Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Be Sure to Lock Your Car... and its App

Be Sure to Lock Your Car... and its App

As cars become more technologically advanced and reliant on computers, they become more likely targets for malware and cyber attacks. However, as researchers from Kaspersky have uncovered in an investigation into an assortment of connected-car mobile apps, car manufacturers may not be as committed to ensuring the security of their vehicles as drivers may want.

Continue reading

3 Ways Car Owners Can Relate to IT Administrators

3 Ways Car Owners Can Relate to IT Administrators

Technology is a critical component of the modern office, but it’s only a matter of time until it breaks down and leaves you in a bind. In a way, it’s a lot like owning a vehicle. You need it to get from Point A to Point B, but when it doesn’t work properly, it winds up costing you an arm and a leg. Worse yet, extended periods of not having transportation make it difficult to live life and go to work.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Bring Your Own Device IT Management Hard Drives Fleet Tracking Employer-Employee Relationship Zero-Day Threat Administration File Sharing VoIP Patch Management RMM Enterprise Resource Planning Information IBM Modem Business Technology Employees Office Tips Work/Life Balance Virtual Reality Networking Firewall Smartphones Business Social Networking Outsourced IT 3D Printing Analyitcs Multi-Factor Security Government Robot Permission Office 365 Microsoft Office Spyware Avoiding Downtime Gadget Network Management Files Router Black Friday Spam Facebook Hacking Solid State Drive Data Breach Server Computing User Error Retail Backup and Disaster Recovery Crowdsourcing Mobile Taxes Remote Monitoring and Management Windows 10 Phishing Sports IT Support Software as a Service Identity Theft Redundancy Windows 7 Hosted Solutions Consultation Downloads Bookmarks Shortcut IT Technicians Dark Data Automobile Administrator Emoji Search Computer Repair Technology Net Neutrality Managed IT Services Cloud Computing Cortana Hackers Chromebook Knowledge Humor Project Management Telephony Cache Quick Tips Malware Presentation Content Filtering Utility Computing Computer Dark Web Features Employee-Employer Relationship Google Calendar Vendor Management Remote Worker Travel Downtime Experience Office Disaster Recovery Vulnerability Proactive Computer Care Co-managed IT Managed Services Provider Technology Laws Miscellaneous Break Fix Time Management Authorization Social Media Personal Information Business Growth Maintenance eWaste Google Docs Cables Two-factor Authentication Software Finance GPS End of Support Authentication User Word Wi-Fi Budget Wasting Time Running Cable Encryption Infrastructure Unified Threat Management Upgrade Voice over Internet Protocol Telephone Systems Alerts Computers Laptop Trending Staffing Refrigeration E-Commerce Password Hacks Save Money MSP Wires How To Security Cameras Unified Threat Management Servers Internet Exlporer Document Management Antivirus Training Access Control Notes IT Consultant Virtual Assistant Passwords Notifications Black Market Enterprise Content Management Theft Meetings Printer Smart Technology Cooperation Windows 8 Network Settings Operations Workplace Tips Server Management Typing Remote Computing Digital Payment Machine Learning Supercomputer Database Efficiency Migration Consumers Cookies Hard Disk Drive IoT Saving Money Microsoft Data loss IT solutions Internet of Things WiFi How To Identities Mail Merge Hard Drive Physical Security WannaCry Intranet Specifications Managed Service Provider Identity Conferencing Corporate Profile Save Time communications Analytics PowerPoint Best Practice Remote Monitoring Competition Distributed Denial of Service Operating System Entrepreneur Documents Websites Hiring/Firing Test Unified Communications Motion Sickness Staff Hosted Solution Cyberattacks Touchscreen Mobile Computing Electronic Health Records Domains Chrome OneNote Money Big Data Botnet Read Only Backup Virtual Desktop Microsoft Excel Connectivity Buisness Electronic Medical Records Mobile Device Management iPhone Virus WPA3 Relocation Wearable Technology Fun Information Technology Phone System Mobile Devices Managed IT Error Google Recycling Geography Tech Term Social Engineering Lithium-ion Battery Licensing Data CIO Tip of the week Recovery Compliance Language Cleaning Asset Tracking Tracking Screen Reader Website VoIP Mobile Data Digital Going Green IT Services Help Desk Cybercrime Current Events Data Management Mouse Google Maps Paperless Office Gmail Update Mobile Device Managment Disaster Managed Service Saving Time Application Android Mobility Users The Internet of Things Assessment Comparison Small Business Writing Piracy G Suite Law Enforcement Company Culture USB Backups Disaster Resistance Safety Samsung Scam Heating/Cooling Wireless Development Health Financial Digital Signature Tech Terms Politics Apps App Alert Instant Messaging Environment Professional Services Scary Stories User Tips Artificial Intelligence Cabling Windows 10 Monitoring Mobile Office Point of Sale Innovation Best Practices Monitors Webcam Nanotechnology Cost Management Cryptocurrency Wireless Technology Education Techology Apple Human Error Undo Data Security Cameras Customer Relationship Management Business Management BYOD Cybersecurity Mobile Security Collaboration ROI Lenovo Hardware Sync Google Wallet Blockchain Storage 5G Applications Troubleshooting Data Recovery Internet Communication Business Computing Uninterrupted Power Supply Automation IT Consulting Drones Tablet Mobile Device Favorites Windows Public Speaking Social Data Warehousing Productivity Computing Infrastructure Productivity Healthcare Data Backup Managed IT services Processors Business Owner History Unsupported Software Consulting Virtualization PDF CCTV Bandwidth SharePoint Smartphone Regulations Hotspot SaaS Bitcoin High-Speed Internet VPN Email Outlook Upgrades Marketing Virtual Private Network Superfish Managing Stress Programming YouTube Statistics Proactive IT Network Congestion Augmented Reality Management Tech Support Star Wars Bluetooth Tip of the Week Legal Business Intelligence Software Tips IT Budget IP Address Display Public Cloud Cyber Monday Browser Security Halloween Printing Web Server HIPAA Smart Tech Address Technology Tips Firefox Privacy IT service Deep Learning Ransomware Cloud Twitter Hacker Google Drive Holiday Motherboard Data storage Remote Workers Vulnerabilities Permissions Network Security Managed IT Service BDR IT Support Chatbots Mirgation Business Continuity Alt Codes Risk Management Customer Service Flexibility Procurement Fraud Gadgets Legislation LiFi Private Cloud

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...