing Computing Infrastructure Cybercrime Wearable Technology Cyber Monday Saving Money Cache Refrigeration Remote Workers Spyware Utility Computing Crowdsourcing Mobile Device Managment IT service Humor Permission Personal Information Windows 8 Bring Your Own Device Unified Threat Management Maintenance Social Media Star Wars Managed IT Wi-Fi Applications Antivirus Financial Development Analytics Dark Web Taxes Hardware IT Services Innovation User Error Security Cameras Documents Downtime Vulnerabilities Unsupported Software Remote Computing Sports App Permissions eWaste Notifications Project Management Supercomputer Browser Competition Business Owner VoIP Data Assessment Drones Motion Sickness Fraud Data Security HIPAA Customer Service E-Commerce Outsourced IT Bluetooth Printer Mail Merge Mobile Office Document Management Saving Time Wires Hard Drive Network Security Specifications Compliance Mobile Device Management Touchscreen SaaS Digital Payment Word SharePoint Recycling Employee-Employer Relationship Enterprise Resource Planning Big Data Net Neutrality Consultation BDR Google Typing Theft Troubleshooting Mobile Data Entrepreneur Application Augmented Reality Cortana Network Disaster Business Technology Data Recovery Patch Management Cloud Computing Laptop CCTV Networking communications Scary Stories 3D Printing Processors Regulations Botnet Webcam Web Server GPS Electronic Medical Records Machine Learning Test Legislation Windows 7 Black Friday Technology Laws Business Intelligence Website Public Speaking Zero-Day Threat User Tips Education Managing Stress Technology Tips Training Apps Healthcare Human Error Cookies Computer Repair Gmail VoIP Virtual Assistant IT Consultant Google Calendar Avoiding Downtime Data Warehousing Passwords VPN Screen Reader Twitter IT Management Mobile Devices Migration Trending Hackers Risk Management Identity Employer-Employee Relationship Technology Backup and Disaster Recovery CIO Operations Co-managed IT Two-factor Authentication Upgrade History Instant Messaging Computer Spam Professional Services Consumers Communication Cooperation Computer Care Administration Database Managed Service Dark Data IT Technicians Tracking Websites Phone System Microsoft Cameras Features Motherboard Bookmarks Firewall Hosted Solutions Windows 10 Chatbots Favorites User Network Management Procurement Disaster Recovery Programming Corporate Profile Apple Internet of Things Licensing Alerts Robot WannaCry Infrastructure Black Market Cables Malware IT Consulting Vulnerability Chrome Meetings Social Networking Operating System Users Comparison Automobile Facebook Hacking Miscellaneous Data storage Smartphone Break Fix Virtual Private Network Office Cleaning Statistics Buisness Best Practice Analyitcs Notes Business Computing Samsung Multi-Factor Security Connectivity Outlook Solid State Drive Virtual Desktop Lenovo Email Conferencing Software Small Business Halloween How To Time Management Running Cable Uninterrupted Power Supply Google Docs Experience Enterprise Content Management Cryptocurrency Google Wallet Management Language Domains Automation Remote Monitoring Display Work/Life Balance Privacy Voice over Internet Protocol Staff High-Speed Internet How To IT Support Software as a Service Upgrades Modem Legal WPA3 PDF Google Drive Shortcut Settings Cloud Cost Management Cybersecurity Server Management Ransomware Digital Signature File Sharing Bitcoin Save Money Telephone Systems Mirgation Office 365 Authorization Microsoft Office Mobile Remote Worker Fun Backups Presentation Chromebook Firefox Social Public Cloud Social Engineering Managed Services Provider Artificial Intelligence Mobile Device Mouse Internet Exlporer Smartphones Mobile Computing Data loss IBM Electronic Health Records Wireless Information Vendor Management Workplace Tips Tip of the Week Microsoft Excel Access Control RMM Physical Security Asset Tracking IT solutions Content Filtering End of Support Going Green Distributed Denial of Service Holiday Monitors Tech Term IoT Address

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...
QR-Code