Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Powerful Physical Security Options

Powerful Physical Security Options

Data security isn’t the easiest thing in the world to plan for, especially if your organization doesn’t have any dedicated security professionals on-hand. While protecting your data with traditional methods, like passwords, firewalls, and antivirus, is important, what measures are you taking to make sure a thief or hacker isn’t just walking into your office and making off with your technology?

Continue reading
0 Comments

Prioritize the Protection of Your Google Account

Prioritize the Protection of Your Google Account

Chances are you have a Google account, whether it’s for business or personal use. It’s more accessible today than ever before and provides a solid way to gain access to several important features and accounts. Considering how much can be done with a Google account, users forget that they can put their security and personal data at risk. Here are some ways that your Google account is at risk, as well as what you can do to fix it.

Continue reading
0 Comments

Tip of the Week: Watch Out for Scammers During the Holidays

Tip of the Week: Watch Out for Scammers During the Holidays

Scammers find the holidays to be a wonderful time for stealing from unsuspecting victims. They know that the gift-giving season inspires others to spend a lot of money, which means that sensitive information, like credit card numbers, is up for grabs in bulk. As a consumer yourself, you’ll have to keep an eye out for these scams to make sure that you’re staying as safe as possible this holiday season.

Continue reading
0 Comments

The SamSam Ransomware Is Absolutely No Joke

The SamSam Ransomware Is Absolutely No Joke

The funny thing about ransomware is that they give them very strange names: Bad Rabbit sounds like the name of a villainous bunny who gets his comeuppance in some type of modern nursery rhyme, not malware that would ravage hundreds of European businesses. Locky seems like the son of Candado de seguridad, a character Medeco would come up with to educate kids on proper physical security. The latest in a long line of funny-named ransomware, SamSam, isn’t a pet name for your pet ferret you perplexingly named Sam, it is one of the worst ransomware strains ever, and it has caught the attention of U.S. Federal law enforcement.

Continue reading
0 Comments

During the Holidays, Cybersecurity Matters at Work and Home

During the Holidays, Cybersecurity Matters at Work and Home

We’re right in the thick of the holiday season, which means two things: one, there’s a lot of data being exchanged between businesses and consumers, and (on a related note) two: there’s ample opportunities for cybercrime, targeting business and consumer both. Whichever side of the coin you are on at any moment, you need to be aware of the risks, and how to mitigate them.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

