Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is Your Security Prepared to Stop a DDoS Attack?

Is Your Security Prepared to Stop a DDoS Attack?

If your business were to be struck by a Distributed Denial of Services (DDoS) attack, would it be able to recover in a timely manner? Do you have measures put into place to keep them from hampering your operations? While most organizations claim to have sufficient protection against these dangerous attacks, over half of them have simply proven to be ineffective against DDoS.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Permissions Storage Help Desk Disaster Recovery Cooperation Favorites Scam Government Computing Infrastructure BYOD USB Infrastructure Spam Virtual Desktop Data Breach Development Social Firewall Miscellaneous Running Cable Virtual Private Network Alert Smart Technology Staffing Superfish Voice over Internet Protocol Migration Search Machine Learning iPhone Politics Antivirus Electronic Health Records Networking Data Backup Data Recovery Business Computer Windows 10 Business Intelligence Procurement Mobile Device Managment IT Services Mobility IT Budget Employee-Employer Relationship Mobile Computing OneNote Managed Service Provider Documents Phishing Remote Monitoring and Management Physical Security Humor Assessment Enterprise Resource Planning Cookies Downtime Motherboard Recovery Risk Management Network Congestion Cyberattacks Downloads Drones Email Browser Data Gadget Big Data Company Culture Consultation Fleet Tracking Bitcoin Content Filtering Solid State Drive Unsupported Software Gadgets Virtual Assistant Cabling Environment Tip of the week Google Docs Mobile Device Document Management Cryptocurrency Automation Point of Sale Spyware Fun Mobile Data Hiring/Firing Security Cameras Privacy GPS ROI Small Business Password Web Server Professional Services Office Unified Threat Management Innovation 5G Word Access Control Techology Wasting Time Undo Heating/Cooling Conferencing Computers Internet of Things Botnet Website Applications Computer Repair Taxes Bluetooth IT Technicians Remote Worker Mobile Project Management Software as a Service Features Address Facebook Sync Utility Computing Cybersecurity IT service Black Market Mobile Security Wires Backup and Disaster Recovery Healthcare IT solutions LiFi Paperless Office Outlook Piracy Microsoft Excel User Employer-Employee Relationship Cloud Software Tips Bring Your Own Device Presentation Monitors Hosted Solution Hosted Solutions Virtual Reality Error Business Growth Legislation Remote Monitoring Network Licensing Data Management Mobile Devices Microsoft Office File Sharing Business Technology Managed IT Processors Bandwidth Law Enforcement Work/Life Balance Server Display RMM Financial Cache Consumers Shortcut Digital Signature Google Wallet SaaS YouTube Users Quick Tips Current Events Instant Messaging Managing Stress IT Management Printing Social Networking Server Management Customer Service Windows 10 Google Calendar PowerPoint Maintenance How To Knowledge Net Neutrality Office 365 Router Websites Unified Threat Management Smart Tech Public Cloud Bookmarks Wireless Tech Support Digital Budget Geography Internet Office Tips Windows Backup Artificial Intelligence Vendor Management VoIP IP Address Managed IT Services Typing Troubleshooting Training Managed Service Software Augmented Reality Internet Exlporer Employees Microsoft Monitoring Chromebook Upgrade Marketing Update Hardware Going Green Recycling Screen Reader Dark Data Test Hackers Files Supercomputer Webcam Staff Apps Blockchain Best Practices Smartphones Writing Managed IT Service Administration Backups Lithium-ion Battery Computing Modem Patch Management Business Computing Break Fix Cortana Legal Passwords Productivity Cleaning Business Owner User Tips eWaste IoT Competition Managed Services Provider Technology Alt Codes Network Management IT Consultant Mail Merge Technology Tips Multi-Factor Security Proactive IT Customer Relationship Management Operating System Efficiency Disaster IT Support How To Lenovo Relocation Wi-Fi Google Maps IT Support Corporate Profile Windows 8 Data Security WannaCry 3D Printing Notes Security Cameras Authentication Co-managed IT Managed IT services Tech Terms Compliance Finance SharePoint Black Friday Best Practice Tablet Notifications Telephony Hard Drive Consulting Saving Time Productivity Chatbots WPA3 Personal Information Cybercrime Automobile VoIP CCTV Android Crowdsourcing Intranet Education Mouse Virtualization E-Commerce Communication WiFi MSP Samsung Connectivity Halloween Specifications Money Domains Wearable Technology Social Media Virus Cloud Computing Proactive High-Speed Internet Data loss Business Continuity Tip of the Week Administrator Touchscreen Network Security Experience BDR VPN Safety Holiday Disaster Resistance Printer Upgrades Database Deep Learning Hacker The Internet of Things Computer Care Dark Web Fraud Data Warehousing CIO Chrome Collaboration Identity Theft Nanotechnology Workplace Tips Statistics Read Only Enterprise Content Management Mobile Device Management Vulnerability IT Consulting Mirgation Comparison Flexibility Time Management Encryption Entrepreneur Retail Digital Payment Social Engineering Public Speaking Analytics Uninterrupted Power Supply Saving Money Avoiding Downtime Scary Stories Cost Management Authorization communications Alerts Data storage Twitter Google Malware Hard Disk Drive Sports Remote Workers Tracking Analyitcs Telephone Systems Operations Vulnerabilities Language Robot Business Management Save Time IBM History Buisness Wireless Technology Remote Computing Zero-Day Threat Theft Windows 7 Cables Private Cloud Travel Asset Tracking Permission Hotspot Motion Sickness Apple Tech Term Phone System End of Support Electronic Medical Records Technology Laws Smartphone Ransomware Information Technology Human Error HIPAA App Save Money Cyber Monday Servers Emoji Health Application User Error Management Hacking Refrigeration G Suite Settings Outsourced IT Identity PDF Star Wars Regulations Programming Two-factor Authentication Mobile Office Firefox Identities Laptop Hard Drives Google Drive Meetings Trending Gmail Redundancy Hacks Distributed Denial of Service Unified Communications Information

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...