Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is Election Technology Solid or Simply Antiquated

Is Election Technology Solid or Simply Antiquated

Election Day in the United States is coming up quick on November 6th. It doesn’t matter what your thoughts or opinions on U.S. politics are--the fact remains that millions of Americans will be using the technology available at polling places to cast their ballots, and if this technology isn’t secured properly, the integrity of the voting system will be at risk.

Continue reading
0 Comments

Why Businesses and Government Approach Technology Very Differently

Why Businesses and Government Approach Technology Very Differently

When security and efficiency are some of the biggest benefits to updated information technology, it sounds that IT is something that a governing body should prioritize internally. However, many governments have trouble doing so, oftentimes to their own detriment. Why is that, and what can a business learn from this phenomenon?

Continue reading
0 Comments

How Technology Allows Fake News to Spread

How Technology Allows Fake News to Spread

In today’s political, social, and economic environment, information is more valuable than ever. However, this increased importance, paired with the speed that data can be dispersed via the Internet, has enabled many to use false information to manipulate the general public into agreeing with their views and acting upon them.

Continue reading
0 Comments

House of Representatives Makes Moves to Support Small Business

House of Representatives Makes Moves to Support Small Business

Without competition, there would not be businesses. However, this competition needs to be fair in order for small businesses to embrace new opportunities that arise. A U.S. bill that allows for both of these goals has passed in the House of Representatives and will be voted on in the Senate.

Continue reading
0 Comments

Shhhh! Library of Congress Hacked

Shhhh! Library of Congress Hacked

Not since the British burned the Library of Congress to the ground in the War of 1812 has there been a more devastating attack on the famous library. Only this time, the recent attack was of the digital variety and King George III had nothing to do with it.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Employees Error Office Deep Learning Networking Tech Term Multi-Factor Security Spyware Augmented Reality Social Media Business Technology Cabling Competition The Internet of Things Cookies Cyber Monday Break Fix Websites Data Management Google Education High-Speed Internet Mobile Device Management Blockchain User Error HIPAA Managed IT services File Sharing Web Server Smart Tech Authentication Language Outlook Internet Exlporer Website Monitoring Employee-Employer Relationship IT solutions Bring Your Own Device IT Technicians Unsupported Software Cloud IT Support Upgrades OneNote Best Practice Black Market Backup and Disaster Recovery Automobile Geography User Remote Monitoring and Management Privacy Browser Network Management Gadget Managed IT Service Utility Computing Bookmarks Cryptocurrency Favorites Theft Business Growth Patch Management Virtual Desktop Scam Law Enforcement Information Gmail Information Technology Safety Managed Services Provider Electronic Health Records GPS Office 365 VoIP Training IT Services App Trending Avoiding Downtime Government Database Virtual Private Network Motherboard Botnet Risk Management Gadgets Public Speaking Hacks Flexibility Security Licensing Backups Applications Hackers Save Money Healthcare Vulnerabilities CCTV Development Webcam Motion Sickness Point of Sale VPN Mobile Alerts Business Owner Google Drive Budget Employer-Employee Relationship Technology Laws Android Data Breach Efficiency Hard Drives IT Support Wearable Technology Social Engineering Data Unified Threat Management Tip of the week Lithium-ion Battery Phishing IT Management Tip of the Week How To Documents Fleet Tracking SaaS Lenovo Servers Hardware Intranet Software Tips Address Voice over Internet Protocol Health Downloads Google Docs RMM Smart Technology Programming WiFi Hosted Solutions Wi-Fi Scary Stories Remote Monitoring History Finance Relocation Data loss Hard Disk Drive Entrepreneur Dark Data Paperless Office Saving Time Private Cloud Small Business Samsung Telephone Systems Hosted Solution Passwords 5G Consumers Taxes Managing Stress Mobile Security Ransomware Professional Services Laptop Company Culture Redundancy Backup Mobile Data G Suite IT Consultant Administration Disaster Firewall Identities Digital Signature Cameras Fraud Crowdsourcing Quick Tips Computer Managed Service Provider Modem Chrome PowerPoint Comparison Experience Environment Mobile Computing Big Data Disaster Recovery Two-factor Authentication CIO Domains Mobile Device eWaste Hacker Social Networking Windows 10 Encryption Remote Worker Automation Tech Terms Communication IT Consulting Project Management Consulting Net Neutrality Zero-Day Threat Fun Undo Unified Threat Management Holiday Files Operating System Politics End of Support Techology Computer Care Legislation Wireless Technology Bandwidth Outsourced IT Humor Identity Smartphone Uninterrupted Power Supply Notes PDF Regulations Best Practices Superfish Processors Unified Communications Sync Business Computing Innovation Apps Cloud Computing USB Alt Codes Personal Information Internet Tech Support Halloween Printing Supercomputer E-Commerce Telephony Content Filtering Digital Data storage Drones Meetings Screen Reader Alert Firefox Network Security BDR Digital Payment Internet of Things Refrigeration Identity Theft Going Green SharePoint Customer Relationship Management LiFi User Tips Office Tips Robot Remote Workers Social Co-managed IT Star Wars Enterprise Resource Planning Cortana Word Bitcoin communications Virus Emoji Travel Staff Windows Collaboration Technology Malware Search Electronic Medical Records Shortcut Management Monitors Users Current Events Software as a Service Windows 8 Troubleshooting Features Enterprise Content Management Hard Drive IoT Settings Typing VoIP Mobile Office Data Backup Marketing Writing Analyitcs Router Managed IT Application Storage Migration Server IT Budget Data Recovery Dark Web Software Public Cloud Customer Service Saving Money Data Warehousing Money Bluetooth Compliance Smartphones Business Conferencing Physical Security Financial iPhone Virtual Assistant Proactive IT Touchscreen Consultation Hacking Mobile Devices Work/Life Balance Permissions Authorization Google Wallet Managed Service Corporate Profile Wireless Artificial Intelligence Permission WPA3 Cables Business Intelligence Vendor Management Update Mirgation Google Maps Miscellaneous Specifications Human Error Data Security Microsoft 3D Printing Email Business Management Chromebook Infrastructure Downtime Upgrade Connectivity Document Management Network Distributed Denial of Service Wires ROI Computing Cybersecurity Disaster Resistance Antivirus Heating/Cooling Maintenance Display Cache Password Legal Mobile Device Managment Cleaning Black Friday Network Congestion IBM Hotspot Presentation Operations IT service Sports Notifications Mobility Chatbots Managed IT Services Productivity Business Continuity Save Time Help Desk Virtualization Cybercrime Nanotechnology Microsoft Office Google Calendar YouTube Statistics Tracking Facebook Analytics WannaCry Administrator Access Control Productivity Retail Remote Computing Windows 10 Knowledge How To Mail Merge Spam Microsoft Excel Read Only Phone System Mouse Cost Management Hiring/Firing Wasting Time Cyberattacks Recovery MSP IP Address Windows 7 BYOD Solid State Drive Procurement Tablet Apple Recycling Security Cameras Computing Infrastructure Time Management Workplace Tips Vulnerability Asset Tracking Instant Messaging Technology Tips Running Cable Assessment Proactive Computer Repair Piracy Computers Virtual Reality Test Printer Cooperation Machine Learning Buisness Staffing Server Management Twitter

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code