Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Technology Allows Fake News to Spread

How Technology Allows Fake News to Spread

In today’s political, social, and economic environment, information is more valuable than ever. However, this increased importance, paired with the speed that data can be dispersed via the Internet, has enabled many to use false information to manipulate the general public into agreeing with their views and acting upon them.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Data Recovery Storage Mirgation Unified Threat Management High-Speed Internet Apps Data Management Gadgets Fraud Data storage Analyitcs Business Computing Nanotechnology Computing Infrastructure Unsupported Software Screen Reader Running Cable Writing Password Monitors Email Digital Payment Windows 10 User Tips Computer Care Public Cloud Spam IT Management Productivity Communication Authentication Machine Learning File Sharing Physical Security Virus Conferencing ROI IP Address Computer Processors Digital Signature Help Desk Uninterrupted Power Supply Cloud Taxes Automation Connectivity Search communications IT Consultant Going Green Experience Wearable Technology Alerts Corporate Profile Point of Sale Company Culture Files Presentation Statistics Telephone Systems Windows 8 Fleet Tracking Tech Support IT Consulting Hacks Regulations Gmail Troubleshooting Data Backup Managed IT Services IT Support Undo Modem Google Calendar Business Growth Managed Service Technology Laws Theft Virtualization Dark Data Identities Chrome Employees Law Enforcement Word Human Error Cache Backup and Disaster Recovery Documents Managed IT services Techology IT Budget Relocation Disaster Recovery Phishing WiFi Superfish Robot Computers Employer-Employee Relationship Mobile Office Mobile Hard Drive Cortana IT Services Managed IT Service Compliance Mobility Infrastructure Access Control Mouse Managing Stress Marketing Tracking The Internet of Things Innovation Permissions Cloud Computing Safety Cybercrime Retail Smart Tech Social Media Facebook Malware Mobile Security VoIP Environment Business Technology Unified Threat Management End of Support Save Time Website Mobile Devices Heating/Cooling Backups Staff Technology Tips Features Two-factor Authentication Solid State Drive SharePoint Software iPhone Knowledge Vendor Management Browser Information Technology Mobile Device Update IBM 3D Printing Zero-Day Threat Licensing Network Management PowerPoint Laptop User Google Drive Backup Automobile Halloween Printer SaaS Chatbots Competition Current Events Politics Cookies Proactive IT Maintenance History Flexibility Document Management Business Intelligence Asset Tracking Fun Cost Management Black Market IoT Electronic Health Records Social Engineering Alert Business Continuity Computing Customer Service Consultation Cooperation Remote Worker G Suite Collaboration Microsoft Webcam Motion Sickness Windows 10 Virtual Desktop Proactive Virtual Reality Save Money Distributed Denial of Service Cybersecurity Technology Sports Router Digital Hard Drives Applications Saving Money Comparison Crowdsourcing Consulting Assessment Information Cyber Monday Legal Windows Read Only Buisness Co-managed IT Break Fix Blockchain Hosted Solution Apple User Error Best Practice Intranet 5G Workplace Tips Bring Your Own Device Office USB Bluetooth Display VoIP Employee-Employer Relationship Risk Management Upgrades Training Refrigeration Cryptocurrency Upgrade Gadget Favorites Shortcut Patch Management Server Management Emoji Scary Stories Enterprise Content Management Security Cameras Procurement Dark Web Downtime OneNote Telephony Identity BYOD Internet Network Virtual Private Network Privacy Twitter Smartphones How To Firewall Downloads Redundancy Monitoring Big Data Wires Sync Specifications Domains Passwords Application Touchscreen Network Congestion Efficiency Data Breach Time Management Productivity Project Management Vulnerability Business Electronic Medical Records Mail Merge Hacking Scam Hackers Management VPN Tech Term Avoiding Downtime Government Personal Information Managed Service Provider Typing Internet of Things Networking Users Samsung Remote Monitoring Outsourced IT BDR Mobile Data Private Cloud YouTube Internet Exlporer Best Practices Paperless Office Data Warehousing Data Remote Monitoring and Management Software Tips Health Content Filtering Administrator Spyware Deep Learning Black Friday Cameras Business Management Server Office Tips Microsoft Excel Public Speaking Office 365 Google Docs Healthcare Net Neutrality Settings Analytics Humor HIPAA Firefox Chromebook Lithium-ion Battery Trending Development Bookmarks Tip of the week Cleaning Tech Terms Work/Life Balance Multi-Factor Security Legislation Printing Meetings Smartphone Websites Tablet Administration MSP Wireless Mobile Device Management Hosted Solutions Budget Remote Workers IT service Android Cables Migration Entrepreneur WPA3 Ransomware Computer Repair Consumers Saving Time Operating System Lenovo Outlook Hotspot Encryption Microsoft Office IT Support Tip of the Week Financial WannaCry Recycling Operations Software as a Service Data loss Servers Customer Relationship Management Notifications Identity Theft Google Maps Wi-Fi Travel Education Wireless Technology Instant Messaging Cabling Address Motherboard Disaster Botnet Geography App IT solutions Bitcoin Remote Computing Web Server Managed IT Piracy Bandwidth Recovery IT Technicians E-Commerce Data Security Security Holiday eWaste PDF Programming Cyberattacks Language Social Networking Hard Disk Drive GPS Smart Technology Money RMM How To Antivirus Utility Computing Unified Communications Social Error Finance Augmented Reality Enterprise Resource Planning Quick Tips Phone System Authorization Small Business Disaster Resistance Drones Test Hacker Managed Services Provider Network Security LiFi Alt Codes Google Mobile Computing Permission Miscellaneous CIO Staffing CCTV Artificial Intelligence Vulnerabilities Hiring/Firing Star Wars Hardware Google Wallet Business Owner Mobile Device Managment Supercomputer

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...