Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Here is How Antivirus Keeps a Business Safe

Here is How Antivirus Keeps a Business Safe

A lot is made about antivirus as a part of a comprehensive network security platform, but how does the system really work to eliminate threats? Today, we will take a look at an antivirus solution to show you how it goes about removing unwanted files and other code.

Continue reading
0 Comments

Could Your Favorite App Infect Your Device?

Could Your Favorite App Infect Your Device?

When considering solutions to help ensure your business’ IT security, mobile devices often go overlooked. This makes sense--for most of the time the telephone has existed, it has been attached to a wall, only capable of transmitting sound. However, with phones now being palm-sized computers that we carry in our pockets, keeping them safe from cyberthreats has a new importance.

Continue reading
0 Comments

Don’t Be Like These 14 Million US Businesses and Ignore Data Security

Don’t Be Like These 14 Million US Businesses and Ignore Data Security

If you run a small business, you might consider yourself a small target of hacking attacks. It might make sense to think of it in this way, but this actually is not advisable to think of it in this way. According to a recent survey by CNBC and SurveyMonkey, only two percent of small businesses see cyber attacks as anything worth worrying about. This leads us to the next question… are you one of them?

Continue reading
0 Comments

Your Computer's Infected... What Do You Do Next?

Your Computer's Infected... What Do You Do Next?

It’s one of the most commonly-known computer issues: infection. There are plenty of threats out there that could potentially take hold of your PC. The question is, do you know how to proceed if one does? This blog will go into just that.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Virtualization Customer Relationship Management Operating System Upgrades Test Development Display Google IT Budget Virtual Private Network Facebook Consultation Webcam Outsourced IT Data Breach Unsupported Software Processors Workplace Tips Training Finance YouTube Encryption Holiday Computers Employee-Employer Relationship Alerts Upgrade Co-managed IT IP Address Samsung Break Fix Fleet Tracking Proactive Artificial Intelligence Maintenance Consulting Multi-Factor Security Retail Administration Google Maps User Taxes Chrome Word Monitors MSP Connectivity Cloud Computing Procurement Websites Techology Mobile Device Twitter Information Personal Information Augmented Reality Comparison Distributed Denial of Service Humor Typing Smart Technology Business Owner Tip of the Week Information Technology Software Mobile Marketing User Tips Education Read Only E-Commerce Going Green Small Business Tablet Error App Remote Workers Trending Migration Public Speaking Disaster Security Cameras Address Entrepreneur PDF Laptop Mouse Gadgets Outlook Telephone Systems Chromebook Apple IT Consultant Server Management Disaster Recovery BDR Cookies Remote Computing Enterprise Resource Planning Net Neutrality Data Security Politics Innovation Quick Tips Phishing Geography Spyware Email Project Management Presentation Identities Phone System Data Warehousing Privacy iPhone Business Growth Unified Threat Management LiFi Downtime Hacking Instant Messaging Social Engineering Backup Troubleshooting Google Wallet Microsoft Excel Piracy Staffing Black Market Network Security Remote Monitoring and Management Managing Stress Hard Disk Drive Managed IT Services Computer Repair Cleaning Drones Cabling Proactive IT Motion Sickness Cost Management GPS Point of Sale VoIP Business Computing Documents Productivity Ransomware Risk Management SharePoint Cooperation Identity Theft Enterprise Content Management Router Heating/Cooling Wireless Technology Assessment Black Friday Licensing Mirgation Search IT Support Recovery Computing Infrastructure Fun Passwords Halloween Cyberattacks IT solutions Mobile Office Health Dark Web Management Bookmarks Crowdsourcing Google Calendar Access Control Business Continuity Telephony Internet of Things Compliance Hard Drives Collaboration Networking Smartphone Specifications Help Desk Managed Services Provider RMM History Knowledge Internet Exlporer Software as a Service Fraud Business Technology Applications Scam Chatbots Printer Wires Network Management Business Bitcoin Undo Writing ROI Managed IT Service Microsoft Office Wi-Fi Settings Intranet Hardware Language Machine Learning Money High-Speed Internet Productivity Mobile Device Management VPN Travel End of Support IT Services Law Enforcement Security Hard Drive Password How To User Error Vulnerability Emoji Utility Computing Best Practice Saving Time Mobile Data OneNote Mobile Devices Wearable Technology Hosted Solution Employer-Employee Relationship Human Error Business Intelligence Data Backup CIO Mobile Computing Relocation Tech Support Website IT Technicians Data Mobile Device Managment Public Cloud Superfish Computing Running Cable Legislation Downloads Solid State Drive Files Data loss Touchscreen BYOD Customer Service Miscellaneous Software Tips Storage Managed Service Provider Hacks Tech Term Bandwidth Server Gadget Users Staff Cloud How To Alt Codes Technology Laws Mail Merge Avoiding Downtime Motherboard Windows 10 CCTV Patch Management Cryptocurrency Virtual Desktop Hiring/Firing PowerPoint Financial Government Firewall Monitoring eWaste Features VoIP Cortana Favorites Servers Physical Security Bring Your Own Device Time Management Digital Payment Virus 3D Printing Mobile Security HIPAA Android Browser IT Management Google Drive Hacker IT Support Safety Consumers Social Networking Authentication Tracking Alert Vulnerabilities Cybercrime Programming Blockchain Authorization Asset Tracking Spam Regulations Data Recovery Paperless Office Best Practices Botnet Data storage Electronic Health Records Smartphones Managed IT Mobility Work/Life Balance Identity Application Tech Terms Remote Monitoring Deep Learning Lenovo Digital Signature Web Server Saving Money Electronic Medical Records Big Data File Sharing Statistics Buisness Social Media Modem communications Scary Stories Employees Computer Managed Service Bluetooth Remote Worker Office Automobile Smart Tech Windows Uninterrupted Power Supply Hotspot Windows 8 Shortcut Sync Legal Infrastructure WPA3 Update Firefox IoT Cables Cyber Monday Hosted Solutions Printing Robot Zero-Day Threat Supercomputer Cybersecurity IT Consulting Apps SaaS Tip of the week Two-factor Authentication IT service WannaCry Redundancy Microsoft Conferencing Gmail Cameras Nanotechnology Permission Computer Care Lithium-ion Battery Content Filtering Technology The Internet of Things WiFi Environment Experience Flexibility Competition Save Time Analytics Notifications Internet Operations Automation Administrator Google Docs Theft Efficiency Company Culture Star Wars Document Management Digital Virtual Reality Communication Network Antivirus Sports Unified Communications Analyitcs Meetings Business Management Technology Tips Windows 10 Malware G Suite Budget Cache Healthcare Network Congestion USB Current Events Corporate Profile Vendor Management Domains Office Tips Dark Data Save Money Private Cloud Disaster Resistance Recycling Unified Threat Management Office 365 Screen Reader Managed IT services 5G Backup and Disaster Recovery Refrigeration Hackers Social Permissions Wireless Data Management IBM Backups

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code