Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Fishing for Answers to Keep Phishing Attacks from Sinking Your Business

Fishing for Answers to Keep Phishing Attacks from Sinking Your Business

Phishing attacks have been in the social consciousness now for a while, and for good reason: it is the predominant way that hackers gain access to secured networks and data. Unfortunately, awareness to an issue doesn’t always result in positive outcomes. In this case, hackers get more aggressive, and by blanketing everyone under a seemingly limitless phishing net, 57 billion phishing emails go out every year. If a fraction of those emails accomplish their intended goal, the hackers on the other end of them really make out.

Continue reading
0 Comments

Keeping Your Info Safe

Keeping Your Info Safe

The Connection, Inc. has a plan to keep your info safe. Get the latest data protection software to keep your productivity high.

Continue reading

Google Knows Where You Are: Here’s How to Stop Them

Google Knows Where You Are: Here’s How to Stop Them

Late in the summer this past year there were several articles written about how Google would continue to track the location of a person’s smartphone after they had chosen to turn their location settings off. A Princeton researcher corroborated those claims for the Associated Press, traveling through New York and New Jersey with locations services off only to be tracked the entire way. Today, we will discuss this issue, and tell you what you need to know to keep Google from tracking you wherever you go.

Continue reading
0 Comments

Learn to Use Email Safely

Learn to Use Email Safely

Email is a core component to many businesses. With 124.5 billion business emails being sent and received each day, that doesn’t seem to be in danger of ending. Are the emails that are coming and going from your business secure? That may be another story, altogether. In order to keep your email security at a premium, we have outlined the following tips:

Continue reading
0 Comments

Powerful Physical Security Options

Powerful Physical Security Options

Data security isn’t the easiest thing in the world to plan for, especially if your organization doesn’t have any dedicated security professionals on-hand. While protecting your data with traditional methods, like passwords, firewalls, and antivirus, is important, what measures are you taking to make sure a thief or hacker isn’t just walking into your office and making off with your technology?

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Disaster Recovery Employees Bluetooth Hotspot Wearable Technology Scary Stories Cost Management Education Computing Infrastructure Antivirus Consumers PDF Data storage Paperless Office Avoiding Downtime Password Cortana Firefox Cybersecurity Unsupported Software Scam Staffing Managed IT Unified Threat Management How To Android Star Wars Collaboration Google Maps Google Drive Virtual Private Network Cyberattacks Hackers Cache Upgrade High-Speed Internet Environment Notifications Managed Service Two-factor Authentication Managing Stress Employer-Employee Relationship Website Wires Management Compliance Programming Information Technology Recovery Facebook Data Recovery Identity Theft Business Corporate Profile Wireless Technology Migration Supercomputer Data Notes Hosted Solution Superfish Halloween Theft The Internet of Things CCTV Email Application Operations Internet Exlporer Piracy Word Malware Tip of the Week Telephony iPhone Applications Address Mobile Device Managment Twitter Healthcare Telephone Systems History Files Computer Care Error Spyware Modem Phishing Phone System Cloud Smart Technology Cryptocurrency Permission Hard Disk Drive BYOD Software Backups Web Server Wasting Time Connectivity Digital Physical Security Comparison Internet of Things Employee-Employer Relationship Consulting Mobile Office Enterprise Content Management IBM Money Consultation Big Data Virtual Assistant Identities Wi-Fi Company Culture Social Media Search Best Practices Security Smartphones Data Warehousing Permissions Cloud Computing Language Competition Remote Workers Safety Gadgets Health Business Management Virtualization Domains Windows 10 Mobile Computing Crowdsourcing Software Tips Legal Troubleshooting Fleet Tracking Help Desk Risk Management Disaster Automobile Proactive Patch Management Websites Conferencing Personal Information Virtual Reality Robot Electronic Health Records Vulnerability Privacy Productivity Windows 10 Instant Messaging Fraud CIO Update Tech Term Point of Sale Professional Services PowerPoint Dark Web Smartphone Microsoft Office Authentication Trending Artificial Intelligence VPN Office Tips Drones Information Recycling Cyber Monday Social Engineering Uninterrupted Power Supply Document Management Networking Taxes Asset Tracking Licensing Outlook Tech Terms Unified Threat Management Windows 8 Hard Drives Smart Tech Chromebook Black Friday Tech Support IT Support User Browser Motherboard Marketing Downloads Network Congestion Unified Communications User Tips Data loss Tablet Server Procurement Downtime Lenovo File Sharing IT Consulting Sync Mobile Device Management Hacks Remote Worker Cybercrime Business Growth Passwords Augmented Reality Distributed Denial of Service Cabling Hard Drive End of Support Entrepreneur Saving Money Analytics Samsung Bring Your Own Device Digital Signature Internet Motion Sickness Travel Access Control eWaste Hiring/Firing Business Computing Mirgation Read Only Current Events Business Intelligence Alert Heating/Cooling Alt Codes Google Wallet Public Cloud Computer Enterprise Resource Planning Network Management Office App IT solutions Chatbots Flexibility Router Social Networking Upgrades WiFi Co-managed IT Quick Tips Windows 7 Network Security Security Cameras Test Statistics Screen Reader Blockchain Saving Time Holiday Voice over Internet Protocol Nanotechnology MSP Mobility Software as a Service Miscellaneous Innovation VoIP Virus Business Continuity Wireless Finance Social Cables Display Meetings Gmail SaaS Automation Encryption Break Fix Backup and Disaster Recovery Data Backup OneNote Settings Business Technology Google Calendar E-Commerce HIPAA Regulations Alerts Shortcut ROI Writing Business Owner Printing Development Documents RMM Computers Botnet Cookies Vulnerabilities Touchscreen Net Neutrality Spam Tip of the week Mobile Devices Specifications Project Management Favorites USB BDR Gadget Deep Learning Server Management Laptop Maintenance Productivity Microsoft Excel Webcam Relocation Buisness 5G Computing Cooperation Disaster Resistance Public Speaking Bandwidth Customer Relationship Management Technology Laws Administrator WPA3 IT Technicians Time Management Storage WannaCry Google Docs 3D Printing Ransomware Backup Best Practice Humor IoT Technology Lithium-ion Battery Remote Monitoring and Management Save Time Typing Multi-Factor Security Technology Tips Communication Infrastructure Save Money Data Management Virtual Desktop Presentation Computer Repair Managed IT services Training Hacker SharePoint Mobile Retail Managed Services Provider Tracking LiFi Data Security Managed Service Provider Legislation G Suite IP Address Private Cloud IT Support Office 365 Mobile Device Efficiency Proactive IT Managed IT Service Going Green Administration How To GPS Undo Redundancy Mouse Work/Life Balance Small Business Google Digital Payment Solid State Drive Hosted Solutions Zero-Day Threat Financial Geography communications IT Services Knowledge VoIP Law Enforcement Outsourced IT Monitors Network Firewall Dark Data Monitoring Budget Features Intranet Remote Computing Running Cable Printer Mail Merge IT service Machine Learning Mobile Security Servers Techology YouTube Hardware Staff Experience Apps Electronic Medical Records Authorization Emoji IT Management Mobile Data Cameras Analyitcs Utility Computing Refrigeration Users Politics Processors Operating System Fun Remote Monitoring Apple Microsoft Content Filtering Vendor Management Bitcoin Database Cleaning User Error Workplace Tips Sports Government Data Breach Black Market Managed IT Services Customer Service Assessment Chrome IT Consultant Human Error Bookmarks IT Budget Windows Identity Hacking

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code