Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How the IoT Can Be a Security Risk

How the IoT Can Be a Security Risk

The Internet of Things means a lot more than just enhanced connectivity. In particular, you’ll have a considerable security risk associated with the Internet of Things. It’s clear that the more devices accessing a network, the more risk will be associated with that network, which is where the inherent risk of the Internet of Things comes into play. How can you control the number of devices accessing your network, and thus secure your business from the Internet of Things?

Continue reading
0 Comments

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Public Cloud Tech Terms Company Culture RMM Holiday Budget Save Time Windows Typing Productivity Windows 8 Cyberattacks Alert Software PDF Google Calendar IT Support Uninterrupted Power Supply Innovation Customer Relationship Management 3D Printing Identity Theft Statistics How To Government Server Management Dark Data Crowdsourcing WPA3 Data Security Enterprise Resource Planning Passwords Mobile Data Social Networking Quick Tips G Suite Gadget Bring Your Own Device End of Support Vendor Management Social Engineering Politics Tip of the Week Tablet Deep Learning Modem Managed Service Corporate Profile Wires Collaboration VoIP Consulting Virtual Assistant Shortcut Help Desk Miscellaneous Cybersecurity Word Black Market Hard Disk Drive Geography Address Specifications Machine Learning Screen Reader File Sharing Bookmarks Disaster Efficiency Nanotechnology High-Speed Internet Cooperation Telephone Systems Troubleshooting Cookies Social Internet Exlporer PowerPoint Hard Drives IBM Regulations Proactive Entrepreneur Vulnerabilities Trending Legislation Chrome CIO Recycling BDR Halloween Google Docs Compliance Sports IT Management Big Data Running Cable Dark Web User Taxes Files Data Backup IT service Fleet Tracking Network Congestion Content Filtering Twitter Managed IT Service Avoiding Downtime Physical Security Notes Windows 10 Remote Computing Supercomputer Wireless Technology Authentication Comparison Private Cloud iPhone IP Address Unified Threat Management Emoji Permissions Time Management Downtime Retail Business Computing Cameras Presentation Smart Tech Analytics Smart Technology Backup Identities Hotspot Administrator Computer Care Distributed Denial of Service Refrigeration Mobile Device Management Consumers The Internet of Things Data Management Lithium-ion Battery Augmented Reality Antivirus Motion Sickness Internet Employer-Employee Relationship Google Maps Windows 10 Management 5G Hackers Hiring/Firing Upgrade Computer Repair Cache Unsupported Software Finance Financial Personal Information Disaster Recovery Operations Mobile Devices Scam Disaster Resistance Webcam Analyitcs Break Fix Settings Techology Cybercrime Customer Service Virtualization Going Green IT Support communications WiFi Saving Money Security Document Management Website Business Growth Motherboard IoT Current Events Remote Worker Mobile Device Managment Mobile Business Wasting Time Monitoring Risk Management Websites Business Management Mobile Security Public Speaking Voice over Internet Protocol Windows 7 Office Consultation Employee-Employer Relationship Hacks Networking Notifications Saving Time OneNote Staff Language ROI Mail Merge Small Business Star Wars Hacking Heating/Cooling Chromebook Flexibility Co-managed IT Smartphones History Vulnerability Features Phone System Knowledge Remote Monitoring Drones Hardware Human Error Zero-Day Threat Digital Instant Messaging Tech Term Piracy Remote Monitoring and Management Programming Save Money SharePoint Connectivity Printer Fraud Microsoft Training Managed IT Utility Computing Tracking Technology Tips IT Budget Business Owner Legal Solid State Drive Spyware Digital Signature Ransomware CCTV Web Server Robot HIPAA Hosted Solution Gadgets Apps Processors Sync Administration Update Maintenance Authorization Privacy VPN Network Security Data loss Tech Support Mobile Device Google Drive Network Management Google Wallet Security Cameras Professional Services Technology Laws Automobile Employees Cost Management Printing Permission Competition Laptop Outsourced IT Marketing Hacker Scary Stories Wearable Technology Relocation Hard Drive Mobile Office Electronic Medical Records Search Productivity IT Services Two-factor Authentication MSP Documents Touchscreen Computing Firewall Cyber Monday User Tips Mobile Computing Bluetooth Firefox Technology Facebook Information Workplace Tips Computing Infrastructure Office Tips Test Encryption Managed IT Services Backup and Disaster Recovery Managed Service Provider Network Upgrades Virus Law Enforcement Storage Safety Information Technology Cryptocurrency Operating System Tip of the week Best Practice How To Alerts Money Email Humor Recovery Spam Writing Undo Environment Business Intelligence Data Artificial Intelligence USB Social Media Data Breach Server Business Continuity Virtual Desktop Education Microsoft Office BYOD Database Work/Life Balance Patch Management Blockchain Display Apple Intranet Computers Data Recovery IT solutions Bandwidth Office 365 Conferencing Data Warehousing Microsoft Excel Wireless Assessment Router User Error Favorites IT Technicians Experience Servers Hosted Solutions Mouse Remote Workers WannaCry eWaste Travel Cortana Multi-Factor Security Health Access Control Gmail Meetings Virtual Private Network IT Consulting Unified Communications Development Buisness Point of Sale SaaS Net Neutrality Virtual Reality Project Management Applications Samsung Cabling Digital Payment Procurement VoIP Identity Backups Mirgation Android Browser App Business Technology Electronic Health Records Smartphone Communication Domains GPS Asset Tracking Alt Codes Google Users Infrastructure Fun Lenovo Botnet Internet of Things Best Practices Phishing Downloads IT Consultant Staffing Cleaning Read Only Mobility Black Friday Managed IT services Enterprise Content Management Malware Theft E-Commerce Automation Computer Bitcoin Redundancy Wi-Fi Cloud Computing Application Error YouTube Software as a Service Unified Threat Management Software Tips Chatbots Managing Stress Superfish Data storage Healthcare Monitors Licensing Paperless Office LiFi Password Cables Proactive IT Telephony Managed Services Provider Outlook Cloud Migration

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code