Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Where There’s Data Loss, There’s Trouble

Where There’s Data Loss, There’s Trouble

Data loss can have lasting effects upon your business, usually measured in lost productivity and capital. In other words, data loss is often measured by the cost required to retrieve, restore, and/or repair its effects. Of course, this is only the beginning of how data loss can impact your operations.

Continue reading
0 Comments

Should Companies Be Punished for Data Breaches?

Should Companies Be Punished for Data Breaches?

We’ve all seen and heard about companies and government departments that have experienced major security and data loss events. Once the event is made public, there is a media frenzy of coverage disclosing answers to questions like: Were your records compromised? How can you protect nonpublic information in the future? What should you do if you are a victim? However, as the media focus moves to another topic, the breach becomes yesterday’s news - and there is very little coverage of what repercussions and penalties those entities that were breached faced - if any.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Enterprise Resource Planning Vendor Management Drones Time Management Supercomputer Compliance Saving Money Samsung Software Tips Knowledge Electronic Health Records Presentation Mail Merge Technology Laws VoIP Content Filtering Google Drive Unified Threat Management Halloween Communication Printing Wireless Technology Machine Learning Domains Phishing Crowdsourcing Passwords Backups Remote Worker Analytics Digital Heating/Cooling Managed Service Provider Writing Recovery Display Employer-Employee Relationship E-Commerce Cybercrime Computer Care Software as a Service Utility Computing Error Screen Reader Google Miscellaneous Cooperation Consumers CCTV Search Undo Authentication Efficiency PowerPoint Windows Automobile Dark Web Microsoft Office CIO Tip of the week Mobile Device Big Data iPhone Instant Messaging Cables Smart Tech Tech Support Hacker Productivity Android Employee-Employer Relationship Chatbots Healthcare IT Management Regulations Risk Management Application Cybersecurity Internet Education Dark Data Legislation Remote Computing Tracking Hard Drive Windows 10 Law Enforcement Personal Information Windows 8 Administration Bandwidth Managed Service Unsupported Software IBM IT Support IT Budget Lenovo Remote Monitoring Experience Work/Life Balance Intranet BYOD Avoiding Downtime eWaste Entrepreneur Paperless Office Malware Automation Finance Websites Distributed Denial of Service Business Intelligence Health Gadgets Network Security Consulting Upgrades Google Wallet Cortana Mobile Computing Fleet Tracking Social Media Office Innovation MSP Help Desk Phone System Technology Tips Meetings Best Practices Data Breach USB Remote Workers Robot Data storage IT solutions Information Maintenance Cost Management Comparison Black Market Mobile PDF Mobile Office YouTube Staffing Virtual Desktop Windows 10 Running Cable Point of Sale Deep Learning Wireless Virtualization Hacks Motion Sickness High-Speed Internet Augmented Reality Network Congestion Hotspot Digital Payment Multi-Factor Security WannaCry Wi-Fi Shortcut Business Growth Public Cloud Wires Document Management How To Authorization Managed IT services End of Support Bluetooth Cleaning Tip of the Week Disaster Resistance Office 365 Networking Assessment Cache Refrigeration Business Technology Security Cameras Managed Services Provider WiFi Scary Stories Staff Business Management The Internet of Things ROI Software Voice over Internet Protocol Motherboard Redundancy Microsoft Excel Operations Backup and Disaster Recovery Windows 7 Virus Technology IT Support Blockchain Geography Managed IT Computing Proactive IT Budget IT Consultant Cabling Collaboration Router Solid State Drive App Development Current Events Small Business Computer Programming RMM Vulnerability Alerts Encryption Server Identity Buisness Data Security How To Monitoring Firefox Two-factor Authentication Mobile Devices Downtime Managing Stress Data loss Read Only Outsourced IT Remote Monitoring and Management Mobile Device Managment Laptop Artificial Intelligence Analyitcs Private Cloud Notifications Microsoft Migration Tablet Hackers Customer Service Legal Taxes Managed IT Service Ransomware Operating System communications Zero-Day Threat Users Data Alert Trending Relocation Information Technology Address Data Warehousing Safety Web Server Hard Disk Drive Superfish IT Consulting Computers Browser Smartphone Troubleshooting Wasting Time Chrome Cameras Computer Repair Mobility Network Patch Management Server Management Telephone Systems Processors Cloud Computing File Sharing Nanotechnology Training 5G Backup Physical Security Outlook Cookies Fun Star Wars Security User Upgrade Notes Administrator Quick Tips Unified Communications SharePoint Company Culture Statistics VoIP Bitcoin Vulnerabilities Corporate Profile Conferencing Google Docs HIPAA Hiring/Firing Webcam Specifications Recycling Connectivity Facebook User Error Humor Internet of Things Business Continuity Language Procurement Workplace Tips IT service Applications LiFi IoT Disaster Recovery Lithium-ion Battery Access Control Social Networking Password IT Services Digital Signature Licensing GPS Gmail Techology Website Proactive Business Computing Computing Infrastructure Professional Services Identity Theft Tech Terms Settings Productivity Disaster Mirgation Customer Relationship Management Business Uninterrupted Power Supply Electronic Medical Records Black Friday Chromebook Spam Firewall Cyber Monday Scam Smartphones Smart Technology Sports Saving Time BDR Internet Exlporer Travel VPN Flexibility Fraud Retail Typing Best Practice Privacy Identities Storage Money Favorites Gadget Mouse Save Money Alt Codes Servers Theft Government Tech Term Google Calendar Public Speaking Data Backup Data Management Management Antivirus Virtual Reality Cloud Emoji Bookmarks User Tips Database Social Engineering Break Fix Social Going Green Marketing WPA3 Mobile Security Human Error Virtual Assistant Documents G Suite Printer Financial Hosted Solution Hard Drives Co-managed IT Data Recovery Telephony Hosted Solutions Downloads Mobile Device Management 3D Printing Spyware Test Bring Your Own Device Virtual Private Network Consultation Environment Google Maps Infrastructure Business Owner Network Management Office Tips Politics Sync Asset Tracking Unified Threat Management Features OneNote IP Address Piracy Word Twitter Hacking Managed IT Services Cyberattacks Employees History Files Project Management Permissions Save Time Botnet Apple Mobile Data Wearable Technology Monitors Touchscreen Update Net Neutrality Email Hardware Modem SaaS Apps Enterprise Content Management IT Technicians Competition Permission Cryptocurrency Holiday

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code