Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Prioritize the Protection of Your Google Account

Prioritize the Protection of Your Google Account

Chances are you have a Google account, whether it’s for business or personal use. It’s more accessible today than ever before and provides a solid way to gain access to several important features and accounts. Considering how much can be done with a Google account, users forget that they can put their security and personal data at risk. Here are some ways that your Google account is at risk, as well as what you can do to fix it.

Continue reading
0 Comments

Clearing Up Some Chromebook Confusion

Clearing Up Some Chromebook Confusion

Chromebooks might be simple, but they aren’t as limited as you might think they are. They might have once been limited, but more recent models are much more capable of accomplishing just as much, if not more, than any of their previous iterations. Here are some of the most common misconceptions that people have about Chromebooks.

Continue reading
0 Comments

The G Suite Just Got Smarter

The G Suite Just Got Smarter

With the recent overhaul of Google’s G Suite productivity software products comes a new way to keep your business’ data secure. We’ll go over some of the major changes introduced in the updates, including the integration of artificial intelligence.

Continue reading
0 Comments

Tip of the Week: Managing Gmail with Labels and Filters

Tip of the Week: Managing Gmail with Labels and Filters

Gmail is a great way to take advantage of business email, but do you know all of the ins and outs of how to use some of its finer details? Today’s tip is dedicated to going over some of the more useful features of Gmail, like filters and labels--both of which will be helpful in controlling your inbox.

Continue reading
0 Comments

Google Will No Longer Display Results As You Type--Here’s Why

Google Will No Longer Display Results As You Type--Here’s Why

If you hadn’t yet noticed, there’s been a change made to the Google search engine that will influence how search results are presented to users. Google’s ‘Instant’ feature, introduced in 2010, is no more.

Continue reading
0 Comments

What's It Mean When Online Traffic is Concentrated to a Handful of Apps?

What's It Mean When Online Traffic is Concentrated to a Handful of Apps?

The Internet is always changing, and anyone who has been using it for a while has experienced this change for themselves. While it might be strange to think about, the latest statistics have proven that the current changes to the Internet are some of the most significant--especially for businesses. “Online business as usual” will be significantly different moving forward.

Recent Comments
Stain Philpson
According to my view for your article is truly helpful for each read who like and keep looking for informative subjects. Frequentl... Read More
Saturday, 23 September 2017 19:12
Robert Max
Mobile apps are omnipresent, not bounded to any particular aspects of life. I am very exhilarated that you have yielded an interes... Read More
Tuesday, 21 November 2017 10:11
Continue reading
2 Comments

Alert: Was Your Device One of Over a Million Breached By New Android Malware?

Alert: Was Your Device One of Over a Million Breached By New Android Malware?

The branch of malware known as Ghost Push now has a new component, Gooligan, and it certainly lives up to its name. Google was struck by an attack that infected over one million Android users, with over 13,000 additional devices adding to that total on a daily basis.

Continue reading
0 Comments

Google Throws Down the Gauntlet for Hackers to Breach Their New Phone

Google Throws Down the Gauntlet for Hackers to Breach Their New Phone

There are many ways to fund a project, but one of the more interesting ways to do so in today’s web-centric culture is through crowdfunding. It’s been so effective that even major companies like Google are using it to their advantage. Google’s latest project encourages users to hack into the Nexus line of mobile devices to collect potential vulnerabilities, with the promise of prizes for those who are successful.

Continue reading
0 Comments

Tip of the Week: Download All of Your Google Account’s Content in One Fell Swoop

Tip of the Week: Download All of Your Google Account’s Content in One Fell Swoop

An active Google user will inevitably accumulate a stockpile of photos and videos via their account’s Google Photos app. For this week’s tip, we’ll show you how to download all of this media to a local device.

Continue reading
0 Comments

This Move By Google Spells Doom for Adobe Flash

This Move By Google Spells Doom for Adobe Flash

In light of a recent zero-day vulnerability discovered with Adobe Flash, along with the wide adoption of the alternative rich media player HTML5, Google has put into motion plans to stop supporting Flash for its popular web browser, Google Chrome. By all accounts, this move may be the final nail in the coffin for the Internet stalwart, which means that your business should cease using it.

