Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Look Back at 2016’s Biggest Cyber Security Stories

A Look Back at 2016’s Biggest Cyber Security Stories

2016 saw many notorious data breaches, along with developments in malware and other threats to security. It’s always helpful to reflect on these developments so that the knowledge can be used in the future to aid in developing new strategies for taking on the latest threats. How will your business learn from the mistakes of others in 2017?

Continue reading

3 Reasons Why Hackers Like to Target Small Businesses

b2ap3_thumbnail_network_security_400.jpgThis October is Cybersecurity Month! Some businesses think that they’re immune to hacking attacks because they’re “low profile” compared to huge corporations. However, the truth of the matter is that your organization is just as much at risk as they are. This month, take measures to keep your organization’s data safe, or risk losing everything in the fallout of a hacking attack.

Continue reading

97,000 Cybersecurity Threats Reported to the Government Last Year, More to Come

cyber_security_dhs_priority_400.jpgArguably one of the most imperative assets for any government is an IT infrastructure, and in 2015, the U.S. government is realizing that security breaches are some of the most dangerous cyber threats to watch out for. As evidenced by the U.S. Department of Homeland Security, IT security is just as important as other matters of national security.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

BYOD Mobile Computing Cache Browser Nanotechnology communications Smart Tech Social Data Recovery Upgrade Tip of the Week Dark Web Identity Safety Wireless Document Management IT Consulting Travel Efficiency IT solutions Business Continuity OneNote Botnet Application Project Management Bandwidth Artificial Intelligence Upgrades Features Employee-Employer Relationship Virtual Private Network Hotspot Assessment Cybersecurity Downloads Zero-Day Threat Solid State Drive Infrastructure Unified Threat Management Ransomware Wires Business Management Vendor Management Quick Tips Office 365 Alerts Writing Wireless Technology Network Cameras Printer Network Congestion Finance Education Undo Financial Hard Drives Intranet CIO Proactive IT IT Support Mail Merge Outsourced IT How To Automobile Malware Tech Support Help Desk PowerPoint Cooperation Mobile Data Utility Computing Alert Employees Notifications Blockchain Licensing Virtual Reality Big Data SharePoint Mobile Tracking Files E-Commerce Cloud Emoji Unified Communications Security Cameras Digital Signature Modem Telephony Apple Disaster Resistance Settings Address Tech Terms Public Cloud MSP Enterprise Content Management Regulations Break Fix Human Error Data storage Supercomputer Uninterrupted Power Supply Hackers Mirgation Technology Software as a Service Presentation Information Business Growth Computing Infrastructure Productivity Saving Time Mobile Devices Chatbots Microsoft Avoiding Downtime Troubleshooting Server IT service Encryption Theft Personal Information WPA3 Windows Permissions Refrigeration Passwords Processors 3D Printing Administration USB Data Security Gadgets Productivity Android Knowledge WiFi App Management Piracy Operating System Websites Firewall Test Microsoft Office Users Twitter Cybercrime Politics Update Innovation Marketing Network Security Work/Life Balance Conferencing Mobile Security Router Gmail Private Cloud CCTV Remote Workers Physical Security Managed IT Services Mobility Cryptocurrency Health Google Black Friday Healthcare Law Enforcement Drones Scary Stories IT Management ROI Hiring/Firing Mobile Office Fun Sync SaaS Instant Messaging Bookmarks Development Connectivity Google Drive Cyberattacks Monitoring Windows 10 Identity Theft Lithium-ion Battery VoIP Enterprise Resource Planning Virtual Desktop Geography Consumers Buisness Two-factor Authentication Managed Services Provider Customer Service Security Shortcut Deep Learning Electronic Medical Records Mouse Legislation Tech Term Google Docs Operations Internet Public Speaking History Outlook Internet Exlporer Gadget Antivirus Microsoft Excel IP Address Samsung Cookies IT Budget IBM Dark Data Authentication Laptop Cost Management Mobile Device Star Wars Information Technology Government Analytics Computing Unsupported Software VPN Managed Service Provider Bring Your Own Device Asset Tracking Disaster Recovery Cabling Servers Google Maps Automation Risk Management LiFi Time Management Software Software Tips Windows 10 5G Training Internet of Things Computer Net Neutrality Remote Monitoring Managed IT services Hardware The Internet of Things How To Employer-Employee Relationship Identities Office Display iPhone Alt Codes Webcam Multi-Factor Security Competition Trending Managed Service Wearable Technology Hacker Web Server User Tips Technology Tips Authorization Disaster File Sharing Business Owner VoIP Hacking Computer Repair RMM Google Calendar Monitors Mobile Device Managment Communication Cortana Black Market Business Technology Downtime Paperless Office Compliance Legal Computer Care Comparison Privacy Crowdsourcing Access Control Migration Data Backup Programming Managed IT Patch Management Miscellaneous Smart Technology IT Support Staffing Networking Smartphone Hard Drive Computers Sports Motion Sickness Social Engineering Experience Typing Office Tips Customer Relationship Management BDR Password Lenovo Data loss Money Current Events Chrome Save Money Cyber Monday Domains Halloween Data Google Wallet Techology Tip of the week Procurement Machine Learning Taxes Permission Chromebook G Suite Administrator Screen Reader Co-managed IT Redundancy Corporate Profile Hacks Distributed Denial of Service Electronic Health Records Workplace Tips Company Culture Language Firefox Remote Worker Collaboration Saving Money Data Management Mobile Device Management Remote Computing Specifications Bluetooth Apps Statistics Server Management Facebook Superfish Consultation Digital Recovery Best Practice Phone System GPS Data Breach Email Spyware Business Intelligence Best Practices IT Consultant Cloud Computing Smartphones Virtualization Social Networking Touchscreen Remote Monitoring and Management eWaste IT Services Consulting Tablet Spam Entrepreneur Business Computing Vulnerability IT Technicians Hard Disk Drive Cleaning Retail Printing Telephone Systems Robot Going Green Managing Stress Network Management Favorites Small Business Hosted Solutions Read Only Flexibility Motherboard Unified Threat Management Applications Heating/Cooling End of Support Website HIPAA Backup and Disaster Recovery Holiday WannaCry Proactive Virus Technology Laws Environment Business User Relocation User Error Maintenance Backup Backups Staff Cables Analyitcs YouTube Point of Sale Social Media Augmented Reality Fleet Tracking Meetings Running Cable Budget Documents Vulnerabilities Recycling Fraud Phishing Error Data Warehousing High-Speed Internet Windows 8 Bitcoin Humor Content Filtering Word IoT Hosted Solution PDF Search Save Time Scam Managed IT Service Storage Wi-Fi Digital Payment

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...