Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Checking in on Net Neutrality

Checking in on Net Neutrality

When we write about Net Neutrality, we typically write about how it is designed to keep the telecommunications conglomerates, who make Internet service available to individuals on the Internet, honest when laying out their Internet service sales strategy. One way to put it is that without net neutrality in place, the Big Four (which are currently Comcast, Charter, Verizon, and AT&T) have complete control over the amount of Internet their customers can access.

Continue reading
0 Comments

Can You Stay Compliant While Using the Cloud?

Can You Stay Compliant While Using the Cloud?

One of the inevitabilities of working with the cloud is that you have to face a tough question; what kind of compliance requirements are there for cloud-based data? If you’re storing data for your business in a cloud-based environment, it becomes your responsibility to know where and how this data is stored--particularly if you’re not the one doing the actual cloud hosting. How do you maintain compliance when you seemingly have so little control over how your computing platform is managed and maintained?

Continue reading
0 Comments

Medical IT: How Is HITECH Doing?

Medical IT: How Is HITECH Doing?

Compliance laws regarding the storage and dispersion of healthcare records were implemented with the intended purpose of urging healthcare providers to better take care of their patients’ personal information, but how effective are they? Unfortunately, there are many providers that have failed to meet the standards for the HIPAA and HITECH compliance laws, and it has brought a hefty price tag along with it.

Continue reading
0 Comments

Where There’s Data Loss, There’s Trouble

Where There’s Data Loss, There’s Trouble

Data loss can have lasting effects upon your business, usually measured in lost productivity and capital. In other words, data loss is often measured by the cost required to retrieve, restore, and/or repair its effects. Of course, this is only the beginning of how data loss can impact your operations.

