Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Be Sure to Lock Your Car... and its App

Be Sure to Lock Your Car... and its App

As cars become more technologically advanced and reliant on computers, they become more likely targets for malware and cyber attacks. However, as researchers from Kaspersky have uncovered in an investigation into an assortment of connected-car mobile apps, car manufacturers may not be as committed to ensuring the security of their vehicles as drivers may want.

Continue reading

3 Ways Car Owners Can Relate to IT Administrators

3 Ways Car Owners Can Relate to IT Administrators

Technology is a critical component of the modern office, but it’s only a matter of time until it breaks down and leaves you in a bind. In a way, it’s a lot like owning a vehicle. You need it to get from Point A to Point B, but when it doesn’t work properly, it winds up costing you an arm and a leg. Worse yet, extended periods of not having transportation make it difficult to live life and go to work.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Backups Access Control Managed IT services VoIP Vulnerabilities BYOD Email Financial Hacker Users Sync Avoiding Downtime Operations Mobility Cameras Managed Service Provider Vulnerability Social Networking Word Network Congestion Troubleshooting Computers Digital Signature Notifications Telephone Systems Virtual Private Network BDR Software as a Service Backup GPS Tip of the week Spyware PowerPoint Scam Legislation Gadgets Lenovo How To Healthcare Regulations Permission eWaste Staff Tech Term Intranet Wireless Technology Artificial Intelligence Technology Laws Hosted Solution Google Maps Refrigeration Social Media Remote Worker Writing Employer-Employee Relationship G Suite Servers Uninterrupted Power Supply Documents Electronic Medical Records Staffing Analyitcs Risk Management Office 365 Bring Your Own Device IT Support Customer Relationship Management Managing Stress Typing Customer Service IT Management 3D Printing Quick Tips 5G Human Error Save Time CCTV Router Chatbots Instant Messaging Google Business Wires Security Cameras Bookmarks Mirgation User Tips Disaster Resistance Android IT solutions Identities Unified Threat Management Websites Employees Gmail Server Management Update Twitter Technology Computer Repair Ransomware Crowdsourcing User Mobile Entrepreneur Heating/Cooling Alert Alt Codes Data loss Windows 10 Phone System OneNote Identity Theft Smartphone Buisness Statistics Wireless Running Cable Physical Security Laptop Office History IT Support Windows Productivity Processors Public Cloud Tracking Assessment Fleet Tracking Project Management Cabling Data storage Read Only Environment Bandwidth Wi-Fi Going Green Error Internet Apple Multi-Factor Security IT Budget Web Server Files Digital Time Management Machine Learning Training Small Business Halloween Scary Stories Upgrades Tech Terms Undo Programming Domains Competition Cybersecurity Health Malware Google Calendar IT Consulting Network Augmented Reality Humor IP Address Alerts Maintenance Content Filtering Personal Information Office Tips Social Computer Care Taxes Recovery Blockchain Cache Emoji File Sharing Hard Disk Drive Business Technology Money Specifications Encryption Cyber Monday Storage Cloud Unified Communications VoIP communications ROI Efficiency Password Compliance Cortana Dark Web Tip of the Week Deep Learning Remote Monitoring and Management Proactive IT Printing Hosted Solutions High-Speed Internet Best Practice Mobile Device Management Bitcoin Data Breach Hard Drive Data Superfish MSP Solid State Drive Mobile Device Automobile Phishing Saving Money Public Speaking E-Commerce Business Continuity Point of Sale Outsourced IT Consultation SaaS Robot Utility Computing Managed Services Provider Lithium-ion Battery Administration Dark Data Bluetooth iPhone Network Management Google Docs Hiring/Firing Virus Display Current Events Data Backup CIO Analytics Cookies Mobile Security Managed IT Services Smart Tech Cables Theft Shortcut Business Growth Spam Saving Time Tech Support Politics Hacking Migration Licensing Government Browser RMM Managed Service Mobile Computing Favorites Unsupported Software Communication Antivirus VPN Wearable Technology Meetings Internet Exlporer Hard Drives Screen Reader Comparison IT service Employee-Employer Relationship Chrome Managed IT Service Virtualization Experience Miscellaneous Authentication YouTube Education Collaboration Printer Telephony Privacy Data Recovery Samsung Connectivity Knowledge Mobile Devices Save Money Nanotechnology Cyberattacks Black Market IBM LiFi Proactive Techology Virtual Reality Microsoft Office Application Conferencing Procurement Touchscreen Authorization Chromebook Data Management Law Enforcement Recycling Co-managed IT WPA3 Settings Business Management End of Support Facebook Remote Monitoring Management Search Patch Management Big Data Cloud Computing How To Managed IT Best Practices Administrator Software Tips PDF Geography Downtime Monitors HIPAA Company Culture Webcam Backup and Disaster Recovery Cost Management Black Friday Corporate Profile The Internet of Things Innovation Computing Infrastructure Net Neutrality Hackers Windows 10 Productivity Cleaning Downloads Work/Life Balance IoT Tablet Fraud IT Services Upgrade Information Technology Smart Technology Safety IT Consultant Star Wars Mail Merge Apps Identity Piracy Drones Hardware Disaster Recovery Microsoft Retail Motion Sickness Redundancy Mouse Workplace Tips Data Warehousing Disaster Operating System Mobile Data Travel Computer Test USB Flexibility Infrastructure Google Drive Computing Help Desk IT Technicians Windows 8 Paperless Office WiFi Information Modem Business Owner Botnet User Error Mobile Device Managment Microsoft Excel Document Management Outlook Motherboard Asset Tracking Permissions Business Computing Finance Passwords Internet of Things Vendor Management WannaCry Distributed Denial of Service Supercomputer Marketing Holiday Two-factor Authentication Enterprise Resource Planning Virtual Desktop Cryptocurrency Website Hacks Security Cybercrime Legal Development App Consulting Enterprise Content Management Private Cloud Firefox Network Security Remote Workers Social Engineering Gadget Business Intelligence Trending Language Technology Tips Data Security Automation Google Wallet Firewall SharePoint Smartphones Zero-Day Threat Sports Applications Relocation Consumers Cooperation Mobile Office Software Remote Computing Unified Threat Management Electronic Health Records Monitoring Fun Networking Address Break Fix Features Presentation Digital Payment Server Hotspot Budget

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...