Continue reading
0 Comments

Tip of the Week: Google Docs Now Lets You Type With Your Voice, Here’s How to Use It!

b2ap3_thumbnail_docs_from_google_400.jpgVoice-related technology is hardly news for Google. Android smartphones have had voice capabilities for a long time now. Google Now, the function's official name, can be used for Internet searches, setting alarms, adding calendar entries, activating entertainment like movies and music, calling or texting friends, and countless other functions. Now, however, you can literally write entire documents by using your voice in Google Docs.

Continue reading
0 Comments

Tip of the Week: How to Lock and Unlock Your Google Wallet Card

b2ap3_thumbnail_google_wallet_400.jpgGoogle might be best known for its search engine and groups of desktop apps, but it’s also known for innovating and rattling the cages of how we live our lives. One of the ways it’s doing so is with Google Wallet, an app that’s designed to make sharing cash and money transfers online even easier. What a lot of people forget, however, is that Google Wallet, and its associated card, can still be the target of fraud.

Continue reading
0 Comments

Sorry, Windows XP Users: No More Google Chrome Updates for You

b2ap3_thumbnail_chrome_support_ending_400.jpgIt’s been quite some time since Microsoft cut the cord on Windows XP support, rendering it insecure and incredibly risky to run in a professional setting. This was quite a blow to both PC users and business professionals, but it’s about to get even worse for the antiquated operating system. Now, even Google is cutting support for their web browser, Google Chrome, for older operating systems from both Microsoft and Apple.

Continue reading
0 Comments

Tip of the Week: View Your Current Google Sessions for Optimal Security

b2ap3_thumbnail_google_sessions_400.jpgLogging into an account only to find out that you’ve been hacked can be a real hassle. If you’re wondering why and how this could have happened, you’re in luck; some accounts, like Google, record when and how the account is accessed, and finding out how is as easy as checking out your security settings. Here’s how you can see who is accessing your account, and how.

Continue reading
0 Comments

Tip of the Week: How to Search the Web Without Typing

b2ap3_thumbnail_drag_to_search_and_others_400.jpgHow fast are you at finding the information you need using Google Search? In today’s data-driven world, knowing how to effectively use Google is actually a marketable skill. Did you know that there are ways in Google Chrome to search for what you need that take less time than typing your query in the search bar?

