Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can the Government Really Stop People From Sharing Netflix Passwords?

Can the Government Really Stop People From Sharing Netflix Passwords?

Do you loan out your Netflix password to friends so that they can catch up on their favorite shows? If so, you’re in violation of a recent federal court ruling, which declares that sharing a password of any kind is now a federal offense. So, if you plan on watching the new Netflix original series Stranger Things, you may want to reconsider how you plan to do so.

Continue reading

Is Apple in the Right to Refuse the FBI?

b2ap3_thumbnail_fbi_vs_privacy_400.jpgApple has been a major contributor to advancements in computing over the past few decades. Their iPhone was the first commercially available smartphone, and they continue to innovate with new and exciting consumer technology. However, one of Apple’s most recent decisions might be one of the most important for today’s cyber security world.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Infrastructure Unified Threat Management GPS Environment Deep Learning Display Law Enforcement VPN Big Data Utility Computing Domains Google Consultation Network Alt Codes Language Mobility Uninterrupted Power Supply Recycling Employee-Employer Relationship 3D Printing Cleaning Bandwidth Tech Term Data Security Settings Help Desk E-Commerce Human Error Tracking Password Gadgets Technology Internet Exlporer Save Money Artificial Intelligence Social Electronic Medical Records IT solutions Server Management communications Unified Threat Management Printer Unified Communications Data Cybersecurity Electronic Health Records Solid State Drive Wires Antivirus eWaste Typing WPA3 Samsung Going Green Mobile Computing Internet Patch Management ROI Sync Virtual Desktop Vulnerability Superfish Webcam Disaster Resistance Piracy Microsoft Excel BDR Cortana Software Tips Digital Comparison Cyberattacks Automation Network Congestion Halloween Remote Worker Fraud Malware Productivity IBM Information Cloud Operating System User Error Finance Firefox Application Emoji Dark Web Relocation Bookmarks Virus Writing Save Time Website Budget Business Technology Hosted Solutions Competition Google Docs Telephony Black Friday Windows 10 Tip of the Week Management Upgrades YouTube Remote Monitoring and Management Black Market Heating/Cooling Machine Learning Managed IT Services Recovery Public Speaking Productivity Mirgation Meetings Encryption Modem Windows 8 Apps Fleet Tracking Computing Proactive IT Nanotechnology Running Cable Statistics IT Services Cloud Computing Fun Search Shortcut Managed Services Provider Virtual Reality Hacks Business Management Tip of the week Public Cloud SharePoint Mouse Content Filtering Internet of Things Break Fix IT Budget Touchscreen Router Knowledge How To Net Neutrality Software File Sharing Telephone Systems Customer Service Business Maintenance Procurement Marketing Windows Smart Technology Monitors Enterprise Resource Planning Wi-Fi Google Maps Entrepreneur Data Breach Bitcoin Android Managed Service Business Owner Retail Saving Time Best Practices Computer Licensing Google Wallet Microsoft Office Mobile Device Managment CCTV Drones Hotspot Motion Sickness IT Management Update Favorites Regulations Digital Signature Instant Messaging Remote Computing Hard Drives Upgrade Smartphones Best Practice Staffing Bluetooth CIO Taxes Star Wars Cryptocurrency Hardware How To SaaS Time Management Authentication Cabling Identities Read Only Personal Information Current Events Hosted Solution OneNote Intranet Network Security Point of Sale Office 365 Innovation Facebook Unsupported Software Employees Social Media Network Management Conferencing Alerts Wearable Technology Data Recovery Computers Legal Managed Service Provider Remote Monitoring G Suite Data Management VoIP Remote Workers Lithium-ion Battery Windows 10 Tech Support Google Drive Corporate Profile Assessment Documents Security Cameras Chatbots Office Tips Websites Permissions Backups Administrator User Tips Programming Workplace Tips Notifications Computer Repair Cameras Processors Cache Ransomware Two-factor Authentication Saving Money Connectivity Analyitcs Sports Networking Mobile Devices Applications The Internet of Things Paperless Office Firewall Techology Compliance IT Consulting Files Education 5G High-Speed Internet Address Training Users Outsourced IT Cybercrime Information Technology Scam Screen Reader Tech Terms Project Management HIPAA Employer-Employee Relationship Downloads IT service Printing IT Support Travel Customer Relationship Management Holiday Consulting Business Continuity Passwords Laptop Mobile Device Presentation MSP Avoiding Downtime Identity Theft Consumers Managed IT services Financial Mobile Security Co-managed IT Smartphone Access Control Refrigeration Features iPhone IoT Technology Laws Mobile Bring Your Own Device Company Culture VoIP Buisness Office Communication Distributed Denial of Service RMM Smart Tech Data Backup Troubleshooting Staff PowerPoint Undo Asset Tracking Gmail Spyware Computing Infrastructure Monitoring Risk Management Efficiency Email History Experience Safety Hard Disk Drive Alert LiFi Storage Business Intelligence Mobile Device Management Servers Operations Crowdsourcing Technology Tips Web Server App Dark Data Mobile Data Spam Document Management Development Scary Stories Mobile Office USB Money BYOD Social Engineering Apple Business Computing Flexibility Hard Drive Data storage Gadget Microsoft Authorization Security Enterprise Content Management End of Support Chromebook Vendor Management Collaboration Wireless Automobile Cyber Monday Hiring/Firing PDF IP Address Lenovo Virtual Private Network Data Warehousing Error Vulnerabilities Work/Life Balance Hacker Disaster Hackers Virtualization Healthcare Humor Computer Care User Zero-Day Threat Politics Browser Twitter Outlook Business Growth Private Cloud Blockchain Data loss Phone System Hacking Permission Theft Multi-Factor Security Migration Privacy Administration Google Calendar Wireless Technology Supercomputer IT Consultant Cookies Social Networking Phishing Managed IT Health Motherboard Managed IT Service Proactive Government Downtime WiFi Backup Mail Merge Small Business Legislation Identity IT Technicians Disaster Recovery Physical Security Backup and Disaster Recovery Trending Managing Stress Software as a Service Word Cooperation Cables Tablet Cost Management Botnet Redundancy Robot Digital Payment IT Support WannaCry Quick Tips Augmented Reality Chrome Specifications Test Analytics Geography Server Miscellaneous

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...