Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cloud-Based Security Is Concerning for Small Businesses

Cloud-Based Security Is Concerning for Small Businesses

The cloud is such an important part of today’s business environment that most organizations use it to some extent, even if it’s just for basic storage needs. However, the cloud needs to be properly maintained, starting with the way you secure your cloud services. Take a moment to ask yourself if your cloud--whether it’s hosted on-site or by a provider--is safe and secure.

Continue reading
0 Comments

Tech Term: Encryption

Tech Term: Encryption

Your business’ data is often quite sensitive, which is why the professional world employs cryptology to keep it secure while it’s in transit. In terms of computing systems, this is called encryption. It’s the ideal way to secure important assets when you send or store information.

Continue reading
0 Comments

Tip of the Week: 3 Crucial Pieces of HIPAA Compliance

Tip of the Week: 3 Crucial Pieces of HIPAA Compliance

If your work requires you to store medical data, you should be aware of how important your data security is, as a problem could potentially put your business at risk of closing up shop permanently. Security has to be a priority with so many regulations setting compliance standards that must be followed. How can you balance the effectiveness of your business without undermining its security?

Continue reading
0 Comments

Why ROBOT is a Risk After Nearly 20 Years

Why ROBOT is a Risk After Nearly 20 Years

The Internet is rife with potential threats. Some are situational, but most are deliberate actions made by malicious entities who are trying to obtain any semblance of value from you or your company. Some of these exploits have been around longer than you’d imagine possible. This has been made evident by huge Internet-based companies such as PayPal and Facebook testing positive for a 19-year-old vulnerability that once allowed hackers to decrypt encrypted data.

Continue reading
0 Comments

Here’s Our Rundown on Blockchain Technology

Here’s Our Rundown on Blockchain Technology

As we discuss business technology, we occasionally broach topics that not everyone may be familiar with. Despite the recent media coverage that has been afforded to it, Bitcoin and blockchain technology may be a good example of one such topic. To resolve this, we’ve put together the following primer on this technology and how it will impact data security in the future.

Continue reading
0 Comments

Protecting Your Data Is Easier With A VPN

Protecting Your Data Is Easier With A VPN

Does your business focus enough on security? One of the best solutions that you can consider is a virtual private network, or VPN. By implementing a VPN solution, you can improve the security and privacy on your devices even while out of the office on important business trips or at conferences. What can a VPN do for your business?

Continue reading
0 Comments

Is Your Company’s Data Encrypted? It Should Be

Is Your Company’s Data Encrypted? It Should Be

Data might be the most important aspect of your organization, but how well do you protect it throughout your network? Every organization has data like personally identifiable information and financial credentials stashed away somewhere on the network, so security isn’t something that you can ignore. One of the best ways you can safeguard your data is through the use of encryption.

Continue reading
0 Comments

Why You Should Encrypt ALL of Your Data, Not Just Your Customers’

b2ap3_thumbnail_managing_risk_400.jpgBusinesses today are responsible for keeping the data in their care safe from hackers. There are two kinds of data that a business must protect: the information of their customers, and their own data (eg. company policies and employee information). Which of the two do you think the average business does a better job of protecting?

