Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do You Know What to Do When Involved in Identity Theft?

Do You Know What to Do When Involved in Identity Theft?

The unfortunate truth of increased technology use in the workplace is that there is a corresponding increase in the potential for cybercrime, more specifically identity theft, to strike the workplace. The question is, what can you do to help prevent it, and how should you react to it should it strike?

Continue reading
0 Comments

3 Ways to Prevent a Smartphone Thief From Also Stealing Your Data

3 Ways to Prevent a Smartphone Thief From Also Stealing Your Data

While it’s certainly a bummer to have your smartphone stolen, it’s even worse if the thief accesses your data. To help prevent this nightmare scenario, security professionals have developed some clever solutions.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Webcam Disaster Paperless Office Access Control Backups Downloads Vendor Management Word Meetings Office 365 Money ROI Tip of the week Android Scary Stories Best Practice Tip of the Week Theft Social Media Professional Services Search Website Browser IT Consulting Troubleshooting End of Support Travel YouTube Piracy 5G Personal Information Training IT service Managed IT Service Tech Support Entrepreneur WannaCry Drones IT Support IBM Wasting Time Hosted Solution Business Management Bookmarks Hackers Firefox User Error Time Management Statistics HIPAA Risk Management Nanotechnology Staff Virtual Assistant Utility Computing Websites Microsoft Office Digital Payment Patch Management Flexibility E-Commerce Automation Deep Learning Assessment Healthcare Help Desk Legal Business Technology Connectivity Taxes Data Backup Password How To Twitter Hiring/Firing Machine Learning IT Support Quick Tips Information Technology Wearable Technology Uninterrupted Power Supply Managed Service Address Data Security Upgrade Hardware Mobile Office Holiday Tracking Identities IT Consultant Comparison Saving Money Safety IP Address User Wireless Technology Virus Internet of Things BYOD Cleaning Intranet Lithium-ion Battery VPN Dark Web Settings Mobile Mirgation Social Networking Scam Analytics Knowledge Windows 8 Cyber Monday Security Cameras Cybercrime Data File Sharing Mobile Security Business SharePoint Business Owner Business Growth Public Speaking Mobility Buisness Facebook Permission Windows Managed Service Provider Printer Chatbots Black Market Lenovo CCTV Mail Merge Gmail Smartphones Applications CIO RMM Cooperation Star Wars Identity Theft Alert Remote Computing Analyitcs Consultation Human Error Downtime Samsung iPhone Network Security Unsupported Software Cabling Hard Drive Content Filtering Artificial Intelligence App Technology Tips Antivirus Error Test Corporate Profile Customer Relationship Management Hacks Cameras Documents Monitoring Environment PowerPoint Wi-Fi Google VoIP User Tips Operations Co-managed IT Vulnerabilities Files Apps Techology Phone System Relocation Save Time Mobile Device Management Health Office Passwords Remote Workers Network Management Big Data Authentication Communication Hacking Consulting IT Services Proactive Licensing Public Cloud Legislation Motherboard Humor Mobile Device Managment Notes Technology Laws Managed IT services Budget Tablet Employer-Employee Relationship Black Friday IT Management Collaboration Distributed Denial of Service Network Financial Managing Stress Technology Application History Migration Document Management Work/Life Balance Cloud Computer Customer Service Laptop Shortcut Mobile Devices Cloud Computing Private Cloud Solid State Drive Geography Virtual Reality Cache Bluetooth Hacker Data loss Smartphone Windows 10 Productivity Alerts Compliance Data Management Efficiency Law Enforcement Miscellaneous Chromebook Infrastructure Refrigeration Servers Two-factor Authentication Virtualization Managed IT Services Administration Monitors WiFi Security Government High-Speed Internet Multi-Factor Security Microsoft Vulnerability Emoji Small Business Wireless Unified Communications Disaster Resistance Enterprise Content Management Running Cable Router Google Docs Display Mobile Computing Voice over Internet Protocol Proactive IT Google Calendar Internet Exlporer Writing Processors Typing eWaste Experience Apple Automobile IT Budget Chrome Privacy Heating/Cooling Cyberattacks Marketing Cookies Sports Server Windows 7 LiFi Backup and Disaster Recovery Web Server Features Competition Save Money Computer Repair Management Recovery Cortana Business Computing Domains Electronic Medical Records Alt Codes Dark Data Asset Tracking Printing 3D Printing Permissions Best Practices Wires Sync Email Bring Your Own Device Remote Worker IT solutions Regulations Robot Fraud Software Tips Trending Outsourced IT GPS Crowdsourcing Computers Notifications Language Redundancy Digital Procurement Software Business Continuity Project Management communications Modem Digital Signature Current Events Bitcoin Staffing Cryptocurrency Identity Mouse Workplace Tips Upgrades Specifications Virtual Private Network Education Remote Monitoring Halloween Google Maps Hard Drives Spyware Google Drive Supercomputer Enterprise Resource Planning Augmented Reality Innovation PDF Server Management Update USB Motion Sickness Screen Reader Blockchain Undo Recycling Fun Politics Botnet Net Neutrality Employee-Employer Relationship Gadget Finance Point of Sale Managed IT IoT Tech Terms Telephone Systems Physical Security Break Fix Information How To Internet Saving Time Hard Disk Drive Zero-Day Threat Tech Term Development Avoiding Downtime Database Productivity Data Recovery Data Warehousing Social Engineering Remote Monitoring and Management Social Encryption Telephony Employees Windows 10 Programming Data storage Spam Outlook Smart Technology Mobile Data WPA3 Hosted Solutions Malware Disaster Recovery Business Intelligence Going Green Touchscreen Phishing Read Only Computer Care Network Congestion Bandwidth Office Tips The Internet of Things Fleet Tracking Backup G Suite Virtual Desktop Managed Services Provider Cables MSP Superfish Electronic Health Records Mobile Device OneNote Firewall Instant Messaging Presentation Maintenance Google Wallet Data Breach Microsoft Excel IT Technicians Conferencing Computing Hotspot Company Culture Ransomware Administrator Favorites Retail BDR SaaS Operating System Computing Infrastructure Storage Unified Threat Management Cost Management Consumers Unified Threat Management Cybersecurity Users Networking Gadgets Software as a Service Smart Tech Authorization VoIP

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code