Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

WARNING: A New Zero-Day Threat is On the Loose

WARNING: A New Zero-Day Threat is On the Loose

Zero-day threats are some of the most dangerous ones out there. What we mean by “zero day” threats are those that have been discovered by hackers before an official patch has been released by the developers, giving them exactly zero days before they are actively exploited in the wild. One of the more dangerous zero-day threats out there at the moment is one that takes advantage of Internet Explorer.

Continue reading

Where the Internet Stands in 2018

Where the Internet Stands in 2018

People spend a lot of money on the Internet. From an individual standpoint, the amount the average person spends on Internet-based services is their largest expense outside of the money they spend on their residence, and perhaps their transportation costs. In order to understand the landscape of what is effectively a battle for Internet supremacy, you first have to take a look at the battlefield itself.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Drones Windows Business Management Blockchain User Tips Productivity Applications Company Culture Tracking Botnet Virtual Assistant Processors Analytics WannaCry Bandwidth Cloud Computing Paperless Office End of Support Remote Computing Mail Merge Outsourced IT Google Apple Mobile History Mouse Administrator Fleet Tracking Workplace Tips Law Enforcement The Internet of Things Black Market Display Smartphone Social Engineering Android Network Management Error E-Commerce Wi-Fi Cookies Motion Sickness Entrepreneur Superfish Wires Remote Worker IT Management Users Sync Competition Employees Business Growth Printer CCTV IP Address Laptop Cortana Spyware Computers Business Technology Redundancy Gmail Mobile Security Cyber Monday Hacker eWaste Virus Twitter Tip of the week Recycling Bring Your Own Device Employee-Employer Relationship Phishing Cleaning Managed Service Provider Samsung Cloud Connectivity Knowledge Save Money Black Friday VoIP Mobility Net Neutrality Innovation Alert Screen Reader Hard Drive IT Support Buisness Office Software Tips Project Management Google Maps Augmented Reality Robot Business Intelligence Google Wallet Tip of the Week Proactive Ransomware File Sharing Voice over Internet Protocol iPhone Miscellaneous IT Budget Downtime Managed IT services Enterprise Resource Planning Managed IT Service Computer Care Saving Time Mobile Device Management Business Cost Management Printing Modem Save Time Chromebook Statistics Infrastructure Humor Email Development Going Green Notifications Alt Codes Virtual Reality Geography Technology Permission Bitcoin Small Business Crowdsourcing Gadgets Upgrade Holiday Cooperation Touchscreen communications Data How To Operations Unified Threat Management Public Cloud Regulations Hosted Solutions Data Backup Domains Flexibility Automation Social Networking Managed IT Managed Services Provider Tablet Retail Chrome Data Recovery Backups Meetings Hosted Solution Data Breach Vulnerabilities Telephony Computing Infrastructure OneNote Mobile Data Wireless Technology Wearable Technology VoIP Time Management Uninterrupted Power Supply Human Error Fraud Big Data Dark Web Trending Document Management Customer Relationship Management Backup and Disaster Recovery Hackers Monitoring Cybercrime Cameras Microsoft Collaboration Microsoft Excel IBM LiFi IT Technicians Business Continuity Assessment WiFi Asset Tracking Consumers Spam Instant Messaging App Hardware Read Only Consultation Recovery Technology Tips Employer-Employee Relationship Information Management Dark Data HIPAA Risk Management 3D Printing Programming Customer Service Motherboard Cyberattacks IT Consulting Identities Google Drive G Suite Shortcut Refrigeration Bluetooth Virtual Desktop Virtualization Scary Stories Finance Comparison Staff Computer Repair Passwords Procurement Work/Life Balance Electronic Health Records Travel Mobile Devices Network Congestion Wasting Time Tech Support Data loss Cybersecurity Best Practices Monitors Mobile Device Efficiency Money Disaster Resistance Proactive IT Office Tips Solid State Drive Staffing Features Hacking Machine Learning Network Deep Learning Hard Drives Typing Patch Management Data storage Hard Disk Drive Private Cloud User Error Presentation Best Practice Social Notes Windows 10 Legal Experience 5G Phone System Utility Computing Authorization Enterprise Content Management Upgrades Network Security Social Media Fun Remote Monitoring Smartphones Application High-Speed Internet Google Calendar Servers Avoiding Downtime Intranet Gadget Writing Business Computing Emoji Mobile Computing Software Firefox Data Warehousing Zero-Day Threat Automobile Internet of Things Quick Tips Cabling Supercomputer Office 365 Antivirus Tech Term Conferencing Current Events Business Owner Address Bookmarks Telephone Systems MSP SharePoint Windows 7 Politics Server Management Personal Information Documents Unified Communications Star Wars Smart Tech Techology Corporate Profile Two-factor Authentication Safety Halloween Unsupported Software Taxes IoT User Wireless Lithium-ion Battery Education Hotspot Microsoft Office Healthcare Relocation Vulnerability ROI Networking Public Speaking Environment Files Browser Troubleshooting Specifications BYOD Database Scam Remote Workers Backup Productivity Apps YouTube PowerPoint Hacks Digital Signature Data Management Budget Security Cameras Facebook Storage IT service Financial Help Desk Cables IT Support Theft Technology Laws IT Consultant Compliance Multi-Factor Security Mobile Office Access Control Identity Running Cable Website Remote Monitoring and Management Government SaaS Training BDR Identity Theft Permissions Downloads Outlook Heating/Cooling Nanotechnology PDF Tech Terms Piracy Password WPA3 Point of Sale Digital Web Server Router Webcam How To Sports Hiring/Firing Software as a Service Legislation Internet Exlporer Health Managed Service Encryption Authentication Google Docs Security Break Fix Windows 10 Websites Vendor Management Co-managed IT Internet Licensing Distributed Denial of Service Consulting Mirgation Windows 8 Information Technology Maintenance Saving Money Computer Disaster Recovery Search Lenovo Operating System Favorites Analyitcs IT Services Content Filtering Digital Payment Word Smart Technology Malware GPS Server Unified Threat Management Virtual Private Network Professional Services Administration Disaster Chatbots Managing Stress Artificial Intelligence Migration Cache USB IT solutions Undo VPN Computing Test Communication Update CIO Settings Firewall Marketing Privacy RMM Cryptocurrency Physical Security Managed IT Services Data Security Alerts Language Electronic Medical Records Mobile Device Managment

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...