Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Developers Are Building Blockchain-Based App for Health Records

Developers Are Building Blockchain-Based App for Health Records

Many industries depend on their IT working properly to function as intended, and healthcare is among them. Prior to 2009, information technology had failed to take root, but with the passing of the Health Information Technology for Economic and Clinical Health Act (HITECH Act), the health industry is much more involved and reliant on IT than it has ever been before.

Continue reading
0 Comments

100 Million Compromised Medical Records Shakes Patient Confidence

100 Million Compromised Medical Records Shakes Patient Confidence

Online threats against healthcare organizations are currently one of the biggest cybersecurity issues. A reported 100-million-plus total medical records have been compromised, according to IBM’s 2016 Cyber Security Intelligence Index. How could a hacker profit off of accessing someone’s medical records? Simply put: ransomware.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Backup Bring Your Own Device Managed IT Web Server Collaboration IT service Mobile Devices Data storage Facebook IT Consulting History Zero-Day Threat Mobility Google Automation Corporate Profile Communication Small Business App Encryption Paperless Office Downtime Big Data Help Desk Backups Network Congestion Digital Signature Customer Relationship Management Smart Tech Computer Repair Efficiency Wireless Technology Technology Laws Settings LiFi Voice over Internet Protocol Operations Security Notifications Samsung 3D Printing Risk Management Best Practices Solid State Drive Social Productivity Assessment Bookmarks Servers Cyberattacks Bitcoin Instant Messaging Vulnerability Lenovo Computer Asset Tracking Cameras Bandwidth Regulations Data Management Superfish Tablet Cryptocurrency Administrator Phone System Time Management Professional Services Typing Blockchain User Error Read Only Bluetooth Search IBM Presentation Database Budget Mail Merge Storage Save Money Managed Service Network User Tips Licensing Server Management Hacker Connectivity Technology Tips Holiday Business Intelligence Sports Wasting Time Best Practice Processors Outlook Buisness Permissions Point of Sale Virtualization Hacking How To IT Management User Hardware Disaster Resistance Humor Proactive IT Mobile Device Network Management Augmented Reality Co-managed IT Website IT Budget Software Tips Data IP Address Upgrades PDF Supercomputer IT Services Procurement Comparison Mobile Security Writing Cabling Geography Enterprise Content Management Break Fix Finance Smart Technology Server USB Virtual Private Network G Suite Networking Gadget File Sharing How To Data Security Microsoft Office Business Owner Employer-Employee Relationship Spyware Computing Alert Electronic Medical Records Google Wallet GPS Fun The Internet of Things Computing Infrastructure Application Cybercrime Modem Techology Cookies Windows BDR Motherboard Digital Net Neutrality Google Docs Theft Hackers Running Cable Business Continuity Public Speaking Hard Drives Customer Service Tip of the Week Windows 7 Programming Relocation Business Growth Identities Consultation Innovation Patch Management Managed Service Provider Vulnerabilities Address Remote Workers 5G Screen Reader Software as a Service Telephone Systems Health Distributed Denial of Service Social Engineering Gadgets Motion Sickness Printing Conferencing Unsupported Software Managed IT Service Miscellaneous Wireless Halloween Malware iPhone Tech Term Apple Crowdsourcing Wearable Technology Display Remote Monitoring Antivirus Microsoft Windows 8 End of Support Money Backup and Disaster Recovery SaaS Internet Exlporer Identity Deep Learning Disaster Compliance Upgrade Monitoring eWaste Cybersecurity Phishing Remote Computing Robot Alerts Managed IT Services Private Cloud Language Wi-Fi Domains Migration Undo SharePoint Analyitcs Microsoft Excel Knowledge Fraud Office Tips BYOD Staff Proactive Office Cortana Data loss Data Breach Avoiding Downtime Dark Data Browser Uninterrupted Power Supply Education Monitors Meetings Star Wars Features Politics Disaster Recovery Cache Cooperation Access Control Infrastructure Lithium-ion Battery Intranet Content Filtering Utility Computing Favorites Outsourced IT Authentication WiFi Virtual Reality Cloud Tech Terms Electronic Health Records Travel IT Support Financial Data Recovery Refrigeration PowerPoint Document Management Automobile Training Redundancy Internet of Things Virus Notes Retail Smartphone Applications Maintenance Business Management Public Cloud Tech Support Android Documents Sync Hard Drive Information Technology Word Employees Healthcare Managing Stress Mobile Computing Work/Life Balance Scary Stories E-Commerce Drones Users Google Drive Managed IT services Router Digital Payment IoT Unified Communications Human Error Company Culture Black Market Printer Mobile Law Enforcement Artificial Intelligence Productivity Alt Codes Cost Management Consumers Physical Security Hosted Solution Quick Tips Hosted Solutions Tracking Machine Learning Staffing Mobile Data Mirgation Administration Google Calendar Remote Monitoring and Management Authorization Windows 10 Security Cameras Business Technology Data Warehousing IT Support Business Computing Social Networking Hotspot Chromebook Mouse Flexibility Error Computers Entrepreneur Apps VoIP Hacks Firewall HIPAA Nanotechnology Environment Windows 10 Dark Web Competition Chrome Cleaning Cloud Computing Touchscreen Specifications OneNote Files Office 365 Update Going Green Development Permission Government Network Security Smartphones Wires communications Business Management Spam Project Management Technology IT Consultant Analytics Saving Money Heating/Cooling Unified Threat Management VPN Enterprise Resource Planning Identity Theft Marketing Botnet Fleet Tracking Personal Information Tip of the week Hiring/Firing Twitter Google Maps Consulting RMM Data Backup Black Friday Ransomware Legal MSP Webcam Software Internet VoIP Virtual Assistant Mobile Device Managment Social Media CIO WannaCry Passwords Firefox Managed Services Provider Computer Care CCTV Gmail Chatbots Email Unified Threat Management Two-factor Authentication Saving Time Information Downloads WPA3 Cyber Monday Cables Test Safety Taxes Remote Worker Virtual Desktop Legislation Trending Scam Password YouTube Current Events Telephony Emoji Shortcut Troubleshooting Statistics Workplace Tips Employee-Employer Relationship Piracy Hard Disk Drive ROI Save Time Vendor Management High-Speed Internet Multi-Factor Security Recycling IT solutions Mobile Device Management Operating System Websites Privacy Mobile Office IT Technicians Experience Laptop Recovery

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code