Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can the Government Really Stop People From Sharing Netflix Passwords?

Can the Government Really Stop People From Sharing Netflix Passwords?

Do you loan out your Netflix password to friends so that they can catch up on their favorite shows? If so, you’re in violation of a recent federal court ruling, which declares that sharing a password of any kind is now a federal offense. So, if you plan on watching the new Netflix original series Stranger Things, you may want to reconsider how you plan to do so.

Continue reading
0 Comments

Is Apple in the Right to Refuse the FBI?

b2ap3_thumbnail_fbi_vs_privacy_400.jpgApple has been a major contributor to advancements in computing over the past few decades. Their iPhone was the first commercially available smartphone, and they continue to innovate with new and exciting consumer technology. However, one of Apple’s most recent decisions might be one of the most important for today’s cyber security world.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Programming Data Backup Laptop Supercomputer IT Consulting Big Data Social Media Cost Management Motion Sickness Halloween Fun Cleaning Vulnerabilities Data storage Files Holiday Risk Management Best Practices Phishing Distributed Denial of Service Employee-Employer Relationship Windows Applications Co-managed IT Lenovo Proactive Efficiency Hard Drives Remote Monitoring and Management Retail LiFi Hiring/Firing Content Filtering Asset Tracking Business Technology IT Management Managing Stress Identity Black Friday Public Speaking Hackers Knowledge Gmail Telephone Systems Refrigeration How To Unsupported Software Network Digital Signature Display Telephony Patch Management CCTV Conferencing Writing Update Google Drive Trending Authentication Printer Administration Processors Business Growth Server Management Hard Disk Drive Windows 8 Save Money Notes Internet Managed IT services Google Maps Going Green Remote Worker Virtualization Competition Consumers Drones Data Warehousing Smart Technology Motherboard Mobile Device Management Help Desk Facebook End of Support Small Business Healthcare Gadget Data Quick Tips Fraud Computers High-Speed Internet Black Market Collaboration Safety Backup and Disaster Recovery G Suite Alt Codes Features Shortcut Antivirus Storage Cooperation Software Tips Cables Error Office Tips Upgrade Backups Management 3D Printing Cyberattacks Alerts Company Culture Analytics Business Continuity Development Bookmarks Law Enforcement Financial Business Computing Assessment Encryption Blockchain Technology Laws Software Productivity Private Cloud Regulations IT Budget Analyitcs Managed Services Provider Read Only Computing Social Engineering Deep Learning Instant Messaging Hardware Mobility Disaster Mobile Device Database CIO Software as a Service RMM Cloud Computing Chrome Cybercrime Samsung Google Calendar Staff Vulnerability Corporate Profile Remote Workers Application Dark Data Robot Tip of the week Staffing Managed IT Service Microsoft Excel Cache Hard Drive Saving Time Electronic Health Records MSP Business IT Technicians YouTube Access Control Virtual Desktop Finance Mobile Security Chatbots Scary Stories Work/Life Balance Settings WPA3 Tablet Firewall Unified Threat Management Mouse eWaste Cameras IT service Microsoft Twitter Identities Malware Hosted Solution SaaS Mobile Cyber Monday Website Test Buisness Wasting Time Entrepreneur Data loss Apple Unified Threat Management Windows 10 Hacking Superfish Consultation Travel Windows 10 Authorization Machine Learning Smartphones Hacker Internet Exlporer Bluetooth E-Commerce Mobile Devices Relocation Hosted Solutions Augmented Reality Health Wi-Fi Websites Data Recovery App Redundancy Password Android Saving Money Favorites Smart Tech Virtual Assistant Utility Computing Zero-Day Threat Hacks Business Owner Wires Technology Tips Techology Ransomware IT Consultant iPhone Miscellaneous User Sports Monitors PowerPoint Customer Service BYOD IT solutions Theft Money Webcam Mobile Data Gadgets Innovation Recovery Voice over Internet Protocol Tech Support Web Server VPN Word Upgrades Networking Crowdsourcing Meetings Disaster Resistance Experience Time Management Passwords Operations Public Cloud Proactive IT Sync Business Management File Sharing Lithium-ion Battery Disaster Recovery The Internet of Things Enterprise Resource Planning Government User Error Search Managed Service Provider Recycling Modem Botnet Connectivity BDR Humor Physical Security Unified Communications Spyware GPS Emoji Multi-Factor Security Best Practice Virus Employees Downloads Digital Infrastructure Legal Employer-Employee Relationship Fleet Tracking Network Security Tech Term Monitoring Servers Wearable Technology Network Congestion Document Management Social Networking Intranet Information IT Services Break Fix Save Time Security Statistics Automobile Digital Payment Virtual Private Network Wireless Training Mobile Computing Technology Bring Your Own Device Data Management WiFi Point of Sale Spam Heating/Cooling Taxes Communication ROI Compliance Marketing Google Computer Repair Managed IT Firefox Consulting Permission Human Error IP Address Email Cortana IT Support Mobile Office Privacy Mail Merge IT Support Star Wars Social Office Computer How To Administrator Google Docs Printing VoIP Internet of Things Productivity PDF Information Technology Solid State Drive Troubleshooting Presentation Two-factor Authentication Cryptocurrency Dark Web Office 365 Alert OneNote Domains Chromebook Data Breach Security Cameras Uninterrupted Power Supply Artificial Intelligence HIPAA Tip of the Week Screen Reader Documents Identity Theft USB Browser Operating System Education Comparison Downtime WannaCry Tech Terms Politics Managed Service Procurement Avoiding Downtime Maintenance Router User Tips Vendor Management Hotspot Wireless Technology Permissions Virtual Reality Cybersecurity Nanotechnology Flexibility Remote Monitoring 5G Apps Managed IT Services Outlook Budget Remote Computing Project Management Notifications Licensing Enterprise Content Management IBM Address Cabling History Mirgation Server Undo Users Customer Relationship Management communications Specifications Windows 7 Net Neutrality Computer Care Outsourced IT Tracking Legislation Smartphone Automation Bandwidth Computing Infrastructure Scam Geography Professional Services Cloud Workplace Tips Migration Electronic Medical Records SharePoint Data Security Business Intelligence Touchscreen Microsoft Office VoIP Piracy Running Cable Language Current Events Backup Phone System Google Wallet Bitcoin Personal Information IoT Network Management Mobile Device Managment Environment Cookies Paperless Office Typing

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code