Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why You Should Be Skeptical of USB Devices

Why You Should Be Skeptical of USB Devices

USB technology is widely-used and you’d be hard-pressed to find an organization that doesn’t utilize USB devices in some way, shape, or form. However, these devices often harbor unexpected threats that could put the security of your entire infrastructure in jeopardy. All it takes is one infected device to compromise your network. Do you know where your USB devices have been?

Continue reading
0 Comments

BadUSB: Theoretical Malware Turned Reality

b2ap3_thumbnail_usb_security_400.jpgWe reported in August that security researcher Karsten Nohl of SR Labs revealed a flaw in USB firmware that cripples the technology beyond repair. At the Black Hat security conference, it was revealed that USB devices of all kinds can be targeted by hidden malware. Nohl refused to release the code used in the research, due to being concerned that it would be used by the wrong hands, but it has been made public anyway, putting the masses at risk.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Files Network Document Management Identity Theft Government Running Cable Refrigeration Firefox Sports Managed Service IT Support Office Tips Websites Superfish Cache Deep Learning Cleaning Mobile Devices Going Green Licensing Wi-Fi Monitors Statistics Antivirus Automobile Webcam Language Digital IT Support Technology Laws Bitcoin Apple User Cables Solid State Drive Remote Monitoring VoIP Storage Laptop Maintenance Servers Network Management Specifications PowerPoint Cyberattacks Net Neutrality Bluetooth VoIP Remote Computing Unsupported Software Save Time Software Tips Cost Management Email Social Media Security RMM Users Analytics Geography Heating/Cooling Mobile Computing Modem Customer Service Managing Stress Server Management Communication E-Commerce Scam Spyware Conferencing Tracking Website Information Unified Threat Management Computing Infrastructure Break Fix Mail Merge YouTube Taxes Multi-Factor Security Upgrade Big Data Internet Exlporer Disaster Saving Money Entrepreneur Social Management Tip of the week Botnet Halloween Business Management Enterprise Resource Planning Techology Data Warehousing Artificial Intelligence Computer Backups Current Events Unified Communications Staff Display Fraud 3D Printing Network Congestion Presentation Personal Information Technology Tips Digital Payment Documents Computer Care Update Hard Disk Drive Settings Security Cameras Touchscreen Cloud Productivity Networking Patch Management Robot Cameras Internet Information Technology Recycling Proactive IT Hotspot Facebook Environment Scary Stories Hacks Mobile Virus Augmented Reality Windows 10 Server Hiring/Firing Tip of the Week Encryption End of Support Google Calendar Address WiFi Managed IT Services Privacy Screen Reader Business Intelligence Data Small Business Tech Terms Data Breach Company Culture Legal Co-managed IT Samsung Technology Mobile Device Managment Safety Passwords Favorites Virtual Desktop Social Networking Experience Hosted Solutions PDF Microsoft Excel Alerts Compliance Crowdsourcing Application Consumers Managed IT services Firewall Smartphone Mobile Office Router Business Computing Help Desk Gadget Procurement Phishing Tech Support Supercomputer IBM Hardware Hard Drive Operating System WPA3 Legislation Data Security Workplace Tips SaaS IT Consulting Digital Signature Features WannaCry Printing Black Friday Smartphones Identities Processors Windows Downloads Knowledge Access Control Education Wireless Data storage Wearable Technology Politics Theft Business Growth Cybersecurity Vulnerability Domains Gadgets Telephony Managed Services Provider Applications Work/Life Balance Identity Efficiency Training IT Services Business Continuity Data Management IT solutions Read Only BDR Hackers Staffing Cookies Business How To Best Practices iPhone Zero-Day Threat Health Remote Monitoring and Management Cyber Monday Spam Cloud Computing Star Wars Search Gmail Utility Computing Analyitcs Monitoring Black Market Time Management Microsoft Office High-Speed Internet OneNote Apps Piracy Retail Physical Security Money Telephone Systems Hacking Redundancy Two-factor Authentication GPS Word Mouse Chatbots HIPAA MSP Enterprise Content Management Budget Remote Workers Cabling Human Error Relocation Backup Intranet IoT Avoiding Downtime Vendor Management Travel communications Shortcut Outlook Bookmarks Consulting User Error Saving Time Undo Quick Tips Innovation Hard Drives Lithium-ion Battery Typing History Business Owner Assessment Competition Managed IT File Sharing Asset Tracking Buisness Social Engineering Bring Your Own Device Outsourced IT Web Server Mobile Data Cybercrime Alt Codes SharePoint Hacker Office 365 Unified Threat Management Risk Management Error Project Management Finance The Internet of Things Financial Google Drive Software Chromebook Electronic Health Records Motion Sickness Software as a Service Writing How To App Electronic Medical Records USB IT Consultant Cooperation Flexibility Productivity eWaste Data loss Notifications Proactive Dark Web Public Speaking Android Connectivity Mobility Sync Backup and Disaster Recovery Office Meetings Phone System Authentication Employer-Employee Relationship Upgrades Cryptocurrency Authorization Google Downtime Point of Sale Holiday Dark Data Trending Disaster Resistance Managed Service Provider VPN Data Backup Network Security Alert IT Budget Chrome CCTV IT Management Ransomware Virtualization Mobile Security Tech Term Employees Remote Worker Bandwidth ROI Machine Learning Mirgation User Tips Private Cloud Humor Test Mobile Device Management Distributed Denial of Service Administration Permission Mobile Device Lenovo Customer Relationship Management Printer Drones Miscellaneous Permissions Law Enforcement LiFi Nanotechnology Windows 10 Virtual Private Network Motherboard Wires Windows 8 Vulnerabilities Google Docs Uninterrupted Power Supply G Suite Healthcare Emoji Smart Tech Computing Infrastructure CIO Cortana Internet of Things Paperless Office Comparison Computer Repair Fleet Tracking Best Practice Corporate Profile Disaster Recovery Malware Wireless Technology IP Address Fun Marketing 5G Recovery Hosted Solution Migration Instant Messaging BYOD Microsoft Computers Twitter Employee-Employer Relationship Programming Administrator Tablet Operations IT Technicians Content Filtering Collaboration Google Wallet IT service Business Technology Blockchain Data Recovery Consultation Regulations Smart Technology Virtual Reality Save Money Development Public Cloud Google Maps Password Troubleshooting Automation Browser Managed IT Service

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code