File Sharing Virtual Private Network Fraud Public Speaking Programming Collaboration eWaste Competition Buisness WiFi Hacks IBM Chatbots Language Alerts Bandwidth Hosted Solution Backups Smartphones Social Media Information Remote Computing Permissions Monitoring Encryption Star Wars Undo Meetings Printer Antivirus Email Google Wallet Cybercrime Wireless Automation SharePoint Retail Company Culture Communication Staff Unified Threat Management Read Only Safety Running Cable Robot Hard Drives Facebook Government Recovery Computing Samsung Cortana Bluetooth Cloud Education Data Backup Tip of the week MSP IP Address VPN Modem Network Enterprise Resource Planning Internet Tech Terms Virtualization Co-managed IT Mobile Office Hacker Vulnerability Authorization Document Management Data loss Connectivity Computers Network Security Server Data Warehousing Hard Drive Drones Wi-Fi IT Services Office Microsoft Office Apps IT solutions Security Zero-Day Threat Shortcut Consulting Break Fix IT Consulting Avoiding Downtime Social Engineering Information Technology Compliance Identities Money Risk Management Backup and Disaster Recovery Software Experience Computer Outsourced IT Tech Support Mobile Security Writing Personal Information Redundancy Development Two-factor Authentication Business Owner Screen Reader Outlook Piracy Refrigeration Distributed Denial of Service Productivity Router Scary Stories Best Practices Trending Files Telephone Systems Save Money Microsoft Windows 8 Disaster Resistance Digital Signature Display Small Business Update Techology Business Ransomware Internet Exlporer Superfish Mobile Application Electronic Medical Records Business Technology Storage Artificial Intelligence Project Management OneNote Bring Your Own Device Twitter IT Management Hackers Employees Features IT Support Productivity Black Friday Disaster Recovery Multi-Factor Security Backup Server Management VoIP Cookies End of Support Assessment Remote Workers Tip of the Week Training History Saving Money Taxes Technology Operations Smartphone Users User Tips Laptop Efficiency Network Congestion Alt Codes Presentation Wireless Technology How To Unified Communications Internet of Things Gadget Work/Life Balance Gadgets Permission Entrepreneur Nanotechnology HIPAA Save Time Hiring/Firing Proactive Security Cameras Passwords Proactive IT Sports Upgrade Computer Repair Managed Services Provider User Error Analytics 3D Printing Printing Favorites IT Technicians Address Web Server Emoji Fun Travel Miscellaneous Privacy Cabling Cyber Monday Managing Stress User Business Management Search Google Maps Office Tips Mobile Device Managment Malware Spyware IT Support Cache Augmented Reality Workplace Tips Enterprise Content Management Google Vulnerabilities Managed IT services GPS Google Drive Remote Monitoring Technology Tips Finance Analyitcs Apple Word Microsoft Excel Smart Tech Computing Infrastructure Motherboard Staffing Authentication Software as a Service Google Docs Remote Monitoring and Management Virus Business Growth Mobile Computing Geography Lenovo Password Time Management Data Breach WannaCry Mobility Windows The Internet of Things Net Neutrality Network Management Downloads Domains Employee-Employer Relationship Big Data Firefox VoIP Monitors Human Error Uninterrupted Power Supply IT service Point of Sale Chrome Tech Term Consumers Webcam Servers Social Patch Management Downtime Dark Web Legislation Holiday Fleet Tracking YouTube Maintenance Wearable Technology Test Tracking Machine Learning Budget Settings Private Cloud Flexibility Conferencing Quick Tips Virtual Desktop Managed IT Services communications Phishing Politics Cryptocurrency Unified Threat Management Management Customer Relationship Management Dark Data Botnet Networking Licensing PowerPoint Healthcare Data Management Content Filtering IoT Data Security Telephony Gmail Tablet Sync Automobile Cleaning Comparison Going Green Current Events Motion Sickness Bookmarks Managed IT Cameras Managed IT Service Business Continuity Browser G Suite Law Enforcement USB BDR Hosted Solutions Cyberattacks Saving Time Cooperation Halloween Infrastructure Hard Disk Drive Physical Security Mouse Website Technology Laws Mobile Data Virtual Reality Statistics 5G SaaS Documents IT Budget Blockchain Environment Wires Applications Mobile Device Management Customer Service Data Cloud Computing Scam Windows 10 Intranet High-Speed Internet Best Practice App Health Regulations Managed Service Provider Websites Cost Management Lithium-ion Battery PDF ROI E-Commerce Office 365 Knowledge Vendor Management Supercomputer Android Deep Learning Firewall Mobile Device Paperless Office Identity Theft Hacking Spam Recycling Corporate Profile Procurement Cybersecurity IT Consultant CIO Financial Legal Processors Typing CCTV Relocation Business Intelligence Troubleshooting Crowdsourcing Unsupported Software LiFi Identity Upgrades Heating/Cooling Consultation Alert Digital Payment Error Social Networking Solid State Drive Notifications Cables Theft Managed Service Help Desk Utility Computing Chromebook Black Market Computer Care Instant Messaging Software Tips Marketing iPhone BYOD Smart Technology Asset Tracking Data Recovery Public Cloud Humor Disaster Innovation Google Calendar Data storage How To Business Computing Mirgation Administration Hotspot RMM Remote Worker Administrator Phone System Access Control Migration Digital Specifications Operating System Bitcoin Hardware Touchscreen Employer-Employee Relationship Electronic Health Records Windows 10 Mail Merge Mobile Devices WPA3

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code