Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why You Shouldn't Say “Humbug” to Your Security

Why You Shouldn't Say “Humbug” to Your Security

The IT guy, Jacob left last month: to begin with. There is no doubt whatever about that. He left without an exit interview, and he didn’t seem very pleased with the way the situation played out. You could never tell if Scrooge cared or not. His demands have never wavered. He expected perfection and when mistakes were made, they were approached as catastrophic affronts to the sustainability of the business, even if that wasn’t the reality.

Continue reading
0 Comments

During the Holidays, Cybersecurity Matters at Work and Home

During the Holidays, Cybersecurity Matters at Work and Home

We’re right in the thick of the holiday season, which means two things: one, there’s a lot of data being exchanged between businesses and consumers, and (on a related note) two: there’s ample opportunities for cybercrime, targeting business and consumer both. Whichever side of the coin you are on at any moment, you need to be aware of the risks, and how to mitigate them.

Continue reading
0 Comments

Technology Has Played a Part in Shaping How We Celebrate the Season

Technology Has Played a Part in Shaping How We Celebrate the Season

The holiday season has always been one of deep-seated traditions, some that draw from ancient customs, and some that are inspired by more contemporary trends. These traditions have been shaped, and often inspired by, the technology available in the day. Today, we’ll reflect on how the technologies we have now have impacted our celebratory traditions.

Continue reading
0 Comments

Are You Accidentally Gifting a Security Breach?

Are You Accidentally Gifting a Security Breach?

The holidays are a time filled with good food, visits from dear friends and family, and exchanging gifts with those you care about. However, to keep the season bright and merry, you need to be a little cautious during your next gift exchange, as many gifts can present some unexpected risks to your recipient’s security. Be mindful if you see the following items on someone’s wish list.

Continue reading
0 Comments

Thieves Materialize Most Around the Holidays

Thieves Materialize Most Around the Holidays

In terms of identity theft, data loss and good ol’ fashioned pickpocketing, the holiday season is one of the riskiest times to travel. When it comes to protecting your personal information, thieves and cybercriminals are counting on you to be distracted and make careless mistakes. In 2016, the number of fraud attempts went up by 31% during the holiday season. In addition, credit cards, mobile devices, and open Wi-Fi are common targets throughout the holidays.

Continue reading
0 Comments

This Halloween, Dress Like a Hacker and Terrify Your IT Administrator

This Halloween, Dress Like a Hacker and Terrify Your IT Administrator

Halloween is a time when people of all ages dress up as something spooky that they’re really not. For the scariest of hackers, every day is like a reverse Halloween as they try to scam victims by pretending to be someone safe and trustworthy--a persona that they’re really not. This Halloween, don’t get tricked by the haunted hack!

Continue reading
0 Comments

A Trap So Devious that Even Admiral Ackbar Missed It

b2ap3_thumbnail_may_the_4th_death_star_400.jpgWith the long-awaited release of Star Wars: Episode VII The Force Awakens this December, today’s Star Wars Day holiday may be the biggest yet (May the 4th be with you). As a technology-loving IT company, we’re happy to honor our favorite science fiction franchise by taking a fun look at its futuristic space technology.

Continue reading
0 Comments

Unsent IE Error Reports Uncovered, You Won’t Believe Where!

b2ap3_thumbnail_old_ie_error_reports_400.jpgEven if you like Internet Explorer, you may have noticed that it can be a bit buggy at times. Perhaps if Microsoft had more information about the causes of its software issues, they could develop a better product. This is the purpose of software error reports, which largely go unsent and unread; or at least, that’s what Microsoft thought.

Continue reading
0 Comments

Mark Your Calendars, Folks: World Backup Day is March 31st

b2ap3_thumbnail_world_backup_day_400.jpg2015 isn’t the year to go without backups. If there’s anything 2014 showed the world, it’s that businesses can fall victim to data breaches when they least expect it. You want to be prepared in the event of a data breach or data loss, and the easiest way to do that is by taking advantage of an external backup. Unfortunately, even an essential solution like data backup can be forgotten amidst the everyday operations of the average business owner.

Continue reading
0 Comments

IT Techie, Hurry Up My Downloads Tonight

b2ap3_thumbnail_hurry_up_downloads_400.jpg

An IT parody song to the tune of “Santa Baby.”

Continue reading
0 Comments

4 Holiday Tech Gifts for 2014

b2ap3_thumbnail_2014_gifts_400.jpgThe holidays are again upon us and if you are looking for the perfect gift for your favorite business professional, you don’t have to look too far. There are more consumer electronics available today than ever before, and most of them have some sort of novelty attached to them. We have made a list of four gifts that are not only cool, they serve a practical purpose and will probably avoid being re-gifted or recycled.

Continue reading
0 Comments

Are Your Employees as Competitive as Black Friday Sales?

b2ap3_thumbnail_workplace_competition_400.jpgBlack Friday is widely regarded as the most competitive day for American retailers, and for consumers standing in line to take advantage of rock-bottom prices, the general consensus is that all of this competition is great for their wallets. In the same way, your business can benefit from a healthy dose of friendly competition.

