Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Use Your Smartphone With the Lights Off and Risk Temporary Blindness

Use Your Smartphone With the Lights Off and Risk Temporary Blindness

You may have heard of digital eye strain. The Vision Council defines it as “the physical discomfort felt after two or more hours in front of a digital screen and is associated with the close to mid-range distance of digital screens.” As annoying as this condition is, in some cases, it has actually developed into something far worse, like temporary blindness.

Continue reading
0 Comments

100 Million Compromised Medical Records Shakes Patient Confidence

100 Million Compromised Medical Records Shakes Patient Confidence

Online threats against healthcare organizations are currently one of the biggest cybersecurity issues. A reported 100-million-plus total medical records have been compromised, according to IBM’s 2016 Cyber Security Intelligence Index. How could a hacker profit off of accessing someone’s medical records? Simply put: ransomware.

Continue reading
0 Comments

Tip of the Week: Try an Ergonomic Workstation Setup

b2ap3_thumbnail_ergonomic_workplace_400.jpgSometimes you feel exhausted when you get out of work, but you have no idea why. It might be because you’re straining your eyes too much by staring at the computer screen. Or, maybe it’s your back that’s killing you, and even moving slightly is a pain. Perhaps it’s carpal tunnel ravaging the nerves in your wrist. If any of this sounds familiar, it’s safe to say that you could use a workstation overhaul.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Cortana RMM Android Office Tips Technology Dark Data Consumers Connectivity Management Enterprise Resource Planning Managed IT LiFi WiFi Windows 10 Healthcare Black Market Encryption Cloud Computing The Internet of Things Password Presentation Nanotechnology Hacker 5G Meetings Current Events Halloween Microsoft Computing Telephone Systems E-Commerce Administration Hacking Specifications Proactive Analyitcs Motion Sickness Phone System Windows 8 Avoiding Downtime Authentication Going Green Efficiency Unified Communications IBM Troubleshooting Backup Business Growth Personal Information Refrigeration Maintenance Passwords Website App Net Neutrality Cybercrime Authorization Upgrades Mobile Device Management Marketing Access Control G Suite Hiring/Firing Heating/Cooling Mobile Data Spam Google Docs Gadget Remote Monitoring and Management VPN Read Only Project Management Telephony Microsoft Excel Geography Utility Computing Unified Threat Management Knowledge Assessment communications File Sharing Health Laptop IT Technicians Customer Service Hosted Solution Public Cloud Big Data Virus Information GPS Computer Care Cleaning Hackers Data Backup Enterprise Content Management Disaster Resistance Privacy Word Legislation BYOD Uninterrupted Power Supply Google Calendar Human Error Search Staff User Tips Cybersecurity Star Wars Company Culture Patch Management Upgrade IT Consulting Mobility Tech Terms Innovation Mirgation Data Security Bluetooth Managed Services Provider Computing Infrastructure Notes Mobile Security Browser IT Support IT Consultant Remote Worker Test Data loss Smart Tech Spyware Holiday Productivity Office 365 Education Two-factor Authentication Operations Electronic Health Records Data Management Environment Bring Your Own Device Mobile Permissions Internet of Things User Error Vendor Management Managed IT Services Managing Stress Alert Wireless Technology WPA3 Internet Money Windows 10 History Business Technology Virtual Private Network Backup and Disaster Recovery MSP Security Multi-Factor Security VoIP Physical Security Virtual Desktop SharePoint Smart Technology Comparison IT Management Backups Modem Software as a Service Deep Learning Recycling Small Business Drones Data Breach Managed Service Instant Messaging Network Solid State Drive IP Address Database Managed Service Provider Security Cameras Redundancy Cabling Virtualization Bookmarks Webcam Chrome Wearable Technology Automobile Printing Botnet WannaCry Finance Saving Money Remote Workers Fraud Google Drive Hacks Buisness Google Maps Superfish Applications Hardware Information Technology Proactive IT USB SaaS Analytics HIPAA Work/Life Balance Outsourced IT Disaster Recovery Public Speaking IT Support Best Practice Office Government Digital Identity Theft Intranet Smartphones Favorites Unsupported Software Conferencing Server Travel Phishing Bitcoin Cookies Chromebook Procurement Firefox Remote Computing Hard Drive Sync Domains Licensing Humor Software Tips Social Engineering Administrator Disaster Techology Mobile Device Managment Server Management Mouse Customer Relationship Management Fun Mobile Office Machine Learning Time Management YouTube User Screen Reader Electronic Medical Records Operating System Computer Repair Lithium-ion Battery Apple Statistics Facebook Hosted Solutions Printer Distributed Denial of Service Documents Communication Social Media Files End of Support iPhone Business Owner Retail Motherboard Bandwidth Gadgets Virtual Reality BDR Settings Social Address Save Time Cloud Unified Threat Management Crowdsourcing Emoji Paperless Office Piracy Windows Risk Management Notifications Corporate Profile Infrastructure Router Cost Management Users Cryptocurrency Dark Web High-Speed Internet Permission Mobile Device Relocation Financial How To Experience Employee-Employer Relationship IT solutions Ransomware Zero-Day Threat Hard Disk Drive Consultation Business Development Hard Drives Tech Term Legal Vulnerabilities OneNote Web Server Miscellaneous Update Technology Tips Workplace Tips IoT How To Network Management Managed IT Service Technology Laws Typing Touchscreen Migration Business Intelligence Shortcut Tech Support Features Content Filtering Lenovo Politics Point of Sale Business Computing Virtual Assistant Wasting Time Tracking Document Management Compliance Apps Alerts Data IT Budget Theft Data Recovery Software Mobile Computing Blockchain Flexibility Professional Services eWaste Google Writing Email Identities Entrepreneur Monitoring Wires Scam Safety CCTV Consulting Sports Hotspot Smartphone Competition Supercomputer Employees Cables Automation Employer-Employee Relationship Artificial Intelligence Cache Mail Merge Mobile Devices Servers CIO Running Cable Identity Trending Twitter Monitors Wi-Fi Tip of the Week Collaboration Law Enforcement Cameras Antivirus Asset Tracking PowerPoint Downloads Best Practices VoIP Cyber Monday Productivity Downtime Voice over Internet Protocol Computers Private Cloud Co-managed IT Training Firewall Remote Monitoring Wireless Staffing Digital Payment 3D Printing Processors Display Microsoft Office Chatbots Programming Network Congestion Recovery Language Saving Time Windows 7 Augmented Reality Tip of the week Business Management Data Warehousing Business Continuity Break Fix Budget IT Services Undo Cyberattacks Quick Tips Managed IT services IT service Help Desk Network Security Taxes Internet Exlporer Application Fleet Tracking Digital Signature Google Wallet Storage Samsung Social Networking Save Money Tablet Scary Stories Vulnerability Error Websites Black Friday Networking Robot Gmail Outlook Computer Data storage Regulations PDF Cooperation Alt Codes ROI Malware

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...
QR-Code