Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

AOL CEO Gets His Twitter Account Hacked and the Internet Responds Appropriately

AOL CEO Gets His Twitter Account Hacked and the Internet Responds Appropriately

Imagine that you are the CEO of a mass media organization whose Twitter has just been hacked and was now posting 20 spam-filled tweets every second. You’ve just put yourselves in the shoes of Tim Armstrong, CEO of now-Verizon-subsidiary AOL.

Continue reading

Alert: Android Malware Can Control Your Phone Through Twitter

Alert: Android Malware Can Control Your Phone Through Twitter

Hackers continue to innovate and cause trouble for businesses of all industries and sizes. One of the more interesting recent tactics includes utilizing a malicious Twitter account to command a botnet of Android devices to do its bidding. Twitoor is considered to be the first real threat to actively use a social network in this manner, making this a major cause for concern.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Break Fix Processors Modem Website Going Green User Error User Tips Smart Tech Employer-Employee Relationship Read Only Virtual Desktop Gmail Apps Fleet Tracking Procurement Hardware Notes HIPAA Time Management Social Media Android Unified Threat Management Facebook Operations Legal ROI Gadget Lithium-ion Battery Passwords Digital Signature Vulnerability Server Quick Tips Domains Windows 10 Network Enterprise Resource Planning Infrastructure Specifications Budget Machine Learning How To Content Filtering Websites PDF Marketing Firewall Address 3D Printing Alert Network Management Robot Hacking Settings Downtime Test Redundancy Mobile Computing IT Consultant Apple Data Breach Internet Hosted Solution Favorites Data Recovery Software Proactive Computing Holiday Safety Remote Monitoring and Management Productivity Cloud Identity Theft Managed Service Data storage Relocation Mobile Devices Server Management Cyberattacks Drones Encryption Bandwidth Office 365 Enterprise Content Management Business Continuity Cooperation Tech Terms Mobile Office Cache Current Events Trending Instant Messaging Innovation WPA3 Password Mobile Data SharePoint Artificial Intelligence BDR Business Computing Backup Upgrade Spam Vendor Management Mobile Security Work/Life Balance Deep Learning Development Bluetooth Wires Cost Management BYOD Network Congestion Staffing Consumers Ransomware Mirgation Identity User Theft Competition IBM Black Friday Administration Cybersecurity Best Practices Unsupported Software Wireless Technology Saving Money Mouse Troubleshooting Paperless Office Staff Patch Management Environment Migration Sync GPS App Storage Phishing IT service Customer Service Microsoft Excel Business Tech Support Recovery Twitter Net Neutrality IT Services Workplace Tips Humor Database Information Notifications Zero-Day Threat Chromebook Motion Sickness Office Tips Mail Merge Save Time Managed Services Provider Windows Hard Drive Employee-Employer Relationship Customer Relationship Management IT Consulting Fraud Hard Disk Drive Phone System VoIP Augmented Reality Heating/Cooling Blockchain Alerts Running Cable Fun Bring Your Own Device Regulations Windows 10 Efficiency Save Money Backup and Disaster Recovery Data Managed IT Services Finance Computing Infrastructure Networking Language Public Speaking Outlook Retail Access Control Solid State Drive Google Docs Undo Big Data Google Calendar Electronic Medical Records Meetings Data Security High-Speed Internet Hacker Distributed Denial of Service Firefox Update eWaste Documents Office Virtual Private Network Virtualization Hackers Tip of the Week Refrigeration Physical Security Malware Security E-Commerce Security Cameras History Identities Managed Service Provider Best Practice Disaster Recovery IT Support Samsung Legislation Cyber Monday USB Superfish Alt Codes Cookies Entrepreneur Healthcare Recycling Data loss Technology Tips WiFi Chrome Halloween How To Google Productivity Search Remote Monitoring Cryptocurrency IT Management Flexibility Hard Drives Conferencing communications Cameras Typing Files Nanotechnology Health Windows 8 Computer Buisness Smart Technology Managing Stress Computer Repair Mobile Device Management Scam Taxes Social Managed IT IT solutions Consulting Risk Management Motherboard Webcam Uninterrupted Power Supply Error Wireless Windows 7 Cortana Cables Consultation IT Support Bookmarks G Suite IT Technicians Smartphone File Sharing Personal Information VoIP The Internet of Things Mobility Emoji Mobile Device Managment YouTube Programming Users Smartphones Business Management Law Enforcement Digital Document Management Small Business Two-factor Authentication Botnet Data Management Cleaning Supercomputer WannaCry Web Server IoT Wearable Technology Travel Network Security Word Browser Telephone Systems MSP Tech Term Assessment Remote Computing CCTV Internet of Things Intranet Data Warehousing Router Employees Privacy Miscellaneous Virtual Assistant Help Desk Company Culture Screen Reader Google Maps Writing OneNote Lenovo Information Technology CIO Technology Laws Computers Star Wars Tracking Private Cloud Vulnerabilities Black Market Hosted Solutions Social Engineering Management Training SaaS Touchscreen Spyware Upgrades Display IP Address Operating System Permissions Tablet Computer Care Knowledge Internet Exlporer Cabling Electronic Health Records Data Backup Business Intelligence Outsourced IT Email Professional Services Cloud Computing Monitoring Asset Tracking Dark Web Managed IT Service Politics Monitors Multi-Factor Security Statistics Dark Data Compliance Business Owner RMM Managed IT services Scary Stories Tip of the week Cybercrime Maintenance Software as a Service Utility Computing Corporate Profile Shortcut Licensing Digital Payment Avoiding Downtime Chatbots Microsoft Social Networking Software Tips Mobile Device Communication Geography Wi-Fi Gadgets Presentation Crowdsourcing Authentication Business Technology Sports Administrator Human Error Automation Wasting Time Project Management 5G Laptop Hacks Unified Threat Management Hiring/Firing Public Cloud Applications VPN Google Drive Piracy LiFi Techology Printer Financial Money Disaster Resistance Connectivity Analyitcs Automobile End of Support Permission Collaboration Microsoft Office iPhone IT Budget Education Antivirus Business Growth Point of Sale Government Comparison Proactive IT Bitcoin Downloads Unified Communications Analytics PowerPoint Experience Remote Worker Remote Workers Saving Time Mobile Disaster Telephony Hotspot Voice over Internet Protocol Backups Virtual Reality Technology Application Virus Authorization Servers Features Co-managed IT Printing Google Wallet

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...