Continue reading
0 Comments

Ghost Servers - Who Ya Gonna Call?

b2ap3_thumbnail_ghost_server_400.jpgEveryone has heard horror stories about the spirits of the dead lingering in this world. Every culture on this planet has different beliefs about the nature of these spectral beings. Not much is known about these beings, but people still believe without a doubt that they exist. In regards to technology, ghosts do exist, in the form of ghost servers.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Social Engineering Screen Reader Techology Star Wars Quick Tips Hiring/Firing Cookies Superfish Remote Worker Financial Marketing iPhone Phone System Gmail Private Cloud Websites Retail Outsourced IT Office Tips Security Cameras History Statistics 3D Printing Social Storage Tablet Cloud Twitter Touchscreen Motherboard Virtual Desktop Android Tracking Save Money Wi-Fi Operating System Programming Cyberattacks BDR Theft Troubleshooting Information Technology Uninterrupted Power Supply Spyware Human Error Server Management Consumers Data Recovery Website Managed IT Service Permissions Productivity Disaster Resistance communications Recycling Virtual Private Network Downloads Writing Features RMM Mobility Spam Content Filtering Documents Work/Life Balance Fleet Tracking Break Fix How To Competition Tech Terms Legislation Language Administrator Disaster Windows 10 Scary Stories IoT Enterprise Content Management Administration Black Market Virus SaaS Smart Tech Government Office 365 Tech Term Authorization User eWaste Test Licensing Browser Dark Data GPS Redundancy Antivirus Facebook Processors Security Digital Files Remote Monitoring ROI Malware Piracy Meetings Software as a Service IT Budget Managing Stress Automobile Alert Google Docs Relocation Automation Analyitcs Ransomware Networking Saving Time Monitors Buisness Cryptocurrency Hosted Solution Computer Vulnerabilities IT service Update Heating/Cooling Artificial Intelligence Proactive Samsung Co-managed IT Managed Services Provider Hosted Solutions Budget Hard Drive Best Practice Wires Fraud Undo Backup and Disaster Recovery Router Physical Security Address Upgrades CIO Cyber Monday Electronic Health Records Knowledge Unified Communications Small Business Conferencing Google Maps IT Services Cybersecurity CCTV Innovation IT Consulting Operations Managed IT Network Miscellaneous Microsoft Domains Customer Relationship Management Favorites Identity Theft Mobile Device Downtime IP Address Proactive IT Distributed Denial of Service Connectivity Robot High-Speed Internet Privacy Blockchain Outlook Apple Law Enforcement Mobile Computing Google Calendar Data Warehousing IT Management Managed Service Corporate Profile Scam Hacker Word YouTube Office Remote Monitoring and Management Cybercrime IT Technicians Virtualization Users Cameras Business Management Mobile Data Permission Disaster Recovery Encryption Servers Notifications Education Applications Server Avoiding Downtime Instant Messaging Compliance Backups Running Cable Entrepreneur Lithium-ion Battery Search Technology Tips Point of Sale Humor Enterprise Resource Planning IT Support Tip of the Week Mail Merge Data Botnet MSP Patch Management Employer-Employee Relationship Laptop Cooperation HIPAA Internet Exlporer Gadgets Identities Error Computers Shortcut Emoji Authentication Data loss LiFi Intranet Flexibility Application Managed IT Services VoIP Chatbots Drones Telephone Systems Cortana Software Multi-Factor Security Halloween Collaboration Digital Signature Training Employee-Employer Relationship Time Management Technology Laws IBM Electronic Medical Records Machine Learning Regulations Settings Web Server BYOD Mobile Security Big Data Information Identity Virtual Reality Net Neutrality Business Owner Google Gadget Computing Refrigeration Cloud Computing Hard Drives Google Wallet Business Technology Employees Computer Repair Going Green Comparison Utility Computing Environment Risk Management Social Media Nanotechnology Dark Web Bookmarks Best Practices Bandwidth Hard Disk Drive Staffing Taxes Maintenance Sports Assessment Healthcare Infrastructure Typing Two-factor Authentication Company Culture Project Management Monitoring Smartphones Finance Access Control Workplace Tips WiFi Cost Management Read Only WPA3 Trending Computing Infrastructure Managed IT services Internet Business Hacking Geography Data storage Travel Computer Care 5G Telephony Development Windows 10 VoIP VPN Data Backup Current Events Hacks Business Growth Help Desk Technology Sync Communication Upgrade Cleaning Social Networking Bring Your Own Device Mobile Devices Microsoft Office Alerts Mouse Cables Public Cloud Windows Specifications Legal Vendor Management Saving Money IT Support Google Drive Backup Presentation Printer Business Computing The Internet of Things USB Cache Document Management Personal Information Phishing File Sharing Crowdsourcing Experience Mirgation Consultation Modem Mobile Windows 8 Vulnerability Unified Threat Management Apps Webcam Software Tips Motion Sickness Management Printing Network Congestion Politics Wearable Technology G Suite Remote Computing Email Paperless Office Consulting Cabling OneNote Microsoft Excel Safety Unsupported Software Display Productivity Chrome Unified Threat Management Wireless Analytics Network Management Digital Payment End of Support Business Continuity Deep Learning Mobile Office Wireless Technology User Error Staff Money PowerPoint Password Mobile Device Management Recovery Data Management IT Consultant Data Security Supercomputer Passwords Black Friday Procurement Efficiency Zero-Day Threat Augmented Reality Remote Workers Network Security Data Breach SharePoint Migration Firefox Business Intelligence Save Time Hotspot Smart Technology Lenovo Tech Support Internet of Things Asset Tracking User Tips PDF Customer Service IT solutions Smartphone Alt Codes Public Speaking How To Firewall Chromebook Bitcoin Holiday Hackers Health Solid State Drive WannaCry Fun Mobile Device Managment E-Commerce Managed Service Provider Tip of the week Bluetooth Hardware App

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code