Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 3 Crucial Pieces of HIPAA Compliance

Tip of the Week: 3 Crucial Pieces of HIPAA Compliance

If your work requires you to store medical data, you should be aware of how important your data security is, as a problem could potentially put your business at risk of closing up shop permanently. Security has to be a priority with so many regulations setting compliance standards that must be followed. How can you balance the effectiveness of your business without undermining its security?

Continue reading

HIPAA and Wearables May Clash in the Near Future

HIPAA and Wearables May Clash in the Near Future

Today, perhaps now more than ever before, technology is making strides toward making its users consider ways to stay healthier. Wearables are one of the primary examples of how technology is aiming to make users both more active and more interested about their own health. At 2018’s Consumer Electronics Show in Las Vegas, Nevada, this technology was front and center, showcasing how far it has come in just a year’s time.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Hosted Solution Antivirus Office History Bluetooth Windows Mobile Device Managment Business Computing Firefox Cables Mouse Emoji Paperless Office Legislation Save Money Spam Scary Stories How To Chrome Break Fix Zero-Day Threat Gadget Robot Hard Drives Vulnerabilities Data loss Compliance Mobile Facebook Solid State Drive The Internet of Things Screen Reader communications Cookies Alert Computing Customer Service Fleet Tracking Alt Codes Managing Stress Unified Communications IT solutions Telephony Encryption Search Migration Money Spyware 3D Printing Voice over Internet Protocol Networking Network Congestion Favorites Users Government Software Documents Document Management Tip of the week Productivity Taxes Managed IT Services Politics Healthcare Bitcoin Fun Mobile Computing Smartphone Retail Error PowerPoint Staffing Marketing Hiring/Firing Features Computer Windows 10 Read Only Identities Hackers Microsoft Office Personal Information Software Tips Internet Bandwidth Employee-Employer Relationship Cyberattacks Privacy Phone System Computing Infrastructure User Distributed Denial of Service YouTube Flexibility BYOD Cybercrime Star Wars Smart Technology Smartphones Web Server Law Enforcement Mirgation Android Software as a Service Recovery IBM Downloads Miscellaneous 5G Disaster Recovery Backups Financial Work/Life Balance Downtime Project Management Computer Care Drones Gadgets Application VPN Analytics Relocation Business Management Data Backup Physical Security High-Speed Internet Business Owner Techology Administration Hosted Solutions CCTV IT Services Operations Monitors Electronic Medical Records Nanotechnology G Suite Digital Payment Internet Exlporer Black Market Redundancy Password Data storage App Mail Merge IT Management Virtual Desktop IT Consultant Halloween Analyitcs Holiday Hacks Wi-Fi Microsoft Consumers Save Time Upgrade Business Continuity Telephone Systems Cost Management Geography PDF Employees Piracy Virtualization Chatbots Outsourced IT Bring Your Own Device Remote Workers Patch Management Scam Environment Programming Writing Authentication Electronic Health Records Consultation Cabling VoIP Cloud Computing Notes Communication Wireless Shortcut Permissions Professional Services Google Wallet Vendor Management Social Networking Data Security Network Security Apple Data Warehousing Statistics Bookmarks Asset Tracking Computer Repair Storage Domains Modem Tech Term Management Update Trending Cloud Managed IT services File Sharing Connectivity Chromebook Competition Hacker Security Cameras Firewall Meetings Mobile Devices Unified Threat Management Comparison Virtual Reality Internet of Things Cortana Risk Management Sync Cyber Monday Vulnerability Identity Theft Computers Social Media Business Growth Wasting Time Best Practices Managed IT Entrepreneur Blockchain Big Data Passwords Authorization VoIP RMM Google Fraud Running Cable MSP Quick Tips Augmented Reality Email Phishing Mobility Business Intelligence Utility Computing Deep Learning Technology Instant Messaging Data Recovery Infrastructure Two-factor Authentication Malware Administrator Small Business Cybersecurity Intranet Cleaning Database Virus SaaS User Tips User Error Data End of Support Virtual Private Network Consulting Procurement Google Docs Digital Staff IT Technicians Office Tips IT Budget Digital Signature Help Desk Data Breach Data Management IT service Remote Computing Network Windows 7 Artificial Intelligence USB Applications Alerts Tracking Smart Tech Humor Safety WPA3 Troubleshooting Managed IT Service Superfish Webcam Office 365 Ransomware Recycling Wires Business Gmail Information E-Commerce Access Control WannaCry Proactive Cryptocurrency Tech Support Time Management Sports Productivity Black Friday ROI Outlook WiFi Identity Tip of the Week Disaster Lithium-ion Battery Hacking Botnet Mobile Device OneNote Multi-Factor Security IP Address Remote Worker Buisness Hardware Maintenance Dark Data Innovation Hotspot Business Technology Website Language Co-managed IT Regulations Presentation Operating System CIO Conferencing Mobile Office IT Support Notifications Word Mobile Security Google Calendar Net Neutrality Backup and Disaster Recovery Customer Relationship Management Heating/Cooling Mobile Data Laptop Enterprise Resource Planning Tech Terms Twitter Budget Corporate Profile Security Disaster Resistance Remote Monitoring and Management Company Culture Backup Network Management iPhone Typing Supercomputer Theft Efficiency Automobile Settings Microsoft Excel Content Filtering Server Management Permission Google Maps Websites Unsupported Software Social Engineering Wireless Technology IoT Unified Threat Management Point of Sale Human Error LiFi Mobile Device Management Display Social Managed Service BDR GPS Undo Cache Managed Service Provider Saving Money SharePoint Public Cloud Proactive IT Best Practice Public Speaking Training Processors Automation Private Cloud Printer Technology Laws IT Support Avoiding Downtime Server Virtual Assistant Windows 8 Motherboard Education Monitoring How To Browser Experience Information Technology Legal Finance Licensing Development Lenovo Touchscreen Collaboration Machine Learning Address IT Consulting Assessment HIPAA Windows 10 Hard Disk Drive Remote Monitoring Google Drive Health Specifications Crowdsourcing Workplace Tips Technology Tips Router Refrigeration Apps Printing Employer-Employee Relationship Hard Drive Knowledge Enterprise Content Management Going Green Cameras Cooperation Motion Sickness Travel Wearable Technology Tablet eWaste Servers Saving Time Dark Web Upgrades Samsung Files Managed Services Provider Uninterrupted Power Supply Current Events Test

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...