Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How the IoT Can Be a Security Risk

How the IoT Can Be a Security Risk

The Internet of Things means a lot more than just enhanced connectivity. In particular, you’ll have a considerable security risk associated with the Internet of Things. It’s clear that the more devices accessing a network, the more risk will be associated with that network, which is where the inherent risk of the Internet of Things comes into play. How can you control the number of devices accessing your network, and thus secure your business from the Internet of Things?

Continue reading
0 Comments

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Legal Remote Computing Taxes Zero-Day Threat Apple IT Technicians Recovery Data Breach Managed Service Provider Screen Reader Point of Sale Information Technology Applications IT Support Managed IT Business Upgrade Gadget Productivity Hard Drive Troubleshooting Corporate Profile Training Flexibility Business Intelligence User Error Operations User Tips Information How To Employees Quick Tips Managed IT Services SharePoint Intranet Touchscreen Cyber Monday Tech Support Hacks Remote Worker Scam Downloads Ransomware Black Friday Deep Learning Tech Terms Miscellaneous Wearable Technology Outlook Monitoring Small Business Tech Term Environment Cookies Bookmarks BYOD Human Error Unsupported Software Cloud Computing Risk Management Printer E-Commerce Alt Codes Android Technology Tips Experience Virtual Desktop Geography Managing Stress Employee-Employer Relationship Processors Administration Google Calendar Cybersecurity Business Owner IT Budget Authorization Budget Financial Presentation Test YouTube SaaS Data Management Knowledge Permission Passwords Patch Management Mobility Virtual Reality Chrome Cyberattacks Social Document Management Network Security Superfish Private Cloud Running Cable Consumers Cache Cloud Authentication Personal Information Networking The Internet of Things Virus Word Identity Conferencing Safety G Suite Mobile Tip of the Week Infrastructure Computers GPS Paperless Office Finance Wires Save Money WPA3 Cleaning VPN Vulnerabilities BDR Business Growth Telephone Systems Search Phone System Two-factor Authentication IT Services Legislation Outsourced IT Health Meetings Software Gmail Analyitcs Cooperation Error Bandwidth Co-managed IT Bluetooth Read Only Disaster Resistance Spam Programming Internet Scary Stories Drones Data Security Sync Botnet IoT Storage Social Engineering Dark Data Customer Service Motherboard Data Warehousing Unified Threat Management Smartphones Hackers Language Google Wallet End of Support Operating System eWaste Mobile Device Management Data loss Network Congestion Healthcare Downtime Solid State Drive Regulations Saving Money Hardware Email Procurement Phishing Data storage Money Firewall Privacy Computing Staffing Customer Relationship Management Server Digital Microsoft Office Bitcoin Sports Motion Sickness Google Maps Alerts Application Comparison Gadgets Robot Mobile Data Work/Life Balance Avoiding Downtime Access Control Identities Time Management Net Neutrality Politics Printing Big Data Automobile Smart Technology Hard Disk Drive IBM PDF Alert File Sharing Hosted Solutions Staff Help Desk Physical Security Redundancy Monitors Malware Vendor Management IT Support High-Speed Internet Employer-Employee Relationship Tablet Techology Blockchain communications IT Consulting Entrepreneur Innovation Windows 8 Features Mobile Device Development PowerPoint Cybercrime Cables Fraud LiFi Virtualization Crowdsourcing Encryption Electronic Medical Records Google Docs IP Address VoIP Security Cameras Cameras Wireless Typing Multi-Factor Security IT Consultant Google Drive Retail Remote Monitoring and Management Enterprise Content Management 3D Printing Password Connectivity Cost Management HIPAA Saving Time Backup and Disaster Recovery Machine Learning Users Law Enforcement Lithium-ion Battery Samsung Windows 10 Server Management Compliance Proactive Social Media Backups Digital Signature CIO Address Software Tips Disaster USB Best Practices Notifications Hiring/Firing Writing Network Management Unified Communications Office Data Distributed Denial of Service App Antivirus Backup How To Chatbots Microsoft Shortcut RMM Cortana Automation Halloween Trending Assessment Hacker Hotspot Modem Lenovo Managed Service Public Cloud Firefox Website Workplace Tips Tip of the week Mouse Piracy Analytics Relocation Management MSP Twitter Unified Threat Management Digital Payment Public Speaking Dark Web Migration WannaCry Hosted Solution Cryptocurrency Travel Security Licensing Mirgation Tracking VoIP IT service Windows 10 Black Market Webcam Internet of Things Recycling Chromebook Uninterrupted Power Supply Buisness Supercomputer Business Continuity Remote Monitoring Update Break Fix Hacking Office 365 Data Recovery Augmented Reality WiFi Theft Laptop Spyware Computer 5G Utility Computing Nanotechnology Efficiency User Save Time Marketing Domains Files Holiday Mobile Devices Browser Router Smart Tech Business Technology Identity Theft Refrigeration OneNote Managed IT services ROI Technology Laws Managed IT Service Administrator Technology Virtual Private Network Mail Merge Wi-Fi Mobile Security Education Consultation Mobile Computing Content Filtering Best Practice Apps Maintenance Websites Business Management Statistics Display Vulnerability Heating/Cooling Collaboration Specifications Asset Tracking Google Consulting Servers Communication Competition Facebook Documents Disaster Recovery Electronic Health Records Social Networking Fun Productivity History iPhone Current Events Windows Upgrades Microsoft Excel Cabling Mobile Device Managment Network Software as a Service Computer Care Instant Messaging Fleet Tracking Enterprise Resource Planning Computing Infrastructure Computer Repair Data Backup Company Culture Permissions Business Computing Government IT solutions Bring Your Own Device Humor Mobile Office Managed Services Provider Going Green Project Management Remote Workers Internet Exlporer Favorites Settings Undo IT Management Hard Drives Telephony Star Wars Proactive IT Office Tips Wireless Technology Smartphone CCTV Emoji Artificial Intelligence Web Server

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code