Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why You Should Be Skeptical of USB Devices

Why You Should Be Skeptical of USB Devices

USB technology is widely-used and you’d be hard-pressed to find an organization that doesn’t utilize USB devices in some way, shape, or form. However, these devices often harbor unexpected threats that could put the security of your entire infrastructure in jeopardy. All it takes is one infected device to compromise your network. Do you know where your USB devices have been?

Continue reading

BadUSB: Theoretical Malware Turned Reality

b2ap3_thumbnail_usb_security_400.jpgWe reported in August that security researcher Karsten Nohl of SR Labs revealed a flaw in USB firmware that cripples the technology beyond repair. At the Black Hat security conference, it was revealed that USB devices of all kinds can be targeted by hidden malware. Nohl refused to release the code used in the research, due to being concerned that it would be used by the wrong hands, but it has been made public anyway, putting the masses at risk.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Business Management Wires Data Recovery Law Enforcement Facebook Voice over Internet Protocol Nanotechnology Gadgets Geography Vulnerability Smartphones Display Computers Smart Tech Presentation IT Support VoIP Google Docs IT service Hosted Solution Social Media Customer Service Virtual Desktop Taxes Google Wallet Office 365 CCTV IP Address Analyitcs Virus Alerts Tip of the week Compliance Android Chatbots Computing Router Refrigeration Virtual Private Network RMM Permission Data Breach Authorization Development Mail Merge Productivity Computer Procurement Virtual Assistant Connectivity G Suite Paperless Office Deep Learning Update Fun BDR Bitcoin Zero-Day Threat Black Friday Retail Apple Multi-Factor Security Address Identity YouTube Scam Data Warehousing Employer-Employee Relationship Going Green Business Computing IT Technicians Sports Data storage Spyware Backup and Disaster Recovery Google Calendar Private Cloud Human Error Tip of the Week Access Control Budget Data Computer Care Firewall Servers Health Windows Risk Management Hard Drives Knowledge Networking Samsung Remote Computing Managed Services Provider Patch Management Twitter Hotspot Internet of Things Social Engineering Managing Stress Unified Threat Management Upgrade Wi-Fi Hiring/Firing Gadget Tracking Company Culture IT Support IoT Software as a Service Error Theft Licensing Identity Theft Save Money 5G Asset Tracking Virtual Reality Security Fleet Tracking Uninterrupted Power Supply Screen Reader Big Data Smartphone Google Maps Maintenance Dark Data Bring Your Own Device Augmented Reality Microsoft Office Quick Tips Artificial Intelligence Staff Browser Humor Experience Server Cybersecurity Best Practices Websites Marketing Business Technology How To Windows 8 Programming Running Cable Malware Data Management Two-factor Authentication USB Information Technology IT Management Small Business How To End of Support File Sharing Black Market Network Congestion Typing Supercomputer High-Speed Internet Documents E-Commerce Techology Electronic Health Records communications Wasting Time Recovery Statistics Privacy IT Budget Cookies Lithium-ion Battery Mobile Security Bookmarks Proactive IT Remote Workers Network Management Gmail Avoiding Downtime IT Consultant Employees Consulting Apps Cables Regulations Remote Monitoring and Management Environment Superfish Education Automation Upgrades Saving Time Data Security Business Owner Crowdsourcing Project Management Mobile Device Management Utility Computing Backup Managed IT services Cyber Monday Permissions Redundancy Outlook Undo Holiday Cryptocurrency Hard Disk Drive Virtualization Heating/Cooling Recycling Scary Stories Database Staffing Remote Worker Mouse The Internet of Things Computing Infrastructure User Tips Backups Antivirus Current Events Cabling Network Security Professional Services User Error Hacking Lenovo Hacks Employee-Employer Relationship Technology Laws Laptop iPhone Safety Flexibility Innovation Trending Wireless Technology Website Business Growth Operations Conferencing Corporate Profile Mobile Device Managment Motherboard Buisness User Mobile Computing Wireless Net Neutrality Webcam IT Consulting Operating System Outsourced IT Favorites Competition Printer Wearable Technology Hard Drive Google Alert IT Services Firefox Settings Public Cloud CIO Unified Communications Miscellaneous Politics Collaboration Application Managed IT Files Security Cameras Electronic Medical Records Content Filtering Consultation Data Backup Telephony Legislation Analytics Financial Hardware Office Tips Emoji Email Google Drive Save Time WannaCry OneNote Windows 10 Assessment Vulnerabilities Chrome Processors Legal Cooperation Migration Tablet Comparison Enterprise Resource Planning SaaS PowerPoint Modem Monitoring Data loss Windows 10 Tech Support Software Tips SharePoint Chromebook Test Computer Repair Star Wars Best Practice Encryption Efficiency Specifications Smart Technology Remote Monitoring Mobile Devices Drones Phone System Phishing Cybercrime Cost Management Managed IT Services Windows 7 Meetings Network MSP Infrastructure Help Desk Disaster Resistance Proactive Administration Touchscreen Writing Management Distributed Denial of Service Hacker PDF Money Co-managed IT Mobile Office Users Mobility Mobile History LiFi Telephone Systems Intranet Word VoIP Public Speaking Tech Term Administrator WPA3 Cyberattacks VPN Botnet Motion Sickness Robot Cameras Disaster Recovery Customer Relationship Management Microsoft Technology Blockchain Piracy ROI IBM Alt Codes Travel Business Continuity Bluetooth Hackers Read Only Cortana Halloween Applications Document Management Finance Unified Threat Management Cache Unsupported Software Domains Machine Learning Printing Relocation Communication Web Server Time Management Software Instant Messaging Ransomware 3D Printing WiFi Fraud GPS Identities Notifications Physical Security Managed IT Service eWaste App Solid State Drive Shortcut HIPAA IT solutions Social Networking Internet Microsoft Excel Hosted Solutions Downloads Authentication Downtime Features Healthcare Digital Business Intelligence Workplace Tips Entrepreneur Sync Password Disaster Monitors Cloud BYOD Notes Passwords Information Office Point of Sale Training Automobile Server Management Saving Money Government Internet Exlporer Work/Life Balance Cleaning Storage Managed Service Provider Troubleshooting Break Fix Digital Payment Language Vendor Management Managed Service Mobile Data Productivity Consumers Social Mobile Device Bandwidth Search Dark Web Enterprise Content Management Technology Tips Mirgation Tech Terms Business Digital Signature Personal Information Cloud Computing Spam

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...