Continue reading
0 Comments

Avoid Getting Fined By Understanding How Regulatory Compliance Works

Avoid Getting Fined By Understanding How Regulatory Compliance Works

Technology is invading all practices, including those of medical offices and other health-related institutions like hospitals and dental offices. With the advent of electronic medical records (EMR) and their management systems, medical institutions are capable of eliminating the physical space required to store paper documents, and can instead easily store them in a digital environment. Unfortunately, this also brings its fair share of problems, such as regulatory compliance.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Remote Monitoring Domains Management Mobility Telephony IT Consulting Entrepreneur Permissions Maintenance Cleaning Social Engineering Public Cloud Technology Laws Techology Identity Backup and Disaster Recovery Browser IT Support Telephone Systems Save Time WannaCry Printer Distributed Denial of Service GPS Black Friday Upgrades Productivity Files Apps Document Management Regulations Mobile Device Management Hard Drives WPA3 Cables Operating System Presentation Disaster Resistance Drones How To Proactive Passwords Managed IT services IT Services Wireless Google Docs Personal Information Troubleshooting Compliance E-Commerce Automation Dark Data Star Wars Government Error Meetings Password Dark Web Android Fraud Managed Service Provider Language Office 365 Unified Threat Management Business Intelligence Health IBM Utility Computing Bring Your Own Device Co-managed IT Downloads Business Technology Computers Application Favorites Smartphones Cache Computer Repair Healthcare Human Error Business Continuity Black Market Patch Management Samsung Lenovo Data loss Cloud Mobile Data Users Migration Competition Work/Life Balance Server Lithium-ion Battery Assessment Malware Cybersecurity Humor Specifications IP Address Security The Internet of Things Scam Workplace Tips Data Backup Flexibility Printing Cabling BYOD Communication Cloud Computing Mobile Computing Office Data Breach Chatbots Best Practice Networking Fleet Tracking Financial Hardware Cyber Monday Smart Tech Managed IT Permission Infrastructure Mouse USB Privacy Software as a Service Network Congestion RMM Public Speaking CCTV Emoji Consumers Piracy Mobile Redundancy Net Neutrality Apple Content Filtering Windows 10 Monitors Unsupported Software Spam Notifications Education SaaS IT Technicians Hacker User Multi-Factor Security Break Fix 3D Printing Training Authorization Knowledge Business Growth eWaste Procurement Access Control Analyitcs Wi-Fi End of Support Machine Learning Miscellaneous Gadgets SharePoint Solid State Drive Enterprise Resource Planning OneNote Employee-Employer Relationship Business Office Tips Marketing Finance Processors Alert Bitcoin Router Software History Webcam Holiday Instant Messaging Twitter Smartphone App Comparison Upgrade Data Virtual Assistant Hosted Solutions Ransomware Technology Tips Crowdsourcing Risk Management Internet Statistics Digital Payment Scary Stories Operations Undo Unified Threat Management Proactive IT Virtual Desktop Data Recovery Remote Computing Budget Data Security Technology Microsoft Excel Project Management Best Practices Vulnerabilities Typing Monitoring IoT Shortcut Unified Communications Social Media Servers Tech Terms Physical Security PowerPoint Analytics Mobile Devices LiFi Encryption iPhone Going Green Computing Infrastructure Search Network Management Collaboration Development Tracking Bandwidth Wireless Technology Settings VoIP Writing Smart Technology IT Budget Microsoft Office Email YouTube Employees G Suite Facebook Point of Sale Save Money Google Read Only Chromebook Outlook Windows 10 Data Management Motion Sickness Websites Legal Cryptocurrency Backup Managing Stress HIPAA Virus Internet of Things PDF communications How To Programming Network Security Travel Virtual Private Network Politics Update Database Authentication Display Corporate Profile Small Business Money Data storage Taxes Recovery Computing Mobile Office Tech Term Artificial Intelligence Google Calendar Digital Hard Disk Drive Electronic Health Records Gmail Hackers Server Management Vulnerability Electronic Medical Records Features Big Data Legislation Firewall Quick Tips 5G Information Technology Social Networking Connectivity Trending Screen Reader Time Management Outsourced IT Avoiding Downtime VoIP Bookmarks Test Motherboard Customer Relationship Management Help Desk Saving Money Blockchain Staffing Cost Management Safety Environment Refrigeration Mobile Device Staff Cameras Windows 7 Gadget Deep Learning Virtualization Theft Cooperation WiFi Asset Tracking Recycling Heating/Cooling Supercomputer Hacking Website Employer-Employee Relationship Managed Services Provider Documents ROI Software Tips Fun Remote Worker Google Maps Business Owner Managed IT Service Windows 8 Internet Exlporer IT Management Applications Google Drive Saving Time Botnet Customer Service Nanotechnology Paperless Office MSP Buisness Computer Tech Support Wearable Technology Efficiency Hacks Word Backups Web Server Managed Service Hiring/Firing Mobile Device Managment Spyware Mail Merge Tablet Information Consulting Phishing Address Downtime IT Consultant Tip of the Week Microsoft Conferencing Virtual Reality Cortana Geography File Sharing Consultation User Tips Identity Theft Storage Enterprise Content Management Business Management Superfish Uninterrupted Power Supply Experience Business Computing Wasting Time Halloween IT service Digital Signature High-Speed Internet Hotspot Bluetooth BDR Zero-Day Threat Licensing Wires Alt Codes Cybercrime Firefox Remote Monitoring and Management Remote Workers Private Cloud Disaster Recovery Google Wallet Robot Intranet Social Cookies Laptop Cyberattacks Antivirus Voice over Internet Protocol Current Events Data Warehousing Disaster Relocation Administrator Touchscreen Phone System CIO Computer Care Two-factor Authentication Automobile User Error Notes Hard Drive Productivity IT solutions Sync Hosted Solution Sports Law Enforcement IT Support VPN Mobile Security Managed IT Services Retail Windows Alerts Professional Services Network Administration Chrome Augmented Reality Security Cameras Identities Vendor Management Innovation Company Culture Tip of the week Running Cable Modem Mirgation

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code