Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why You Shouldn't Say “Humbug” to Your Security

Why You Shouldn't Say “Humbug” to Your Security

The IT guy, Jacob left last month: to begin with. There is no doubt whatever about that. He left without an exit interview, and he didn’t seem very pleased with the way the situation played out. You could never tell if Scrooge cared or not. His demands have never wavered. He expected perfection and when mistakes were made, they were approached as catastrophic affronts to the sustainability of the business, even if that wasn’t the reality.

Continue reading
0 Comments

During the Holidays, Cybersecurity Matters at Work and Home

During the Holidays, Cybersecurity Matters at Work and Home

We’re right in the thick of the holiday season, which means two things: one, there’s a lot of data being exchanged between businesses and consumers, and (on a related note) two: there’s ample opportunities for cybercrime, targeting business and consumer both. Whichever side of the coin you are on at any moment, you need to be aware of the risks, and how to mitigate them.

Continue reading
0 Comments

Technology Has Played a Part in Shaping How We Celebrate the Season

Technology Has Played a Part in Shaping How We Celebrate the Season

The holiday season has always been one of deep-seated traditions, some that draw from ancient customs, and some that are inspired by more contemporary trends. These traditions have been shaped, and often inspired by, the technology available in the day. Today, we’ll reflect on how the technologies we have now have impacted our celebratory traditions.

Continue reading
0 Comments

Are You Accidentally Gifting a Security Breach?

Are You Accidentally Gifting a Security Breach?

The holidays are a time filled with good food, visits from dear friends and family, and exchanging gifts with those you care about. However, to keep the season bright and merry, you need to be a little cautious during your next gift exchange, as many gifts can present some unexpected risks to your recipient’s security. Be mindful if you see the following items on someone’s wish list.

Continue reading
0 Comments

Thieves Materialize Most Around the Holidays

Thieves Materialize Most Around the Holidays

In terms of identity theft, data loss and good ol’ fashioned pickpocketing, the holiday season is one of the riskiest times to travel. When it comes to protecting your personal information, thieves and cybercriminals are counting on you to be distracted and make careless mistakes. In 2016, the number of fraud attempts went up by 31% during the holiday season. In addition, credit cards, mobile devices, and open Wi-Fi are common targets throughout the holidays.

Continue reading
0 Comments

This Halloween, Dress Like a Hacker and Terrify Your IT Administrator

This Halloween, Dress Like a Hacker and Terrify Your IT Administrator

Halloween is a time when people of all ages dress up as something spooky that they’re really not. For the scariest of hackers, every day is like a reverse Halloween as they try to scam victims by pretending to be someone safe and trustworthy--a persona that they’re really not. This Halloween, don’t get tricked by the haunted hack!

Continue reading
0 Comments

A Trap So Devious that Even Admiral Ackbar Missed It

b2ap3_thumbnail_may_the_4th_death_star_400.jpgWith the long-awaited release of Star Wars: Episode VII The Force Awakens this December, today’s Star Wars Day holiday may be the biggest yet (May the 4th be with you). As a technology-loving IT company, we’re happy to honor our favorite science fiction franchise by taking a fun look at its futuristic space technology.

Continue reading
0 Comments

Unsent IE Error Reports Uncovered, You Won’t Believe Where!

b2ap3_thumbnail_old_ie_error_reports_400.jpgEven if you like Internet Explorer, you may have noticed that it can be a bit buggy at times. Perhaps if Microsoft had more information about the causes of its software issues, they could develop a better product. This is the purpose of software error reports, which largely go unsent and unread; or at least, that’s what Microsoft thought.

Continue reading
0 Comments

Mark Your Calendars, Folks: World Backup Day is March 31st

b2ap3_thumbnail_world_backup_day_400.jpg2015 isn’t the year to go without backups. If there’s anything 2014 showed the world, it’s that businesses can fall victim to data breaches when they least expect it. You want to be prepared in the event of a data breach or data loss, and the easiest way to do that is by taking advantage of an external backup. Unfortunately, even an essential solution like data backup can be forgotten amidst the everyday operations of the average business owner.

Continue reading
0 Comments

IT Techie, Hurry Up My Downloads Tonight

b2ap3_thumbnail_hurry_up_downloads_400.jpg

An IT parody song to the tune of “Santa Baby.”

Continue reading
0 Comments

4 Holiday Tech Gifts for 2014

b2ap3_thumbnail_2014_gifts_400.jpgThe holidays are again upon us and if you are looking for the perfect gift for your favorite business professional, you don’t have to look too far. There are more consumer electronics available today than ever before, and most of them have some sort of novelty attached to them. We have made a list of four gifts that are not only cool, they serve a practical purpose and will probably avoid being re-gifted or recycled.

Continue reading
0 Comments

Are Your Employees as Competitive as Black Friday Sales?

b2ap3_thumbnail_workplace_competition_400.jpgBlack Friday is widely regarded as the most competitive day for American retailers, and for consumers standing in line to take advantage of rock-bottom prices, the general consensus is that all of this competition is great for their wallets. In the same way, your business can benefit from a healthy dose of friendly competition.