Continue reading
0 Comments

5 Nifty Google Easter Eggs You Might Not Realize Exist

b2ap3_thumbnail_chome_easter_eggs_400.jpgGoogle is the world’s most popular search engine, and it’s grown so outrageously popular that there’s even a verb named after it; “to google” is to search for something on the Internet using Google. However, to this day, Google continues to surprise the public with fun Easter eggs, hidden functions which provide a level of entertainment to the user.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Programming Error Network Congestion Intranet Running Cable Files VoIP Wearable Technology OneNote Backup Employee-Employer Relationship Apple Microsoft Firewall Corporate Profile Hard Drive IT service Finance USB Alt Codes Cyberattacks 5G Data loss Storage Mobile Device Management Permission Hiring/Firing Data Security Modem History Assessment IT solutions Retail Remote Workers Mail Merge Healthcare Gmail VoIP Training The Internet of Things End of Support Sports Downtime Techology Cortana Virtualization Maintenance Financial Search VPN Hotspot App Internet Exlporer Internet of Things BYOD Consumers Tip of the Week Ransomware Digital Signature Tablet Outsourced IT Social Media Network Management Break Fix BDR Avoiding Downtime Presentation Proactive IT Consulting IoT Scary Stories Web Server Artificial Intelligence Mobile Automobile Meetings Fraud Mouse Language Staff Dark Web Privacy Fun Screen Reader Saving Money Hosted Solutions YouTube Passwords Dark Data Augmented Reality Saving Time Hackers Piracy Administration Websites Smart Technology Browser Legislation Identity Theft Google Google Wallet User Project Management Deep Learning Procurement Tracking Backups Asset Tracking Competition Holiday Cybersecurity RMM Monitoring Disaster Recovery Computer Care Email Instant Messaging Migration Mobile Computing Information Technology 3D Printing Business Growth Managed IT services Scam Computers Social Networking Superfish Management Social Software Tips Company Culture Facebook Typing Law Enforcement MSP Internet Gadgets Co-managed IT Data Wires Botnet Hard Drives Utility Computing Public Speaking Cabling Features Business Management Lenovo Cables Electronic Medical Records Disaster Resistance Wireless Star Wars Quick Tips Geography Data Management Business Owner LiFi Information Help Desk Computer Repair Cleaning Recovery WannaCry Unified Threat Management Small Business Cooperation Collaboration Bring Your Own Device How To Virtual Private Network Bluetooth G Suite Mobile Device Address Phishing Digital Payment Compliance Malware Remote Monitoring and Management Productivity Uninterrupted Power Supply Cloud Smartphone Buisness Troubleshooting Smartphones eWaste Licensing Best Practices Undo Emoji IT Support Environment Refrigeration Alert Recycling SharePoint Managed Service Provider Nanotechnology Patch Management Virtual Reality Hacker Shortcut Consulting Cyber Monday Sync Statistics Word Touchscreen Efficiency Computing Managed Services Provider Customer Relationship Management Backup and Disaster Recovery Staffing Vulnerability Save Money IT Support Taxes GPS Chrome Servers Hosted Solution Risk Management Business Technology Website IT Management Google Docs Managed IT Unified Threat Management Outlook Employer-Employee Relationship Analyitcs Content Filtering Supercomputer Display Test Server Management Firefox Unsupported Software Work/Life Balance Mobile Device Managment Unified Communications Managing Stress Drones Server Fleet Tracking Apps Alerts CCTV Remote Computing Connectivity Technology Laws Software ROI Time Management Black Friday Cloud Computing IT Budget Telephony Telephone Systems Read Only Software as a Service Google Drive Microsoft Office Enterprise Content Management Writing Windows 10 Workplace Tips Business Development Specifications Upgrade SaaS Administrator Domains Wireless Technology Access Control Tech Terms Technology Tips Technology Gadget Operating System Network Security Trending Best Practice Router Network Personal Information Computing Infrastructure Bookmarks Documents Google Calendar Productivity Cache Hardware Twitter Tech Term Physical Security Vendor Management Cost Management Data Breach Digital Networking Computer Miscellaneous Smart Tech Point of Sale Virus Legal Hacking Hacks Antivirus Mobile Security Settings Solid State Drive PowerPoint Tip of the week Notifications Business Computing Data Recovery Electronic Health Records Relocation Social Engineering IT Consultant Mirgation Document Management Infrastructure Password Upgrades Education Motherboard Multi-Factor Security Printer Current Events Managed IT Service Going Green Users Big Data Favorites Spam Mobility Budget Identities Update Human Error Experience PDF Windows 10 Microsoft Excel Vulnerabilities Halloween IP Address Politics Safety Data Backup WiFi Net Neutrality Security File Sharing Hard Disk Drive Data Warehousing How To Printing Office 365 Google Maps Office Monitors Blockchain Disaster Application Laptop Mobile Office Robot Chatbots Business Continuity E-Commerce Remote Worker Authorization IT Services Customer Service Health Redundancy Humor Government Cookies Communication Permissions Downloads Wi-Fi IT Technicians Regulations Heating/Cooling Samsung Automation Cryptocurrency Machine Learning Identity Innovation Windows 8 Spyware Windows Cameras Travel User Error Comparison Applications WPA3 Mobile Data Lithium-ion Battery Data storage Bitcoin Paperless Office Authentication Marketing Private Cloud Office Tips Security Cameras Entrepreneur Analytics Conferencing Managed Service Managed IT Services Zero-Day Threat Android Webcam Chromebook CIO Black Market Consultation Distributed Denial of Service communications Public Cloud Mobile Devices Cybercrime Theft User Tips High-Speed Internet Flexibility Enterprise Resource Planning Tech Support Knowledge Bandwidth Operations Phone System Business Intelligence IBM Motion Sickness Encryption Save Time Remote Monitoring Crowdsourcing Money Employees Two-factor Authentication Virtual Desktop Proactive IT Processors iPhone HIPAA

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code