Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Where There’s Data Loss, There’s Trouble

Where There’s Data Loss, There’s Trouble

Data loss can have lasting effects upon your business, usually measured in lost productivity and capital. In other words, data loss is often measured by the cost required to retrieve, restore, and/or repair its effects. Of course, this is only the beginning of how data loss can impact your operations.

Continue reading
0 Comments

Should Companies Be Punished for Data Breaches?

Should Companies Be Punished for Data Breaches?

We’ve all seen and heard about companies and government departments that have experienced major security and data loss events. Once the event is made public, there is a media frenzy of coverage disclosing answers to questions like: Were your records compromised? How can you protect nonpublic information in the future? What should you do if you are a victim? However, as the media focus moves to another topic, the breach becomes yesterday’s news - and there is very little coverage of what repercussions and penalties those entities that were breached faced - if any.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Office 365 Taxes OneNote Hotspot Automation Router Data Breach Programming Save Time Recovery Identity Theft Regulations Presentation Point of Sale Display Software Tips Outlook Computer Repair Dark Data Undo Hard Drive Automobile Employee-Employer Relationship Consumers Education Electronic Health Records Google Docs Compliance Redundancy Enterprise Resource Planning Sync Cabling Samsung Employer-Employee Relationship Wireless Tip of the week LiFi Buisness Data Management Telephony Government User Tips Hackers Enterprise Content Management Files Remote Monitoring Apple Staff Knowledge Upgrades Sports Windows 8 ROI Mobility WannaCry Productivity Cables Disaster Resistance Wi-Fi Going Green Cyber Monday Access Control Microsoft Hacking End of Support Wires Save Money Typing Management Unified Threat Management Backup and Disaster Recovery Cleaning Innovation Augmented Reality Domains Network Security Tracking Business Owner Lenovo Travel Computer Cyberattacks Black Friday Safety Troubleshooting Artificial Intelligence Identities Cortana Tip of the Week Fleet Tracking Mobile Device Bookmarks Printer Remote Computing Gadget Hard Drives Twitter Refrigeration Networking Mobile Data Money Wearable Technology Tablet Private Cloud Project Management Business Continuity Saving Money IT Support Features Cookies Test Motherboard Paperless Office Office Tips Google Maps Human Error Password Relocation Miscellaneous Apps Data Recovery Documents Scam Technology Laws Upgrade Communication Chatbots SaaS Conferencing Virtual Private Network Information Proactive IT Vulnerability Mirgation Notifications Office Websites Work/Life Balance Two-factor Authentication Managed IT Service Environment IT Management Technology Touchscreen Cost Management Information Technology Utility Computing Dark Web Favorites WPA3 Quick Tips Law Enforcement Tech Support Infrastructure Heating/Cooling Big Data Piracy Monitors Mobile Device Managment Software as a Service Writing Customer Relationship Management Development Halloween IT Consulting IT Services Bandwidth Robot Passwords VPN Co-managed IT Windows 10 Social YouTube Entrepreneur Authorization Deep Learning Storage Wireless Technology CIO Microsoft Excel Business Technology Alert Identity Language Google Calendar Managed IT Services Chrome Google Website Google Wallet Managed IT services Cooperation iPhone Ransomware Backup Analyitcs Processors Cryptocurrency Finance Webcam Financial Spyware File Sharing Flexibility Tech Terms Windows 10 Downloads Risk Management Malware Network Congestion Smartphones Search Technology Tips Assessment Disaster Recovery Net Neutrality Maintenance Software RMM Health Hosted Solution Users Disaster Mobile Computing HIPAA Hardware Gmail High-Speed Internet Managed IT communications Analytics Licensing Modem Internet of Things Uninterrupted Power Supply PowerPoint The Internet of Things Politics Holiday Theft Machine Learning VoIP Vulnerabilities Business Computing Smartphone Managed Service Provider Network Backups Avoiding Downtime Administrator Unsupported Software Server Application MSP History Remote Monitoring and Management Mouse Remote Workers Connectivity Printing Saving Time Black Market Bring Your Own Device E-Commerce Employees Computing Public Cloud Windows Geography Network Management Running Cable Data loss Social Media Fun Proactive Business Management IT Consultant Outsourced IT Hiring/Firing Break Fix IT Technicians Computers Operations Cache Patch Management Emoji Social Networking Migration Asset Tracking Gadgets Content Filtering Mobile Office Retail Digital Shortcut Scary Stories Lithium-ion Battery Marketing Data Security Antivirus Computer Care Business Statistics Crowdsourcing Address Personal Information BDR CCTV Drones Nanotechnology Mobile Device Management Permission IBM VoIP Corporate Profile Unified Threat Management Tech Term Distributed Denial of Service Business Intelligence Document Management Best Practice Phone System Alt Codes PDF Data Supercomputer Best Practices Read Only Microsoft Office Mobile Chromebook USB Zero-Day Threat Security Cameras Fraud Alerts Recycling Cloud Internet Permissions Google Drive Superfish IT solutions Remote Worker Hosted Solutions Virtual Reality Hacks How To Vendor Management Small Business Instant Messaging Internet Exlporer Physical Security Legislation IT Budget Consultation Mobile Security Cybercrime Botnet Budget Humor Electronic Medical Records Monitoring BYOD Update Virus Screen Reader App Training Email Specifications Smart Tech Error Current Events Cloud Computing Applications Healthcare Managed Services Provider Mail Merge Digital Payment Legal Virtual Desktop Intranet Experience SharePoint How To Business Growth IT service Staffing Motion Sickness Virtualization Hacker Public Speaking User Unified Communications Trending Firewall Bluetooth Servers Procurement IP Address Data Warehousing 3D Printing Hard Disk Drive Competition Downtime IT Support Social Engineering Customer Service Star Wars Authentication Comparison WiFi G Suite Blockchain Mobile Devices User Error Server Management Efficiency Meetings Productivity Solid State Drive Techology Spam Managed Service Bitcoin Data Backup Help Desk Managing Stress Time Management Consulting Settings Phishing Workplace Tips Firefox 5G Facebook Telephone Systems Android Company Culture eWaste Cybersecurity IoT Computing Infrastructure Privacy Web Server Cameras Multi-Factor Security Laptop Smart Technology Administration GPS Collaboration Word Encryption Security Digital Signature Operating System Browser Data storage

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code