Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do You Know What to Do When Involved in Identity Theft?

Do You Know What to Do When Involved in Identity Theft?

The unfortunate truth of increased technology use in the workplace is that there is a corresponding increase in the potential for cybercrime, more specifically identity theft, to strike the workplace. The question is, what can you do to help prevent it, and how should you react to it should it strike?

Continue reading

3 Ways to Prevent a Smartphone Thief From Also Stealing Your Data

3 Ways to Prevent a Smartphone Thief From Also Stealing Your Data

While it’s certainly a bummer to have your smartphone stolen, it’s even worse if the thief accesses your data. To help prevent this nightmare scenario, security professionals have developed some clever solutions.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

G Suite Safety Drones Dark Web Communication Browser Outlook Compliance Apple File Sharing Smart Tech Malware Data Recovery IT solutions Printer IT Budget Phishing BDR Workplace Tips Proactive IT Social Networking Digital Signature Piracy Best Practice User SharePoint Heating/Cooling Telephony Education Running Cable Electronic Health Records Innovation Tablet Antivirus Remote Monitoring Virtual Private Network Web Server Technology Social Applications Word Tip of the week Tip of the Week Data Backup Wireless Technology Files Managed Service Provider Best Practices Software as a Service Digital Payment Windows Automobile Artificial Intelligence Mobile Device Management Robot Disaster Managing Stress Data Management Staffing Alt Codes Webcam Travel Budget Programming Productivity Two-factor Authentication Business Owner Windows 10 Cybersecurity Upgrade Botnet Writing Cryptocurrency Hackers Google Calendar Presentation Authorization Going Green Tech Terms Politics Unsupported Software Break Fix Halloween Firewall Vulnerabilities WannaCry Spam Remote Monitoring and Management Augmented Reality Enterprise Resource Planning Geography OneNote Black Friday Display Bandwidth Server Management Entrepreneur Security Cameras Holiday Telephone Systems Hard Disk Drive Social Engineering Managed Service Virtual Desktop Documents Cables Private Cloud Technology Laws Networking Mirgation Twitter Risk Management Cybercrime WPA3 Bookmarks Bring Your Own Device Fun App Network 5G Backups Analytics IT Support Solid State Drive Infrastructure Social Media Vulnerability Administrator Features Consulting Google Hacker Distributed Denial of Service IT Consulting Mobile Devices Small Business Google Docs Techology Data storage Cleaning Legal Unified Threat Management Office Tips Servers Licensing Facebook Hacks Screen Reader Hotspot Websites Utility Computing Backup Gmail Current Events Phone System Bitcoin IT Support Law Enforcement RMM CIO Modem Search Hard Drive Google Wallet Computer Care Personal Information Save Money Point of Sale Comparison Project Management IBM Computer Touchscreen Lenovo Disaster Recovery Bluetooth Regulations Maintenance Human Error High-Speed Internet Software Tips Application IP Address IT Management Productivity Notifications Access Control Digital Microsoft Superfish Net Neutrality Save Time Machine Learning IT Consultant BYOD Chatbots Sync Hosted Solution Consumers Taxes Information Instant Messaging Address Spyware Internet Exlporer Monitoring Managed IT Services Apps Virus IT Technicians Staff Outsourced IT Mobile Office Chrome Recovery Collaboration Permissions PowerPoint Statistics Paperless Office Computing Infrastructure Mobile Security Managed Services Provider Black Market Shortcut Public Cloud Migration Samsung Data loss Recycling IT service Remote Computing Conferencing Health Internet Assessment Ransomware IoT Hacking Business Technology Scary Stories Document Management VPN Tech Support SaaS Blockchain Financial Cyber Monday Mobile Device Managment Cooperation Humor Smart Technology Remote Worker Router Google Maps History User Error Miscellaneous Co-managed IT Asset Tracking Flexibility Uninterrupted Power Supply Read Only Customer Service Scam Android Language Finance Buisness Favorites Cloud Computing Managed IT Service Upgrades Fleet Tracking Development Cloud Wearable Technology Alerts Redundancy Firefox Network Management User Tips Cortana Smartphone Mobility Microsoft Excel Business Growth Computing Managed IT Lithium-ion Battery Time Management Remote Workers Intranet VoIP LiFi Mobile Cookies Emoji Processors Management Smartphones Internet of Things Data Security Monitors MSP ROI Virtualization How To Hardware Saving Time Employee-Employer Relationship Mouse How To Crowdsourcing Cost Management Server Vendor Management Undo Printing Competition Password Test Trending Star Wars Motherboard Theft Website PDF Passwords Downloads Experience Wireless Privacy Refrigeration YouTube Settings Work/Life Balance Data Warehousing The Internet of Things Alert Business Management Email Data Mobile Device Efficiency Gadget Backup and Disaster Recovery Company Culture Fraud Network Congestion Connectivity Healthcare Sports WiFi Hiring/Firing Retail Automation Google Drive Training Cameras Mail Merge Cache Domains Specifications eWaste Authentication Microsoft Office Office Help Desk Wi-Fi Content Filtering Environment E-Commerce Big Data End of Support Virtual Reality Permission IT Services GPS Employer-Employee Relationship Relocation Marketing Tracking Office 365 Procurement Typing 3D Printing Storage Multi-Factor Security Business Business Continuity Customer Relationship Management Gadgets Identity Hard Drives Downtime Mobile Data Data Breach Technology Tips Administration Motion Sickness Business Computing Unified Threat Management Physical Security Knowledge HIPAA Disaster Resistance Network Security Software Tech Term Avoiding Downtime Supercomputer Cabling Consultation Windows 10 Laptop Operating System Zero-Day Threat Computers USB Mobile Computing Update Dark Data Analyitcs Nanotechnology Electronic Medical Records Identity Theft Operations Chromebook Business Intelligence Information Technology Enterprise Content Management Hosted Solutions VoIP Legislation Corporate Profile Meetings Wires CCTV Government Unified Communications Quick Tips iPhone Encryption Deep Learning communications Saving Money Identities Troubleshooting Managed IT services Public Speaking Computer Repair Error Money Security Users Windows 8 Employees Patch Management Proactive Cyberattacks

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...