Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Here is How Antivirus Keeps a Business Safe

Here is How Antivirus Keeps a Business Safe

A lot is made about antivirus as a part of a comprehensive network security platform, but how does the system really work to eliminate threats? Today, we will take a look at an antivirus solution to show you how it goes about removing unwanted files and other code.

Continue reading
0 Comments

Could Your Favorite App Infect Your Device?

Could Your Favorite App Infect Your Device?

When considering solutions to help ensure your business’ IT security, mobile devices often go overlooked. This makes sense--for most of the time the telephone has existed, it has been attached to a wall, only capable of transmitting sound. However, with phones now being palm-sized computers that we carry in our pockets, keeping them safe from cyberthreats has a new importance.

Continue reading
0 Comments

Don’t Be Like These 14 Million US Businesses and Ignore Data Security

Don’t Be Like These 14 Million US Businesses and Ignore Data Security

If you run a small business, you might consider yourself a small target of hacking attacks. It might make sense to think of it in this way, but this actually is not advisable to think of it in this way. According to a recent survey by CNBC and SurveyMonkey, only two percent of small businesses see cyber attacks as anything worth worrying about. This leads us to the next question… are you one of them?

Continue reading
0 Comments

Your Computer's Infected... What Do You Do Next?

Your Computer's Infected... What Do You Do Next?

It’s one of the most commonly-known computer issues: infection. There are plenty of threats out there that could potentially take hold of your PC. The question is, do you know how to proceed if one does? This blog will go into just that.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Recovery Work/Life Balance Password Computing Infrastructure Windows 10 Hiring/Firing Employees Human Error Buisness Wireless Technology Physical Security IT Support Networking Fraud Web Server Notes Refrigeration Digital IT Consultant Time Management Money Virtualization Wireless Data storage Document Management Cortana Mobile Computing Word Phone System Vulnerabilities App Security Infrastructure Public Cloud Small Business Encryption Hacks Mobile Device Management Procurement Asset Tracking Tablet Disaster Chromebook Network Features Managed Service Provider Migration Two-factor Authentication Internet Chatbots Unsupported Software How To WannaCry Managed IT Downtime IT Management Sync Save Time Access Control IT Support Smartphone Unified Communications Geography Customer Service Motion Sickness communications Identity Dark Web Bluetooth Tracking Cloud Computing Finance Social Engineering Paperless Office Websites Miscellaneous Troubleshooting Voice over Internet Protocol Office Marketing iPhone Wires Automobile Documents Update Digital Signature Upgrade Recycling Computer End of Support Risk Management Personal Information Virtual Private Network Bring Your Own Device Data Black Friday Vendor Management Utility Computing Virtual Reality Entrepreneur LiFi Google Docs Operating System Electronic Medical Records Backup and Disaster Recovery Mobile Security Business Computing Techology USB Private Cloud Uninterrupted Power Supply Monitoring Assessment Halloween Application Politics RMM Printer Emoji Distributed Denial of Service Travel Big Data History Productivity Apple Data Recovery Alerts Alert Botnet Cyberattacks Bitcoin Efficiency Tip of the Week Information Cables Best Practices Legal Remote Monitoring and Management Notifications IT Technicians Employee-Employer Relationship Corporate Profile Remote Computing Trending Computer Care Cleaning Scam Black Market Vulnerability High-Speed Internet Business Management Ransomware Cameras Social Outsourced IT Meetings Business Continuity Customer Relationship Management Telephone Systems Business Growth IP Address Lithium-ion Battery IT solutions Presentation Motherboard Alt Codes Google Wallet Best Practice Bookmarks Telephony Mail Merge Passwords Management Budget Cookies WPA3 GPS Error Running Cable Data Breach ROI Hard Drives Flexibility Remote Monitoring Education Experience Intranet Relocation eWaste Help Desk Mobility Windows Storage Consultation Tech Term Identity Theft Data Management Project Management Information Technology Hardware Windows 10 Permission Unified Threat Management Cooperation Heating/Cooling Mobile Data Development Hosted Solution Smart Technology Processors Analytics Data Security SaaS Undo PowerPoint Software as a Service Consulting Website Microsoft Excel Workplace Tips Hosted Solutions Save Money Language Network Security Read Only Tech Support Knowledge Specifications Twitter Internet Exlporer Going Green Server Cybersecurity Managing Stress Mobile Device Managment Backup Business Facebook Monitors Social Media Mobile Office Cloud Virus Gadget CIO Virtual Assistant Computer Repair Enterprise Resource Planning Writing Favorites Wasting Time Gadgets Database Antivirus VoIP The Internet of Things G Suite Staff Hacker Mirgation How To Disaster Recovery Disaster Resistance Employer-Employee Relationship File Sharing Augmented Reality Mobile Devices User Error Chrome Users Administrator Statistics Business Technology Modem Business Intelligence Screen Reader Test Government Data Warehousing Scary Stories VoIP Mobile Network Congestion BYOD Settings Hackers Hard Disk Drive Net Neutrality Quick Tips Bandwidth Collaboration Electronic Health Records Sports Computers Internet of Things Router Automation Theft Zero-Day Threat Authorization Mobile Device Business Owner Windows 7 Firewall Safety Security Cameras BDR Apps Artificial Intelligence Hacking Proactive Piracy Legislation Cyber Monday Comparison CCTV Compliance Maintenance Hard Drive VPN Company Culture Digital Payment Privacy IT Services Android Superfish Email Upgrades Unified Threat Management Webcam Public Speaking Software Smart Tech Remote Worker IT Consulting Health WiFi Technology Tips Printing Applications User Managed IT Service Search Identities Wearable Technology Star Wars Humor Typing Financial Samsung Permissions Laptop Programming Connectivity Firefox IT Budget Content Filtering Deep Learning Google Drive Environment 3D Printing Virtual Desktop Microsoft Office Blockchain Domains Tech Terms Address Break Fix Office Tips Lenovo Patch Management Downloads Managed Services Provider Conferencing Google Operations Google Calendar User Tips Remote Workers Managed IT Services PDF Machine Learning YouTube Law Enforcement Servers Multi-Factor Security Dark Data Solid State Drive Current Events Microsoft Taxes Files HIPAA Saving Money Mouse Productivity Competition Shortcut Gmail Cost Management Innovation MSP SharePoint Managed IT services Social Networking Technology Laws Consumers Nanotechnology Browser Data Backup Administration Spyware Drones Cryptocurrency Regulations Office 365 5G Touchscreen Authentication Fleet Tracking Data loss Licensing Supercomputer IBM Redundancy OneNote Display Smartphones Wi-Fi Retail Cache Google Maps Windows 8 Hotspot Phishing IT service Backups Crowdsourcing Spam Healthcare Outlook Staffing Network Management Analyitcs Tip of the week Fun Training Cabling Computing IoT Technology Instant Messaging Saving Time Software Tips Proactive IT Cybercrime Malware Server Management Avoiding Downtime Robot Point of Sale Holiday Enterprise Content Management Professional Services E-Commerce Managed Service Communication Co-managed IT

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...
QR-Code