Continue reading
0 Comments

1 Million Websites Not Using the Latest Security Protocol Soon to Be at Risk

b2ap3_thumbnail_encryption_sha1_400.jpgIt’s natural to replace older technologies with better, more recent models. However, the future isn’t looking too bright for the world’s most common website encryption method, SHA1, which will soon be replaced by a more secure protocol. Pretty soon, browsers and devices may have some difficulty reading the latest security certificates, which could cause quite a problem if it’s not remedied.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Managed IT services Cyberattacks Save Money Computing Cybercrime PowerPoint Outsourced IT eWaste Human Error VPN Identities Dark Web Smart Tech Digital Automobile Proactive Humor Managing Stress Unified Communications Motion Sickness Supercomputer Unsupported Software Technology Sports Training Tech Terms Managed IT Service Laptop Trending Experience Word Security Consultation Break Fix Downtime Files Star Wars Virtual Desktop E-Commerce Storage SaaS IT Consultant Mobility Staffing Hotspot IT Management Email Social Networking Data loss Cybersecurity Asset Tracking Money Disaster Resistance Website Computers Virus Language Customer Service Data Recovery Networking Smartphone Mobile Data Backup CCTV Mobile Office Computer Domains BYOD User Encryption Remote Worker Co-managed IT Error Customer Relationship Management Unified Threat Management Bookmarks How To Bring Your Own Device Best Practices Recycling communications Cryptocurrency LiFi Conferencing Point of Sale Hacker Electronic Medical Records Mobile Computing Presentation Cache Business Continuity Bluetooth Technology Laws Spam Business Growth Backup and Disaster Recovery Fraud Operating System 3D Printing Geography Employer-Employee Relationship Alt Codes Development YouTube Crowdsourcing Current Events Wireless Environment Electronic Health Records BDR Techology Google Maps Documents Websites Users Display Solid State Drive Fleet Tracking Instant Messaging Time Management 5G Cloud Computing Search Proactive IT Hackers Chromebook Gmail Business Computing Workplace Tips Consulting Phone System Undo IT Technicians Privacy Tip of the Week Virtual Reality Managed IT Services Nanotechnology Network Security Office 365 Hard Drives Outlook Computer Repair Lenovo Managed Services Provider IT solutions How To Software Wires Lithium-ion Battery Hard Drive Document Management Cleaning Telephone Systems Communication Google Docs WannaCry Two-factor Authentication Downloads IP Address Data Management Monitoring User Tips G Suite Unified Threat Management Internet of Things Blockchain Information Applications Tech Term Hardware Bandwidth Telephony Tablet Digital Payment Network Legislation OneNote Troubleshooting Relocation Server Management Hiring/Firing Windows 10 Authorization Gadgets Hosted Solution Chatbots Digital Signature Botnet Internet Exlporer High-Speed Internet Address Innovation Comparison Ransomware Avoiding Downtime Employee-Employer Relationship Microsoft Excel Help Desk Google Drive Dark Data Sync Collaboration Shortcut Augmented Reality Theft Software Tips Cyber Monday Android Mobile Devices Running Cable Gadget Uninterrupted Power Supply Bitcoin Retail Spyware VoIP Windows Google Paperless Office RMM Settings Network Management USB Deep Learning App Network Congestion Health Emoji IT Support Twitter Phishing Firefox Router IT Consulting Programming PDF Enterprise Resource Planning Personal Information Writing Distributed Denial of Service Alerts Processors Knowledge Migration Risk Management Hosted Solutions Business Technology IoT Analytics Authentication Mouse File Sharing SharePoint Maintenance Information Technology Malware IBM IT Services IT Budget Assessment Employees Meetings Remote Computing Wi-Fi The Internet of Things Statistics MSP Company Culture Enterprise Content Management Recovery Apps ROI Procurement Virtual Private Network End of Support WPA3 GPS Tip of the week Internet Analyitcs History Social Media Law Enforcement Application Net Neutrality Test Productivity Patch Management Black Friday Update Operations Features Printing Social Engineering Buisness Machine Learning Computer Care Holiday Printer Cables Microsoft Utility Computing Mobile Device Managment Cost Management Finance Saving Money Scam Taxes Quick Tips Mirgation Web Server Government Firewall Going Green Hard Disk Drive Notifications Corporate Profile Modem Infrastructure Competition Wireless Technology Cloud Identity Theft Superfish Redundancy Heating/Cooling Windows 10 Fun Disaster Recovery VoIP Work/Life Balance Alert Politics Server Vendor Management Social Financial Specifications Access Control Passwords Legal Best Practice Refrigeration Read Only Data Backup Google Wallet Samsung Management Permission Project Management Intranet Software as a Service Vulnerability Multi-Factor Security Backups Tracking Travel Big Data Hacking Disaster IT service Motherboard Staff Scary Stories Managed Service Technology Tips Remote Monitoring and Management Private Cloud Windows 8 Wearable Technology Tech Support Healthcare Licensing Marketing HIPAA Office Tips Smart Technology Artificial Intelligence CIO Cookies Managed Service Provider Browser Data storage Business Owner Public Cloud Public Speaking Budget Data Breach Hacks Data Servers Office Cooperation Remote Workers Monitors Business Intelligence Screen Reader Compliance Managed IT Flexibility Saving Time Drones Touchscreen Smartphones Remote Monitoring Administration Mobile Security Business Upgrade Favorites Efficiency Upgrades Consumers Typing Chrome Mobile Device Connectivity Automation Antivirus Google Calendar Microsoft Office Mobile Device Management Save Time Zero-Day Threat Mobile Facebook Piracy IT Support Physical Security User Error Data Warehousing Entrepreneur Safety Content Filtering Administrator Small Business Webcam Identity Permissions Mail Merge Cameras Regulations Password Computing Infrastructure Security Cameras iPhone Halloween Productivity Miscellaneous Robot Business Management Virtualization Data Security Cortana WiFi Black Market Cabling Apple Education Vulnerabilities

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code