Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

WARNING: A New Zero-Day Threat is On the Loose

WARNING: A New Zero-Day Threat is On the Loose

Zero-day threats are some of the most dangerous ones out there. What we mean by “zero day” threats are those that have been discovered by hackers before an official patch has been released by the developers, giving them exactly zero days before they are actively exploited in the wild. One of the more dangerous zero-day threats out there at the moment is one that takes advantage of Internet Explorer.

Continue reading
0 Comments

There are New Ways to Secure Your Data

There are New Ways to Secure Your Data

Security is an aspect of running a business that absolutely cannot be ignored, regardless of whether or not you see it as a considerable issue in the near future. The fact remains that your organization will always be at risk unless you take actions to keep it safe today. By taking advantage of some of the latest and greatest security tools on the market, you’ll be able to protect not only from the basic threats, but more advanced ones as well.

Continue reading
0 Comments

October is Cybersecurity Awareness Month

October is Cybersecurity Awareness Month

Cybercrime is the fastest growing criminal activity in the world. From the largest enterprise to the individual, it can affect anyone, anywhere. To help ensure the cybersecurity of American citizens and their businesses, the Department of Homeland Security (DHS), United States Computer Emergency Readiness Team (CERT), and the Federal Bureau of Investigation (FBI) and other agencies work together every October to raise awareness about the threats people face online through a series of educational events and activities.

Continue reading
0 Comments

Tip of the Week: 12 Security Rules Every PC User Should Follow

Tip of the Week: 12 Security Rules Every PC User Should Follow

While you are probably spending a fair amount of time thinking about your business’ security, can you confidently say the same about those that you’ve employed? Unfortunately, your workers may not put much thought into network security. This could very possibly lead to some severe issues potentially harming your business operations.

Continue reading
0 Comments

How Rogue Software Makes PC Problems Worse

How Rogue Software Makes PC Problems Worse

It’s difficult to know what you can and can’t trust in the realm of cybersecurity. However, you’re likely to trust your own security solution. Yet, even this could be a devastating oversight, as some malware masquerades as your security software.

