Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look Back at 2016’s Biggest Cyber Security Stories

A Look Back at 2016’s Biggest Cyber Security Stories

2016 saw many notorious data breaches, along with developments in malware and other threats to security. It’s always helpful to reflect on these developments so that the knowledge can be used in the future to aid in developing new strategies for taking on the latest threats. How will your business learn from the mistakes of others in 2017?

Continue reading

3 Reasons Why Hackers Like to Target Small Businesses

b2ap3_thumbnail_network_security_400.jpgThis October is Cybersecurity Month! Some businesses think that they’re immune to hacking attacks because they’re “low profile” compared to huge corporations. However, the truth of the matter is that your organization is just as much at risk as they are. This month, take measures to keep your organization’s data safe, or risk losing everything in the fallout of a hacking attack.

Continue reading

97,000 Cybersecurity Threats Reported to the Government Last Year, More to Come

cyber_security_dhs_priority_400.jpgArguably one of the most imperative assets for any government is an IT infrastructure, and in 2015, the U.S. government is realizing that security breaches are some of the most dangerous cyber threats to watch out for. As evidenced by the U.S. Department of Homeland Security, IT security is just as important as other matters of national security.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Lenovo Hosted Solution Scary Stories Crowdsourcing Dark Web Zero-Day Threat Software Tips Twitter Paperless Office Digital Signature Marketing Data loss IT Budget Consulting Chromebook Motion Sickness Malware Microsoft Excel Disaster Google BDR Budget WPA3 Mobile Computing Notes IT Support communications VPN User Error Typing Save Money Sports Cybersecurity Gadgets Database Hard Disk Drive Environment Net Neutrality Managed IT Service Computing Infrastructure eWaste Black Market Settings WannaCry Permissions Features 3D Printing Heating/Cooling Website VoIP Miscellaneous Vendor Management Language Experience Company Culture Cyberattacks Solid State Drive Relocation Websites Managed IT Services Tablet Apple Microsoft Users Spam Flexibility Social Media Wearable Technology Domains Storage Supercomputer Data Management Cyber Monday Enterprise Content Management Administrator Social Networking Password RMM Apps Authentication Deep Learning Android Bluetooth Google Docs Smart Technology Augmented Reality Web Server Data Security Scam Cache Mobile Devices Development Buisness Sync Hotspot Data Backup Chrome Processors The Internet of Things Best Practices Remote Workers Mobile Device Alerts Network Congestion Touchscreen Education Remote Computing Hacking Travel Mail Merge Operations Smartphones Content Filtering Microsoft Office Retail Favorites Remote Monitoring Windows 7 Social Engineering PowerPoint Cloud Computing Windows 10 App Healthcare Computing Update Computer Care Virus Humor Mobile Business Growth IT Management Email Consumers Samsung Undo IT Technicians Star Wars BYOD Multi-Factor Security Public Speaking Programming Drones Recovery Knowledge Employees Servers Risk Management Address Hiring/Firing Monitoring Managing Stress Social IT Consultant Display Antivirus Cortana Business Continuity Motherboard MSP Personal Information Webcam Mobile Office Modem Managed IT services Google Calendar Meetings Administration Ransomware Search Two-factor Authentication Networking WiFi Identity Theft Tech Support Managed IT Compliance Physical Security Theft IBM Unified Threat Management Distributed Denial of Service High-Speed Internet Wires Virtual Reality How To CCTV Project Management Google Maps Best Practice Staffing Windows 10 Business Technology Cameras Point of Sale Saving Time Data storage Application Unsupported Software Automation Consultation IT service Safety YouTube Hard Drive Finance Legislation Information User Fleet Tracking Human Error Bandwidth Spyware Phishing Trending Hardware Utility Computing Holiday Passwords Privacy Software as a Service Mobile Data Small Business Corporate Profile Read Only Mobile Device Managment Printing Gmail Mobile Security Statistics Identity Firewall Fraud PDF Test E-Commerce Upgrade Backups LiFi Entrepreneur Licensing Virtualization Tip of the week Mobile Device Management Big Data SharePoint Documents Professional Services IT Support Gadget IP Address Workplace Tips G Suite IT Services Office Asset Tracking Automobile Bitcoin Disaster Recovery Security Data Warehousing Server Cooperation Authorization Monitors Digital Payment Virtual Desktop Security Cameras Customer Service GPS Phone System Managed Service Network Management Laptop Electronic Health Records CIO Staff Error Backup and Disaster Recovery Computer Repair Procurement Redundancy Assessment Access Control Employee-Employer Relationship Mouse Writing Botnet Digital Dark Data Running Cable Enterprise Resource Planning Analytics How To Applications Efficiency Information Technology Connectivity HIPAA Mirgation Piracy Network Security Cables Time Management Internet of Things Vulnerabilities Wireless Technology OneNote Regulations Document Management Business Management Business Intelligence Help Desk Computer Unified Threat Management Training Money Migration Permission Infrastructure ROI Productivity Quick Tips Intranet Business Computing Cryptocurrency Saving Money Virtual Private Network Machine Learning Patch Management Alt Codes Browser Smart Tech Hacker Windows Maintenance iPhone Data Blockchain Government Shortcut Innovation Artificial Intelligence Productivity Comparison Network Customer Relationship Management Technology Operating System Data Recovery Conferencing Financial Backup Outlook Voice over Internet Protocol Vulnerability 5G Telephony Internet Exlporer File Sharing Tech Terms Private Cloud Halloween Telephone Systems Alert Communication Hackers Emoji Wi-Fi Lithium-ion Battery VoIP Cabling IT solutions User Tips Screen Reader Competition Notifications Encryption Collaboration IT Consulting Outsourced IT Politics Going Green Current Events Public Cloud End of Support Management Technology Tips IoT Bring Your Own Device Computers USB Employer-Employee Relationship Data Breach Black Friday Server Management Proactive IT Co-managed IT Analyitcs Fun Cloud Refrigeration Nanotechnology Disaster Resistance Wireless Legal Business Owner Windows 8 Tech Term Techology Taxes Recycling Cookies Proactive Identities Bookmarks Geography Electronic Medical Records Tip of the Week Software Managed Service Provider Unified Communications Office 365 Google Wallet Smartphone Instant Messaging Superfish SaaS Specifications Google Drive Mobility Office Tips Break Fix Upgrades Robot Downtime Save Time Managed Services Provider Presentation Virtual Assistant Remote Worker Chatbots Remote Monitoring and Management Files Troubleshooting Uninterrupted Power Supply Cybercrime Printer Health Downloads Law Enforcement Hard Drives Word Cost Management Wasting Time Firefox Facebook Router Cleaning Avoiding Downtime Technology Laws Hosted Solutions Business Work/Life Balance Tracking History Internet Hacks

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...