Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do You Know What to Do When Involved in Identity Theft?

Do You Know What to Do When Involved in Identity Theft?

The unfortunate truth of increased technology use in the workplace is that there is a corresponding increase in the potential for cybercrime, more specifically identity theft, to strike the workplace. The question is, what can you do to help prevent it, and how should you react to it should it strike?

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Innovation Information Technology User Error Chatbots Project Management Vendor Management Wireless Development Computer Care Customer Service Operating System Analytics Social Engineering Managed IT Services Nanotechnology VPN Trending Customer Relationship Management How To Managing Stress Motherboard 3D Printing YouTube Efficiency Law Enforcement IT Consulting Redundancy Augmented Reality PowerPoint Entrepreneur MSP Backups Paperless Office HIPAA Relocation Going Green Instant Messaging Typing Networking Migration Risk Management Dark Web Vulnerability BDR Remote Worker Infrastructure Monitoring Gadgets Conferencing Hacking Ransomware Downtime Virus Error Information Holiday Phone System Security Network Star Wars Cleaning Cost Management Asset Tracking Computing Infrastructure Unified Threat Management Outlook Chrome Mobility Processors Cortana Documents Printer WiFi Wireless Technology Geography Encryption Comparison Apps G Suite Email Software Tips Internet Exlporer Competition Consultation Files Deep Learning Cables Telephony Disaster Resistance Distributed Denial of Service Save Money Administration Humor Private Cloud Data Management Tip of the Week History Windows 10 LiFi Microsoft Excel Digital OneNote Work/Life Balance Document Management Update Computer Repair Buisness Legal Spyware Administrator Server Management Net Neutrality Notifications Data Recovery Cyberattacks Cryptocurrency Productivity Virtual Desktop Social Networking Hard Disk Drive Sports Quick Tips GPS Techology Google Docs Virtual Assistant eWaste Avoiding Downtime Artificial Intelligence Phishing Data Security Enterprise Content Management Smartphone Microsoft Office Alerts Application Safety Lenovo Mobile Data Hotspot Training Google Calendar Taxes WannaCry CCTV Spam Collaboration Antivirus The Internet of Things Fleet Tracking Cybercrime Black Friday Managed IT Service Compliance Connectivity Motion Sickness Tracking Smartphones IoT Human Error Mobile Devices App Data loss Business Intelligence Current Events RMM Identity Theft Browser Mobile Security Mobile Device Managment Computers Mobile Device Management Money Automation Consumers PDF Theft Disaster Knowledge Features Unified Threat Management Windows 7 Co-managed IT Tech Support Google Maps Google Wallet Wearable Technology Licensing Android Operations CIO Botnet Flexibility Politics Social USB Best Practice Windows 8 Security Cameras Apple Business Technology Passwords Legislation Favorites High-Speed Internet Cybersecurity Cache Fraud Business SharePoint Running Cable Monitors Cooperation Recycling Lithium-ion Battery Identity Physical Security Test Hosted Solution Piracy Remote Monitoring and Management Alert Touchscreen Recovery Outsourced IT Hacker Gmail Access Control Firewall End of Support Office Tips Procurement Computing Blockchain Smart Tech Website Content Filtering Internet of Things Employer-Employee Relationship Microsoft Data storage Staffing Windows Bookmarks Shortcut IP Address Data Settings Help Desk Malware Search Point of Sale Undo Storage Web Server Fun Miscellaneous Virtualization Display Tech Term Remote Computing Users Unsupported Software BYOD Alt Codes Mouse Technology Tips Big Data IT Consultant Break Fix Programming Virtual Reality Electronic Health Records Hardware Software as a Service Backup communications IT Services Backup and Disaster Recovery Database Presentation Technology Laws Hard Drives Financial Bandwidth Analyitcs Voice over Internet Protocol Dark Data Virtual Private Network Domains Small Business Disaster Recovery IT solutions Computer Employee-Employer Relationship iPhone E-Commerce Workplace Tips Budget Hackers Read Only Chromebook Samsung Sync Save Time Mobile Office Digital Signature Facebook Telephone Systems Education Printing Environment Bluetooth Address Permissions Wi-Fi ROI Statistics Halloween Business Owner Mirgation IT Support Personal Information SaaS Cookies Internet Maintenance Saving Money Company Culture Black Market Upgrade Modem Privacy Server Business Management Machine Learning Two-factor Authentication Firefox User VoIP Troubleshooting Assessment IT service Uninterrupted Power Supply Corporate Profile Mobile Device Robot Technology Government IT Budget Mobile Proactive Bring Your Own Device IT Technicians Utility Computing Specifications Managed Service Superfish Data Backup Cyber Monday Cabling Refrigeration Time Management Websites Consulting Permission Tech Terms Office Tip of the week Communication Language Cloud Servers Best Practices Mobile Computing Windows 10 Wires Regulations Managed IT Router Automobile Data Breach Gadget Network Congestion Google Drive Social Media Heating/Cooling 5G Professional Services Business Continuity Public Speaking IT Support Office 365 Electronic Medical Records Supercomputer Twitter Zero-Day Threat Cameras Scam Business Growth Solid State Drive Writing Data Warehousing Health Hosted Solutions Scary Stories Hard Drive Hiring/Firing Managed Services Provider Multi-Factor Security Digital Payment Productivity Healthcare Mail Merge Google Finance Webcam Unified Communications Notes Public Cloud Drones Password Tablet Laptop Proactive IT Managed IT services Applications Smart Technology Remote Monitoring Travel Upgrades Cloud Computing Vulnerabilities Bitcoin Hacks IBM Screen Reader Employees Downloads Crowdsourcing Software Authentication Experience Wasting Time Emoji Saving Time Identities Business Computing Patch Management Staff Network Management IT Management Management File Sharing Word User Tips VoIP Authorization Network Security Enterprise Resource Planning WPA3 Remote Workers Marketing How To Intranet Managed Service Provider Meetings Retail

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...