Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Could Your Favorite App Infect Your Device?

Could Your Favorite App Infect Your Device?

When considering solutions to help ensure your business’ IT security, mobile devices often go overlooked. This makes sense--for most of the time the telephone has existed, it has been attached to a wall, only capable of transmitting sound. However, with phones now being palm-sized computers that we carry in our pockets, keeping them safe from cyberthreats has a new importance.

Continue reading

Mobile Security Showdown: Cellular Network vs. Wi-Fi

Mobile Security Showdown: Cellular Network vs. Wi-Fi

Today’s business relies on mobile devices, like smartphones, to guide them to productivity and efficiency. In fact, the vast majority of people in today’s society own a smartphone. A report shows that 90 percent of people younger than 30 own a smartphone, which means that the forward-thinking business hiring talented millennials may want to start thinking about how to secure any mobile devices that they use to access company data.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Buisness How To Mobile Device Managment Search Solid State Drive Migration Apps Internet of Things Proactive Telephony IP Address Saving Time Website Running Cable Help Desk Hosted Solution Content Filtering Computer Lenovo Files User Error Managing Stress Mobile Office Google Drive Hard Disk Drive Identity Theft Enterprise Resource Planning Email Flexibility Mobile Printer Staffing Cache Competition Licensing Monitoring Facebook Black Market VoIP Environment Social Nanotechnology Unified Threat Management Patch Management User Mobile Security Google Managed IT Services Staff RMM Unsupported Software Programming Automation Virtual Private Network Management Productivity Communication IT Consulting Computer Repair Avoiding Downtime Downloads Heating/Cooling Remote Monitoring Electronic Health Records Gadget IT solutions Lithium-ion Battery Deep Learning Data Recovery Motherboard Refrigeration Encryption Co-managed IT Bookmarks Authorization Internet Net Neutrality Test Cyberattacks Mobile Data Permissions Marketing HIPAA Human Error Employer-Employee Relationship IoT Web Server Mobile Device High-Speed Internet Knowledge Google Wallet Windows 8 Alert Features Cybercrime Two-factor Authentication Tracking Disaster Recovery Taxes Wireless Corporate Profile Technology Innovation Scam Disaster Resistance Software as a Service IT Support Data Government Fun Asset Tracking Twitter YouTube Office 365 Software Tips communications Remote Monitoring and Management Cables SaaS Applications Mail Merge Smart Tech Data Management App Employee-Employer Relationship Smart Technology Windows 10 Wearable Technology Cryptocurrency User Tips Printing Dark Web Hard Drive Consultation Computer Care Saving Money LiFi Humor Business Growth Entrepreneur Google Maps Writing Assessment Processors IT Management Big Data Redundancy Servers Robot Alerts Vendor Management Typing Network Error Settings Small Business Sync Collaboration Education Productivity Halloween Laptop Black Friday Risk Management eWaste Scary Stories Display Social Networking Emoji Backup Data Security WiFi Unified Threat Management Business Management Distributed Denial of Service Safety Compliance Connectivity Identities Finance Screen Reader Financial Troubleshooting Consulting Apple Documents PDF Bitcoin Hiring/Firing Mobility Mobile Device Management Wi-Fi Infrastructure Network Congestion Storage Workplace Tips USB Going Green Paperless Office Business Mobile Computing Tech Support Operations Techology Theft Development IBM Instant Messaging Virtual Desktop Unified Communications Conferencing Authentication Chatbots Google Docs Cabling Antivirus Hardware Document Management Router Digital IT Budget Blockchain Presentation Cookies How To IT Technicians Tablet Samsung Gmail Bluetooth Analytics Remote Workers Technology Tips IT service Social Engineering Travel Physical Security Drones Work/Life Balance Intranet Botnet Information Shortcut Computing Infrastructure Hackers Data Backup Uninterrupted Power Supply Spam Virtualization Domains Motion Sickness Comparison Piracy Cooperation GPS E-Commerce Computing Specifications Multi-Factor Security Tip of the week Address CIO Microsoft Access Control Current Events Administration Cameras Miscellaneous Network Security Firefox Networking Point of Sale Vulnerabilities Microsoft Office Chrome Cost Management G Suite Digital Signature Save Money Modem Statistics Budget Save Time Health Sports Monitors Phishing Upgrade Smartphones Personal Information Managed IT Service Notifications End of Support Identity Automobile OneNote Virus Star Wars Business Intelligence Undo Microsoft Excel CCTV Geography Permission BDR Backups Data storage Zero-Day Threat Cloud Spyware Business Technology Experience ROI Efficiency Data Warehousing Digital Payment Application History Employees File Sharing Phone System Smartphone Public Speaking Legal Business Owner Wireless Technology Telephone Systems Law Enforcement Data Breach Android IT Services Supercomputer Managed IT services Meetings Information Technology iPhone Regulations Chromebook Healthcare Users Bring Your Own Device Server Management MSP Augmented Reality Enterprise Content Management Private Cloud Legislation BYOD Malware PowerPoint Recovery IT Support Politics Hotspot Crowdsourcing Office Tips Machine Learning Bandwidth Remote Computing Training 5G Operating System Tech Term Break Fix Superfish Disaster Procurement Administrator VPN Favorites Dark Data Webcam Public Cloud Maintenance Alt Codes Computers Data loss Project Management Managed Services Provider Update Server Virtual Reality Fleet Tracking Managed IT Word Security Managed Service Provider Windows The Internet of Things Business Computing Firewall Cloud Computing Best Practices Best Practice Windows 10 Quick Tips Fraud Time Management Hosted Solutions Utility Computing Internet Exlporer Vulnerability Wires Remote Worker Relocation Downtime IT Consultant Websites Password Company Culture Cybersecurity Cleaning Ransomware Backup and Disaster Recovery Browser Customer Relationship Management Language Gadgets Hacks Holiday Tip of the Week Proactive IT Mobile Devices Analyitcs Artificial Intelligence SharePoint Hard Drives WannaCry Outlook 3D Printing Customer Service Technology Laws Hacking Money Managed Service Cortana Passwords Read Only Hacker Recycling Electronic Medical Records Trending Consumers WPA3 Privacy Social Media Retail Touchscreen Software VoIP Outsourced IT Upgrades Mirgation Cyber Monday Office Security Cameras Tech Terms Google Calendar Business Continuity Mouse Network Management

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...