Continue reading
0 Comments

Be Deliberate About Cybersecurity and Avoid the Worst Attacks of the Web

Be Deliberate About Cybersecurity and Avoid the Worst Attacks of the Web

They say that those who don’t learn from history are doomed to repeat it, and matters of cyber security are no exception. Threats will often follow trends, and so by reviewing what has happened in the past, we may be able to glean some insight into what will be important in the future.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Data storage Knowledge Hard Disk Drive Best Practices Permission Webcam Programming Disaster Recovery Information Business Computing How To Android Administrator Outlook Update Printing Redundancy Avoiding Downtime Tip of the week RMM Managed IT Facebook Passwords Web Server Collaboration Maintenance SaaS Phishing Asset Tracking Modem Going Green Assessment Operations Websites IP Address Identities Business Management Legal Display Best Practice Favorites Microsoft Augmented Reality Email Business Growth Remote Monitoring and Management Hackers Quick Tips Social Networking Touchscreen Shortcut Information Technology Tech Support Consulting App Distributed Denial of Service Connectivity LiFi Business Technology Consumers Password Network Management Cabling 5G Deep Learning Electronic Health Records Monitors Electronic Medical Records CCTV Technology Tips Motion Sickness Computer Care Human Error Tip of the Week Processors Drones Operating System Customer Service Work/Life Balance Saving Time Cloud Smart Technology Buisness Domains Education Servers WannaCry Downtime IT Support Cyberattacks Politics User Google Website Gadget Cortana Cleaning Phone System Mobile Device Managment IT service GPS Project Management Piracy Firefox Hiring/Firing Smartphones IT Technicians Server Features Troubleshooting Hardware Blockchain Digital Superfish Remote Worker Staff Ransomware Fun Managed IT Services Wires Mobile Proactive IT IT Consultant Identity Theft Fraud Screen Reader Mobile Device Procurement Office 365 Hosted Solutions Writing IoT Monitoring IBM SharePoint Recovery Dark Data Tablet Workplace Tips Robot Remote Monitoring Digital Payment Internet IT Consulting Saving Money Tech Term Help Desk Public Cloud Alert Instant Messaging Cookies Mobile Computing Data Management Hacking Meetings Word Remote Workers Zero-Day Threat Trending Access Control Software as a Service Black Friday Telephony Healthcare WPA3 Supercomputer BYOD Machine Learning Storage Technology Laws Laptop Techology Budget Telephone Systems Geography VoIP Google Docs Tracking Marketing Automobile Automation Corporate Profile Managed IT Service Environment Computers Files Smart Tech Holiday IT Budget Network Personal Information Google Wallet Twitter Cloud Computing Bluetooth Notifications Dark Web Wireless Risk Management Users High-Speed Internet Cryptocurrency Virtual Desktop Samsung Internet of Things Entrepreneur Data Warehousing Networking Cameras Technology Mobile Devices Outsourced IT Humor iPhone Cybersecurity Finance Server Management Running Cable Authentication Data Crowdsourcing Uninterrupted Power Supply Co-managed IT Alerts Downloads Competition Business Owner Chatbots Social Infrastructure Licensing Apple Vulnerability Lithium-ion Battery Chromebook Employee-Employer Relationship IT Management Nanotechnology Employer-Employee Relationship Hotspot Money Virus 3D Printing Error Microsoft Office Data loss Administration Identity Cache Communication Managed Service YouTube Innovation Hard Drive Big Data ROI Virtualization Law Enforcement Cooperation Documents Enterprise Content Management Managed Service Provider Comparison Network Congestion Wearable Technology Upgrade How To Public Speaking Windows 8 Customer Relationship Management Scary Stories Net Neutrality Specifications Privacy Cyber Monday Bandwidth Backup Upgrades Current Events Mobility Address Fleet Tracking Conferencing Theft Backups Botnet OneNote Apps Settings Spam Spyware Small Business Productivity Google Maps PDF Social Media Digital Signature Windows Permissions Safety History Lenovo Search Windows 10 Motherboard User Tips Undo WiFi Travel Business Applications Software Analyitcs Physical Security Data Backup Social Engineering Remote Computing VPN Save Time Training Gmail Cost Management Computing Infrastructure Time Management Experience Windows 10 Document Management Backup and Disaster Recovery Router Virtual Private Network Network Security BDR Productivity CIO Emoji Language Unified Threat Management Artificial Intelligence Data Breach Staffing Miscellaneous G Suite Microsoft Excel Bookmarks E-Commerce Unified Communications Proactive Intranet Chrome Gadgets Data Security Migration Hosted Solution Hacks Google Drive Computing Authorization USB Legislation Office End of Support Health Printer MSP communications Star Wars Bitcoin Private Cloud Malware Relocation Development Wi-Fi Hacker Hard Drives Taxes Mobile Office Financial Antivirus Scam Enterprise Resource Planning Internet Exlporer Break Fix Halloween Typing IT Support Mobile Data PowerPoint Cybercrime Computer Repair Retail Unified Threat Management Analytics Mobile Device Management Regulations User Error Cables Vulnerabilities eWaste Flexibility Read Only Sync Application Mirgation Tech Terms Firewall The Internet of Things Computer Office Tips Software Tips Heating/Cooling Browser Black Market Solid State Drive Test Bring Your Own Device Utility Computing Business Continuity Wireless Technology Disaster Employees Two-factor Authentication Disaster Resistance Statistics File Sharing Mouse Save Money Paperless Office Efficiency Google Calendar Government Smartphone Recycling Content Filtering Presentation Alt Codes Business Intelligence Patch Management Virtual Reality Vendor Management Management Data Recovery Compliance Mobile Security Multi-Factor Security Refrigeration Unsupported Software IT solutions Point of Sale IT Services Security Cameras Security Consultation Managing Stress Sports Encryption Company Culture HIPAA Managed Services Provider Mail Merge VoIP Managed IT services

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code