Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Could Your Favorite App Infect Your Device?

Could Your Favorite App Infect Your Device?

When considering solutions to help ensure your business’ IT security, mobile devices often go overlooked. This makes sense--for most of the time the telephone has existed, it has been attached to a wall, only capable of transmitting sound. However, with phones now being palm-sized computers that we carry in our pockets, keeping them safe from cyberthreats has a new importance.

Continue reading
0 Comments

Mobile Security Showdown: Cellular Network vs. Wi-Fi

Mobile Security Showdown: Cellular Network vs. Wi-Fi

Today’s business relies on mobile devices, like smartphones, to guide them to productivity and efficiency. In fact, the vast majority of people in today’s society own a smartphone. A report shows that 90 percent of people younger than 30 own a smartphone, which means that the forward-thinking business hiring talented millennials may want to start thinking about how to secure any mobile devices that they use to access company data.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Operations Artificial Intelligence IoT Disaster Recovery Miscellaneous Antivirus Facebook Government WannaCry Test App Administration Private Cloud Cost Management Wireless Mirgation Touchscreen Apps Star Wars USB IT solutions Deep Learning Tech Support Windows 10 Servers Software Email Tracking iPhone Spyware Remote Monitoring and Management Computers Document Management Cyber Monday Superfish Data Management Piracy Vendor Management Bitcoin Bandwidth Digital Payment Managing Stress Documents Notifications Cloud Computing Entrepreneur Twitter OneNote Authentication Vulnerabilities Business Computing Productivity Fleet Tracking Help Desk Cryptocurrency Save Time Work/Life Balance 5G Router Websites High-Speed Internet Statistics Data Breach YouTube Hiring/Firing Server Management Robot Collaboration Specifications VoIP Security Paperless Office Office Tips Remote Workers Going Green VPN History Alert Proactive IT Development Spam Hardware Gmail Features CCTV Mobile Devices Zero-Day Threat Maintenance Efficiency Connectivity Programming Content Filtering Samsung Electronic Medical Records Technology Laws Break Fix Wasting Time Avoiding Downtime Health Conferencing Data Warehousing Motion Sickness Digital Signature Ransomware Intranet Automobile Dark Web Smart Tech Update Net Neutrality RMM eWaste Upgrade Compliance Corporate Profile Unsupported Software Two-factor Authentication PDF Virtual Private Network Hacking Business Growth Vulnerability Dark Data MSP CIO Professional Services Data loss HIPAA Laptop Money Business Technology Windows 8 Computing Infrastructure Identity Typing Favorites Public Cloud Point of Sale Cyberattacks Quick Tips User Error BDR Emoji Downtime Social Engineering VoIP Asset Tracking Mobile Device Monitoring Phishing Wi-Fi Gadgets Bluetooth Microsoft Office Crowdsourcing Black Friday Workplace Tips PowerPoint Managed IT Services Software as a Service Data Security WiFi G Suite Virus Undo Redundancy Virtual Desktop Computer Care Theft Notes Information Mail Merge Consumers Identities Data Backup SharePoint Google Calendar Firewall Comparison Server ROI Hard Drive Assessment Virtual Reality Permissions Distributed Denial of Service Unified Communications Wires Passwords Settings Remote Computing Digital Social Media Refrigeration Virtualization Cache Search IT Services Data Recovery Administrator Scam Cameras Networking Hackers Network Management Budget Travel Social IT Support Retail Tech Term Identity Theft Hosted Solutions Legislation Managed IT services Language Information Technology Disaster Buisness Electronic Health Records Geography IBM Patch Management Cortana Applications Network Congestion Mobile Device Managment Scary Stories GPS Tip of the week Computer Repair Managed Service Authorization Mouse Meetings Flexibility Operating System WPA3 Marketing Internet Exlporer Business Owner Outsourced IT Personal Information Windows IT Management Small Business Telephony Best Practices Windows 10 E-Commerce Recycling Error Sync Drones Screen Reader Mobility Upgrades Mobile Computing Tablet Application Infrastructure Cooperation Running Cable BYOD Printer Remote Worker Webcam Managed IT Storage Database Saving Time SaaS Machine Learning Access Control Office Training Employees Chrome Managed IT Service Analyitcs Halloween Security Cameras Politics Web Server Alerts Humor Public Speaking Risk Management Downloads Gadget Staffing Modem Browser Internet Trending Environment Consulting Managed Service Provider Wearable Technology Save Money Users Holiday Smartphones Law Enforcement Backup Management Bookmarks Cabling Phone System Managed Services Provider Procurement File Sharing Sports Tech Terms Human Error Address Multi-Factor Security Hotspot Password Apple IT Budget Hacks Unified Threat Management User Tips IT Technicians How To Safety Smart Technology communications Enterprise Resource Planning Privacy Shortcut Android Virtual Assistant Lenovo Microsoft Excel Smartphone Co-managed IT Fun Employer-Employee Relationship Knowledge Bring Your Own Device Business Management Finance Staff Telephone Systems LiFi Lithium-ion Battery Google Docs Healthcare Productivity Uninterrupted Power Supply Nanotechnology Chromebook IT service Mobile Data Presentation Time Management Hard Disk Drive Augmented Reality Motherboard Solid State Drive Encryption Permission IP Address Cables IT Support Google Maps Outlook Mobile Security Innovation Data storage Unified Threat Management End of Support Customer Relationship Management Taxes Hard Drives Saving Money Blockchain Cybersecurity Legal Cybercrime Regulations Competition Alt Codes Heating/Cooling Cookies Enterprise Content Management Relocation Network IT Consultant Financial Printing Website Business Continuity Project Management Company Culture How To Techology Tip of the Week Computing Word Business Intelligence IT Consulting Customer Service Communication Computer Big Data Backups Malware Social Networking Fraud Education Processors Data Analytics Mobile Office Licensing Best Practice 3D Printing Instant Messaging Automation Domains Remote Monitoring Disaster Resistance Voice over Internet Protocol Physical Security Google Drive Black Market Monitors Google Wallet Writing Internet of Things Cloud Proactive Business Files Microsoft Migration Current Events Consultation Backup and Disaster Recovery Read Only Google Office 365 Supercomputer Troubleshooting Utility Computing Technology Tips Recovery Hosted Solution User Botnet Technology Mobile The Internet of Things Software Tips Network Security Experience Wireless Technology Hacker Employee-Employer Relationship Display Mobile Device Management Chatbots Cleaning Firefox Windows 7

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code