Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Shhhh! Library of Congress Hacked

Shhhh! Library of Congress Hacked

Not since the British burned the Library of Congress to the ground in the War of 1812 has there been a more devastating attack on the famous library. Only this time, the recent attack was of the digital variety and King George III had nothing to do with it.

Continue reading
0 Comments

Your New Galaxy Note 7 Has a 1 in 42,000 Chance of Exploding

Your New Galaxy Note 7 Has a 1 in 42,000 Chance of Exploding

If you have the most recent addition to Samsung’s growing collection of smartphones, we hope you haven’t grown too attached to it. The company is recalling the Galaxy Note 7 on reports that the batteries explode. This event is largely considered one of the more high-profile recalls in the history of consumer technology.

Continue reading
0 Comments

Windows Server 2003 Support Ends this July

b2ap3_thumbnail_server_operating_system_losing_support_400.jpgJuly 14th is an important date in the business technology world. Why? Because it’s a major landmark for users of Windows Server 2003. In just a few short months, Microsoft will no longer support this decade-old server operating system. Therefore, you must take steps to upgrade away from this server OS before it’s too late.

Continue reading
0 Comments

Alert: Cryptowall 2.0 Ransomware On the Loose

b2ap3_thumbnail_alert_cryptwall_400.jpgThe latest threats can put a damper on your business plan and put your company at risk. Therefore, it's only natural to protect yourself from them. This new threat in particular, Cryptowall 2.0, has the potential to do plenty of heavy-duty damage to your business's network, if given the opportunity.

Continue reading
0 Comments

Alert: Don’t Get Hit with Shellshock by the New Bash Bug

b2ap3_thumbnail_alert_bash_bug_400.jpgA new malicious threat in the technical marketplace has just been discovered. The bug, dubbed the Bash bug, or "shellshock," is on the loose for users of Unix-based operating systems, like Linux or Mac OS X. It allows the execution of arbitrary code on affected systems, and could potentially be very dangerous for your business. In fact, CNet is calling it "bigger than Heartbleed."

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Browser Application Software Tips Staffing IT Consultant Social Engineering Employees Regulations Webcam Hard Disk Drive How To IT Consulting Computing Infrastructure Employer-Employee Relationship Maintenance Google Remote Worker Encryption Procurement Address Environment Typing PDF Firefox Tech Support Windows Cache Professional Services Smartphones Technology Tips Saving Time Permissions Lenovo Mobility Managed IT services Antivirus Downloads Innovation How To USB Dark Web Business Growth Managed IT Service Cyberattacks Web Server Windows 10 Save Time Virtual Assistant Superfish Healthcare Specifications Backups Safety CCTV E-Commerce Upgrades Virtualization Data loss eWaste Drones Authentication Conferencing Wireless Computers Analyitcs Nanotechnology Test Best Practices MSP Fleet Tracking Flexibility Consultation Bandwidth Data storage Disaster Resistance Saving Money Public Cloud Social Media Taxes Managed IT Services Website Money Mail Merge Computing Document Management IT Services Twitter Laptop Knowledge Proactive IT Authorization Miscellaneous Servers Migration Risk Management Backup Proactive Notes Mobile Security Comparison iPhone Samsung Internet of Things Management Black Market Remote Monitoring and Management Security IT Technicians Going Green Digital App Lithium-ion Battery Hosted Solutions IT Support Quick Tips Mobile Device Management Office Tips IT solutions Vendor Management Mobile Device Managment Google Calendar Connectivity Humor Corporate Profile VoIP Tech Terms OneNote Education Printing Software Mirgation Mobile Devices Net Neutrality Privacy Buisness Software as a Service Emoji Internet Exlporer Troubleshooting Cloud IT Management Microsoft Office Physical Security Recycling Google Wallet Crowdsourcing Politics Marketing Printer Halloween Computer Care Instant Messaging Motion Sickness Virtual Desktop Hacks Productivity Budget Database Cortana Cyber Monday 3D Printing BYOD Piracy Virtual Private Network Relocation Customer Service Smartphone Remote Computing Multi-Factor Security VoIP Read Only Trending Alt Codes Wires Unsupported Software Touchscreen The Internet of Things Managed Service Provider Best Practice End of Support Training Network Congestion Cameras Hard Drives Outlook Phishing Computer Network Security Sports Travel Identities Legislation WPA3 Electronic Health Records GPS Uninterrupted Power Supply Co-managed IT Solid State Drive Favorites IP Address Security Cameras Telephony Mouse VPN Development Features Utility Computing Search Bitcoin Patch Management Domains Retail Network Unified Threat Management Data Security Competition Information Technology Error Language Geography Information communications SharePoint Enterprise Content Management Shortcut Cabling Work/Life Balance Cleaning Gadgets Display Hosted Solution Experience Electronic Medical Records History Hackers Refrigeration Cloud Computing Scam Technology Machine Learning Managed Services Provider Telephone Systems Personal Information Dark Data Microsoft Excel Smart Tech Server Management Botnet Administrator Spyware Theft BDR Wasting Time Techology Processors CIO Hacker G Suite Business Intelligence Hacking Users Files Scary Stories Cybersecurity Unified Communications Robot Augmented Reality Cryptocurrency Websites Government Hotspot Facebook Notifications Avoiding Downtime Data Warehousing IoT High-Speed Internet Managing Stress Licensing Business Technology Applications Alerts Workplace Tips Operations Enterprise Resource Planning Project Management Data Backup Cost Management Statistics Mobile Device Data Management Point of Sale Entrepreneur Fun Phone System Consulting PowerPoint Microsoft Health Apple Help Desk Finance Sync Server Collaboration Google Docs Data Recovery Smart Technology Tech Term Wi-Fi Word Storage User Error User Chromebook Remote Workers Running Cable Assessment Heating/Cooling Automation Hard Drive Windows 8 Permission Bookmarks Alert Bluetooth Blockchain Efficiency Cybercrime Recovery Mobile Office File Sharing Business Management Tip of the week Business Computing Two-factor Authentication Email IT Budget Social Deep Learning Black Friday Tracking Current Events User Tips Data Internet Digital Signature Operating System Voice over Internet Protocol Virtual Reality Time Management Network Management Star Wars Ransomware Asset Tracking WiFi Gmail Firewall Fraud Holiday Small Business Identity Theft Managed Service Break Fix Intranet Office Update Vulnerability Big Data Writing Vulnerabilities Downtime Cables HIPAA Windows 10 ROI YouTube Presentation Data Breach Distributed Denial of Service Redundancy Backup and Disaster Recovery Human Error Meetings Consumers Outsourced IT Android Communication Employee-Employer Relationship Monitors Undo Zero-Day Threat Passwords Save Money Social Networking Financial Windows 7 Compliance Google Maps Documents Mobile Data Analytics Customer Relationship Management Modem Tip of the Week Gadget Supercomputer Cooperation Computer Repair Access Control IBM Technology Laws Tablet IT Support Virus Monitoring Wearable Technology Programming Infrastructure Mobile Router Google Drive Business Owner Unified Threat Management Mobile Computing LiFi Hiring/Firing Spam Private Cloud Wireless Technology Company Culture 5G Password Automobile Remote Monitoring WannaCry Law Enforcement IT service Content Filtering Productivity Artificial Intelligence Administration Chrome Chatbots Bring Your Own Device Business Continuity Disaster Managed IT Upgrade RMM SaaS Office 365 Settings Cookies Motherboard Malware Paperless Office Apps Identity Legal Business Disaster Recovery Staff Hardware Digital Payment Public Speaking Screen Reader Networking

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code