Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Shhhh! Library of Congress Hacked

Shhhh! Library of Congress Hacked

Not since the British burned the Library of Congress to the ground in the War of 1812 has there been a more devastating attack on the famous library. Only this time, the recent attack was of the digital variety and King George III had nothing to do with it.

Continue reading
0 Comments

Your New Galaxy Note 7 Has a 1 in 42,000 Chance of Exploding

Your New Galaxy Note 7 Has a 1 in 42,000 Chance of Exploding

If you have the most recent addition to Samsung’s growing collection of smartphones, we hope you haven’t grown too attached to it. The company is recalling the Galaxy Note 7 on reports that the batteries explode. This event is largely considered one of the more high-profile recalls in the history of consumer technology.

Continue reading
0 Comments

Windows Server 2003 Support Ends this July

b2ap3_thumbnail_server_operating_system_losing_support_400.jpgJuly 14th is an important date in the business technology world. Why? Because it’s a major landmark for users of Windows Server 2003. In just a few short months, Microsoft will no longer support this decade-old server operating system. Therefore, you must take steps to upgrade away from this server OS before it’s too late.

Continue reading
0 Comments

Alert: Cryptowall 2.0 Ransomware On the Loose

b2ap3_thumbnail_alert_cryptwall_400.jpgThe latest threats can put a damper on your business plan and put your company at risk. Therefore, it's only natural to protect yourself from them. This new threat in particular, Cryptowall 2.0, has the potential to do plenty of heavy-duty damage to your business's network, if given the opportunity.

Continue reading
0 Comments

Alert: Don’t Get Hit with Shellshock by the New Bash Bug

b2ap3_thumbnail_alert_bash_bug_400.jpgA new malicious threat in the technical marketplace has just been discovered. The bug, dubbed the Bash bug, or "shellshock," is on the loose for users of Unix-based operating systems, like Linux or Mac OS X. It allows the execution of arbitrary code on affected systems, and could potentially be very dangerous for your business. In fact, CNet is calling it "bigger than Heartbleed."

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Data Backup Tablet Government Vulnerability Unsupported Software Hardware Management Managing Stress Administrator 3D Printing Going Green Retail Gmail Hacking Microsoft Office Gadgets Productivity Customer Service Information Scam Wi-Fi iPhone Phishing Fun Maintenance Human Error Technology Tips Assessment Techology Facebook Google Wallet Data Management GPS Computer Repair Server Management Language Mirgation Cybercrime Shortcut Data Breach Redundancy Wireless Technology Entrepreneur Smart Technology Alert Managed Service Provider How To Utility Computing Big Data Content Filtering Identity Theft Favorites Tracking Save Money Telephony Upgrade Digital Signature Applications Google Drive Remote Workers Money Mouse Twitter Paperless Office Automobile Networking Tip of the Week Staffing Cloud Computing IT Management Chromebook Internet Exlporer Windows 10 Personal Information Alerts Emoji Printer Data Recovery Google Maps Vendor Management Mobile Devices Marketing Network Management Fraud Relocation communications Downtime Features Mobile Data Social Cooperation Internet YouTube Managed IT services Point of Sale Work/Life Balance Consulting Spyware Smartphone Finance Outsourced IT Screen Reader Cookies Data Security Gadget Documents Apple How To Safety Virtualization Social Media Heating/Cooling Presentation Vulnerabilities Business Continuity Tip of the week Smartphones Comparison Business Intelligence Information Technology Permission Cortana Router Employee-Employer Relationship Data Recycling IBM Supercomputer Mobile Device Managment Operating System Drones Managed IT Service Error Cache Multi-Factor Security Risk Management Co-managed IT User Tips Cloud Computers End of Support Flexibility Current Events Hackers Bring Your Own Device Firewall CCTV Chrome Computer Care Net Neutrality Social Networking Small Business Social Engineering Mobile Computing PowerPoint Microsoft Excel Recovery Office Motion Sickness Wireless Modem Hacker Mobility Statistics Chatbots Two-factor Authentication Break Fix Cleaning Mobile Device IT solutions Technology MSP High-Speed Internet Smart Tech Digital Payment Hard Drives Cybersecurity Employees Cameras LiFi Monitors Machine Learning Trending Access Control WannaCry Running Cable Laptop Sync Deep Learning Electronic Health Records Black Friday Productivity Bookmarks Computing Software Tips Meetings Business Computing Unified Threat Management Android Best Practice G Suite Software Bluetooth Intranet Spam Education Proactive IT Update Saving Money Environment Downloads Windows 10 Security Server Distributed Denial of Service BYOD Remote Monitoring and Management Best Practices IP Address Artificial Intelligence Consultation Password SaaS Disaster Recovery Typing Healthcare BDR Websites Geography Innovation VoIP Public Cloud Settings Samsung Physical Security Infrastructure IT Support Patch Management Workplace Tips Virtual Private Network Disaster Dark Data Managed IT Services Lenovo Analyitcs IoT Webcam Ransomware Managed Services Provider Backup Experience Browser Telephone Systems Communication Printing Humor History Unified Threat Management Administration Google Docs Identity Cables Unified Communications Hotspot Files User Error Data storage Backups Asset Tracking Public Speaking Virtual Reality Zero-Day Threat E-Commerce VoIP Programming Lithium-ion Battery Training eWaste File Sharing Avoiding Downtime Connectivity Computing Infrastructure Cyber Monday Company Culture Miscellaneous Bitcoin Read Only Dark Web Business Technology Licensing Touchscreen Alt Codes Help Desk Halloween Storage Employer-Employee Relationship Staff Taxes Hiring/Firing Data Warehousing Identities Blockchain Website Computer Users Remote Monitoring Google Star Wars Passwords Remote Worker Technology Laws RMM Customer Relationship Management Apps Microsoft Project Management Authorization Business Management Remote Computing Data loss Hosted Solutions Search Law Enforcement Document Management Conferencing Business Owner Managed Service Private Cloud Black Market Managed IT WPA3 Superfish Security Cameras Office 365 Scary Stories SharePoint Enterprise Content Management Mobile Device Management Address Authentication Procurement Specifications Travel Piracy Digital CIO App 5G Internet of Things Servers Uninterrupted Power Supply Network Congestion Business Network Operations Encryption Undo Cryptocurrency Financial Tech Terms Compliance Hard Disk Drive Software as a Service WiFi Tech Support PDF Firefox Office Tips Politics HIPAA Network Security IT Technicians Upgrades Legal Save Time Collaboration Motherboard Disaster Resistance Google Calendar Health Crowdsourcing Display Troubleshooting ROI Consumers Virus Windows 8 Proactive Test Budget Efficiency Windows Botnet Holiday Hard Drive Monitoring Outlook Web Server Automation Sports Enterprise Resource Planning Word IT service Application Legislation Email IT Services The Internet of Things Privacy Hacks Mobile Security Wearable Technology Antivirus IT Consultant Instant Messaging Writing Cost Management Electronic Medical Records Corporate Profile Nanotechnology Permissions Knowledge Quick Tips Fleet Tracking Backup and Disaster Recovery Refrigeration IT Budget Wires IT Consulting Notifications Bandwidth Solid State Drive Regulations Hosted Solution VPN Cyberattacks Malware Augmented Reality Time Management Business Growth Analytics Tech Term Processors Cabling Mobile Phone System Saving Time OneNote Buisness Development Competition IT Support Robot Virtual Desktop Theft Mobile Office Migration Mail Merge Domains User USB

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code