Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

WARNING: A New Zero-Day Threat is On the Loose

WARNING: A New Zero-Day Threat is On the Loose

Zero-day threats are some of the most dangerous ones out there. What we mean by “zero day” threats are those that have been discovered by hackers before an official patch has been released by the developers, giving them exactly zero days before they are actively exploited in the wild. One of the more dangerous zero-day threats out there at the moment is one that takes advantage of Internet Explorer.

Continue reading

Where the Internet Stands in 2018

Where the Internet Stands in 2018

People spend a lot of money on the Internet. From an individual standpoint, the amount the average person spends on Internet-based services is their largest expense outside of the money they spend on their residence, and perhaps their transportation costs. In order to understand the landscape of what is effectively a battle for Internet supremacy, you first have to take a look at the battlefield itself.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Telephony Hosted Solution Mobile Devices Theft Conferencing Corporate Profile Managed Service Cybercrime Update Operations Sync Motion Sickness Windows 8 Unified Threat Management Virtual Desktop Data storage Data Management 5G OneNote ROI Vulnerability Deep Learning Vendor Management Permission Two-factor Authentication Business Management Current Events WannaCry Politics Applications Solid State Drive Scary Stories Cryptocurrency Authentication IT Consulting Recovery Mobile Device Management Break Fix Microsoft Office Star Wars Bluetooth Tech Terms Saving Money File Sharing Money Google Troubleshooting Redundancy Meetings IT Budget E-Commerce Printer Business Continuity Managed IT services Tech Support Development User Tips Business Mobile Financial Maintenance End of Support Google Calendar Office Tips Distributed Denial of Service Android Upgrade Alerts VoIP Connectivity Bandwidth Intranet Best Practice Virus Computer Repair Going Green Mail Merge RMM Phone System Fleet Tracking Software as a Service Cables Budget Samsung IT Support Disaster Recovery Hiring/Firing Retail IBM Administrator LiFi Government Electronic Medical Records Cortana Crowdsourcing Remote Monitoring and Management Halloween IT Consultant Paperless Office Cameras Net Neutrality Processors Employer-Employee Relationship Flexibility Specifications Licensing Application Botnet Internet Exlporer Mobile Computing Relocation Antivirus Apps Proactive Spyware Data Security Backups Social Wi-Fi Wireless Mobile Device Managment Modem Facebook Innovation Data Warehousing Health Dark Data Cache Data Managed Service Provider Wireless Technology Environment The Internet of Things History Laptop Access Control Google Maps Security Firefox Unified Threat Management Compliance PDF Augmented Reality Tip of the Week Dark Web Identity Theft Recycling Shortcut Computer Lithium-ion Battery Save Time Experience SaaS Hotspot Unified Communications Hard Drives Documents Windows Proactive IT Security Cameras VPN Encryption Buisness Google Docs Business Owner Cooperation Backup and Disaster Recovery Network Management Webcam Domains WiFi Downtime Fraud BYOD Employees Wearable Technology BDR Assessment Disaster Resistance Gadget GPS Authorization How To Presentation Social Networking Programming Smartphone Permissions IT Services Supercomputer Windows 10 Work/Life Balance Vulnerabilities Data Backup Business Growth Utility Computing Email Mouse Managed IT Services Digital Payment Analytics Google Drive Read Only Outlook Router Language Smart Technology Cleaning Productivity Piracy VoIP Motherboard Chatbots Hacking Education Screen Reader Identity Server Management Migration App Enterprise Resource Planning Spam Software Cloud Computing Public Speaking Private Cloud Digital Network Congestion Mobile Device CIO Efficiency Travel MSP Avoiding Downtime Physical Security Robot Remote Monitoring Legal Point of Sale Administration Heating/Cooling Law Enforcement IT Support Patch Management Miscellaneous Monitoring Mirgation Public Cloud Mobility IT service Browser Managed Services Provider Phishing Staff Document Management Workplace Tips Big Data Blockchain Disaster Project Management Managing Stress Training Upgrades Downloads Automation Internet Hard Drive User Error Multi-Factor Security Chrome Human Error Undo Remote Computing Hacks Alt Codes Server Geography Entrepreneur Consulting Time Management Data Recovery Automobile Passwords Internet of Things Business Computing Fun Saving Time Mobile Security Notifications Content Filtering IT solutions Tech Term Technology Tips Emoji Customer Service Cost Management Social Media Best Practices Website Business Intelligence Ransomware Cloud Windows 10 Holiday Company Culture Risk Management Writing Electronic Health Records Managed IT Service Personal Information Error Digital Signature Uninterrupted Power Supply How To Data Breach Web Server Cyber Monday Networking Alert Regulations Touchscreen High-Speed Internet Search Virtual Reality eWaste communications Firewall Consumers IP Address Hacker Computing Infrastructure Features Drones Finance Mobile Data Legislation Bitcoin Office 365 Apple Help Desk Techology Monitors Software Tips HIPAA Identities Superfish Display Statistics Servers Tracking Websites Competition Hard Disk Drive Data loss Bring Your Own Device IT Technicians Tip of the week Favorites Files Remote Worker Black Friday Nanotechnology iPhone Artificial Intelligence Zero-Day Threat Humor Enterprise Content Management Machine Learning SharePoint Knowledge Infrastructure Taxes Operating System Communication Wires WPA3 Managed IT Microsoft Bookmarks Outsourced IT Technology Password Trending Customer Relationship Management Black Market Healthcare Privacy Storage Gadgets Chromebook Asset Tracking Microsoft Excel Malware Running Cable Telephone Systems G Suite USB Hardware Hosted Solutions Computer Care Tablet Computers Unsupported Software Quick Tips Staffing Consultation Refrigeration Save Money Backup Smart Tech Users Procurement Gmail Collaboration Cybersecurity Sports Computing User Remote Workers Smartphones YouTube Information Settings Safety Employee-Employer Relationship Scam Typing Google Wallet Twitter Technology Laws Cookies Small Business Address Management Printing Mobile Office Instant Messaging Marketing Virtual Private Network Word Information Technology IoT Co-managed IT PowerPoint Lenovo 3D Printing Productivity CCTV Test Virtualization Comparison Hackers Analyitcs Network Network Security Cabling Cyberattacks Social Engineering Office Business Technology IT Management

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...