Continue reading
0 Comments

Ghost Servers - Who Ya Gonna Call?

b2ap3_thumbnail_ghost_server_400.jpgEveryone has heard horror stories about the spirits of the dead lingering in this world. Every culture on this planet has different beliefs about the nature of these spectral beings. Not much is known about these beings, but people still believe without a doubt that they exist. In regards to technology, ghosts do exist, in the form of ghost servers.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Address Geography Smartphones Virus Two-factor Authentication Monitors Bitcoin Legislation Superfish Hotspot Data Backup Network Management CIO Data Security Wasting Time Corporate Profile Techology Work/Life Balance Financial Automation Internet of Things Domains How To Collaboration Malware 3D Printing Identity Gadgets Mobility Router Private Cloud Dark Data Gmail Utility Computing Android User 5G Black Market Chatbots Browser Hiring/Firing Data Recovery Tracking Error Healthcare Office IT Technicians Managed IT services Shortcut Solid State Drive Social Networking Mobile Data Enterprise Resource Planning IT Management Favorites Display Tip of the Week Regulations Drones VPN CCTV Cache Point of Sale Theft Read Only Password Patch Management Windows 8 Notes Business Intelligence Backup Server Cabling Electronic Medical Records Going Green MSP IT Support Multi-Factor Security Alerts Smartphone Technology Laws Tech Term Remote Monitoring and Management Content Filtering Apps Websites Spyware Business Management Security Cameras Bandwidth Cameras Motherboard Network Permission Cloud Computing Business Growth IT Consulting Notifications Webcam Project Management Operations Microsoft Information Technology Social Engineering Screen Reader Upgrades Networking Authentication Twitter IoT Analytics Remote Workers Printing Training WiFi Running Cable Redundancy Social Media Managed Service Files Public Cloud Ransomware Office 365 Storage Paperless Office Business Technology Wires Social Data Breach VoIP Encryption Windows 7 Undo Presentation Professional Services Word RMM Google Maps Remote Monitoring Google Wallet Backup and Disaster Recovery Language Staff Dark Web Windows Data Management iPhone PDF Upgrade Save Money Documents Piracy Remote Worker Business Continuity Cyberattacks Refrigeration Big Data Phishing Quick Tips Microsoft Excel Cybersecurity Cloud Data Warehousing Administrator Entrepreneur Lenovo End of Support Office Tips Politics Comparison Infrastructure Touchscreen LiFi Mirgation Education Tech Support Server Management Hard Drives Proactive Innovation Apple WannaCry Migration Best Practice Website Government Automobile Meetings HIPAA Google Calendar Mobile Office Identity Theft Relocation communications Windows 10 Travel Hard Drive Avoiding Downtime Data loss Proactive IT Hacker Chromebook Processors Managed Services Provider Enterprise Content Management Technology Tips Assessment Virtual Private Network Remote Computing IT solutions eWaste Distributed Denial of Service Company Culture IT Budget VoIP Humor Virtual Reality Consulting Wireless Technology Spam Scam Computer Repair Specifications SaaS Save Time How To Conferencing Cyber Monday Asset Tracking App Miscellaneous Sync Budget Customer Relationship Management GPS Internet Printer Star Wars Taxes Cables Vulnerabilities Development Firefox Business Health Blockchain Holiday Intranet Mouse Data storage Database Deep Learning Technology Connectivity WPA3 Tech Terms Retail Cybercrime Fleet Tracking Google Docs Update Botnet Computing Infrastructure Help Desk Facebook Current Events Windows 10 Monitoring Uninterrupted Power Supply IT service Communication IBM Fraud Digital Payment G Suite OneNote Virtual Desktop Machine Learning Cleaning User Error Staffing Augmented Reality The Internet of Things Unified Threat Management Co-managed IT Security History Gadget Data Telephony Small Business Virtual Assistant Downtime Settings Wearable Technology Cooperation Halloween Programming Operating System Access Control Mobile Virtualization Hardware Identities Bookmarks Vendor Management Hacks Knowledge Time Management User Tips Information Managed IT Emoji File Sharing Environment Public Speaking Human Error Cost Management Wi-Fi Mobile Devices Application PowerPoint Cookies Saving Time Experience Fun Law Enforcement Writing Productivity Efficiency Users Wireless Saving Money Buisness Unsupported Software Cryptocurrency Modem Employer-Employee Relationship Marketing Mobile Security Scary Stories Business Computing Administration YouTube Net Neutrality IT Services Network Security Mail Merge Disaster Recovery Internet Exlporer Search Statistics Computing Management Robot Recycling Servers Outlook Supercomputer High-Speed Internet Typing Break Fix Tip of the week Risk Management Analyitcs Downloads Money Lithium-ion Battery Passwords Flexibility Artificial Intelligence BDR USB Features Electronic Health Records Legal Backups Compliance Hosted Solution Permissions Firewall IP Address Tablet BYOD Email Consumers Vulnerability Managed Service Provider Trending Productivity Computers Software as a Service Mobile Computing Employees Voice over Internet Protocol Bring Your Own Device Safety Digital Recovery Crowdsourcing Outsourced IT Unified Threat Management Sports Procurement Google Drive Hacking ROI Nanotechnology Google SharePoint E-Commerce Software Digital Signature Network Congestion Mobile Device Managment Zero-Day Threat Unified Communications Antivirus Disaster Resistance Consultation Hard Disk Drive Personal Information Smart Tech Motion Sickness Troubleshooting Managed IT Services Best Practices Test Alt Codes Computer Care Mobile Device Mobile Device Management IT Support Telephone Systems Smart Technology Hosted Solutions Applications Bluetooth Managed IT Service Workplace Tips Instant Messaging Licensing Alert Finance Microsoft Office Business Owner Chrome Disaster Employee-Employer Relationship Privacy Customer Service Authorization Web Server Phone System Software Tips Maintenance Laptop Samsung Cortana Competition Physical Security Black Friday Heating/Cooling Hackers Computer Managing Stress IT Consultant Document Management

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code