Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Developers Are Building Blockchain-Based App for Health Records

Developers Are Building Blockchain-Based App for Health Records

Many industries depend on their IT working properly to function as intended, and healthcare is among them. Prior to 2009, information technology had failed to take root, but with the passing of the Health Information Technology for Economic and Clinical Health Act (HITECH Act), the health industry is much more involved and reliant on IT than it has ever been before.

Continue reading
0 Comments

100 Million Compromised Medical Records Shakes Patient Confidence

100 Million Compromised Medical Records Shakes Patient Confidence

Online threats against healthcare organizations are currently one of the biggest cybersecurity issues. A reported 100-million-plus total medical records have been compromised, according to IBM’s 2016 Cyber Security Intelligence Index. How could a hacker profit off of accessing someone’s medical records? Simply put: ransomware.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Enterprise Resource Planning Content Filtering Supercomputer Digital IP Address Knowledge How To Social Media Outsourced IT Domains Permission Marketing Remote Worker Business Growth SaaS Saving Money Tech Support Cyber Monday Hotspot Electronic Medical Records Cortana Intranet End of Support Network Management Social Managed IT Service Settings Information Technology Time Management Monitoring Wireless Technology Monitors Display Hard Drive Sports Augmented Reality Business Technology Disaster Lenovo Security Cybersecurity Google Vulnerabilities Virtualization Two-factor Authentication Favorites Microsoft Excel Internet Exlporer Compliance Analytics Application Remote Workers Distributed Denial of Service Phone System Data Recovery Travel User Tips Chatbots Software Firefox Windows Screen Reader Tip of the week Servers Network Migration Automobile Techology Cyberattacks WPA3 Managing Stress Users File Sharing Sync Enterprise Content Management Outlook Piracy Word Instant Messaging Save Money IBM Refrigeration Private Cloud Environment Hardware Features Asset Tracking OneNote Computing Windows 10 Buisness Apple Drones Identities PDF Small Business Android Education Email Avoiding Downtime GPS Nanotechnology Human Error Consumers LiFi Legal Microsoft Office Touchscreen Microsoft Managed Service Provider HIPAA Disaster Resistance Risk Management Internet of Things Analyitcs Zero-Day Threat Saving Time Google Wallet Financial Mobile Computing Processors Crowdsourcing Utility Computing Wi-Fi Spam USB Smartphone Data Staff Recovery Unified Communications Multi-Factor Security Firewall Technology Laws VoIP Read Only Backup Mobile Device Management Paperless Office Finance Specifications Laptop Employee-Employer Relationship Privacy Entrepreneur iPhone Cybercrime Proactive IT Search Infrastructure Workplace Tips Patch Management CIO Computer Repair Bitcoin Scary Stories IT Services Mobile Data Networking Recycling Information ROI Point of Sale Gadgets Legislation Cloud Dark Web Assessment PowerPoint Public Speaking Apps Help Desk Twitter Windows 8 Dark Data Hacks Technology Tips Consulting Hackers IT Budget Documents MSP Data Backup Bluetooth Modem Training Fleet Tracking Wireless IT solutions Update Spyware Printer Managed Service Data Security Websites Data storage Productivity Best Practices Cameras Vulnerability Procurement communications Mobile Device Managment Tip of the Week Printing Cache How To Vendor Management Facebook Motherboard Telephone Systems Remote Monitoring Physical Security Password Government Mobile Mobile Security Business Virtual Desktop Fraud Backups Google Docs Google Calendar Operations VPN YouTube Phishing Customer Relationship Management Storage User Error IoT Troubleshooting Digital Signature Connectivity Lithium-ion Battery IT service Website Cables Telephony 5G Project Management Authorization Network Congestion Mobile Office Robot Theft Tech Term Business Owner Remote Computing Network Security Licensing Break Fix Tracking Hard Drives Smart Technology Alert Efficiency Digital Payment Downtime Writing Authentication Machine Learning Hacker Big Data Presentation 3D Printing Mail Merge Staffing Innovation Cryptocurrency Electronic Health Records Alerts Statistics Cloud Computing Computer Care Google Drive Wires Mobile Devices Technology Software as a Service Managed IT services IT Support Address Quick Tips Healthcare Office 365 Save Time Humor Best Practice Flexibility Unified Threat Management Access Control Malware Politics Files Relocation Botnet Security Cameras Google Maps BDR Meetings Smartphones Undo Computer Business Continuity Virus Web Server App WannaCry Shortcut Artificial Intelligence Regulations Unsupported Software Going Green Cost Management Gadget Mobility Wearable Technology Law Enforcement Tablet Motion Sickness Cabling Disaster Recovery Upgrades Identity Theft Customer Service Administrator Router VoIP Programming The Internet of Things IT Consulting Productivity Money IT Management Cleaning Competition G Suite Personal Information Running Cable Computers Superfish Comparison Samsung Remote Monitoring and Management Corporate Profile Server Computing Infrastructure Business Computing Development Taxes Collaboration Language Current Events Scam IT Support Employees eWaste Holiday Internet Uninterrupted Power Supply Consultation Gmail Encryption Cooperation Virtual Private Network Backup and Disaster Recovery Data Management Hacking Upgrade Social Networking Geography Hard Disk Drive Fun Data Warehousing Permissions Halloween Error Employer-Employee Relationship Software Tips CCTV Downloads Cookies Blockchain Miscellaneous Social Engineering Communication Data Breach Smart Tech WiFi Tech Terms Chromebook Windows 10 Redundancy Chrome Safety Bandwidth Deep Learning Heating/Cooling Solid State Drive Identity Emoji Unified Threat Management Health Browser Black Friday Hiring/Firing Typing BYOD Retail Hosted Solutions Managed IT Services Bookmarks Ransomware Data loss History Business Intelligence E-Commerce Mirgation Co-managed IT Business Management Bring Your Own Device Mobile Device Virtual Reality Antivirus Company Culture Passwords RMM Black Market Proactive Budget Administration Server Management Net Neutrality Alt Codes Office Trending Document Management Star Wars Experience Mouse High-Speed Internet Managed Services Provider Managed IT Office Tips User Management Maintenance Public Cloud Test Applications SharePoint Notifications Webcam Hosted Solution Conferencing IT Technicians IT Consultant Work/Life Balance Automation Operating System

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code