Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Two Steps Are Better Than One, Where Security Is Concerned

Two Steps Are Better Than One, Where Security Is Concerned

You’re lucky to go a month without seeing news of some devastating data breach. With more businesses gearing up for the worst, what are you doing to protect your organization’s intellectual property and sensitive data? You can start by implementing a new type of authentication system that’s much more secure than your current security strategy--two-factor authentication.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Windows Disaster Recovery Android PowerPoint Computer Care Augmented Reality Point of Sale Intranet Read Only Buisness Windows 10 Upgrade Microsoft Excel Miscellaneous Theft Cloud Software as a Service Administrator Recovery Procurement Computing Infrastructure Enterprise Resource Planning Processors Firewall Data Backup Mobility Deep Learning WiFi Remote Monitoring and Management Techology Cyber Monday Conferencing Business Growth IT Consulting Hacker ROI Virtual Private Network Virtual Desktop Virtualization Internet of Things Entrepreneur Mobile Current Events Best Practice Google Emoji Modem Servers Computer Repair Files Consultation File Sharing Wireless Technology SaaS Document Management Documents Break Fix Error Employees Infrastructure 3D Printing Printer CIO Backup Computing VPN Mobile Computing Upgrades Net Neutrality Test Human Error Application How To GPS IT Support Writing Favorites Automation Network Security Social Media Legislation Humor Data loss Network IT service Search Typing Business Intelligence Update Hacks Digital Payment Managed IT Personal Information Website Virus Notes Consumers E-Commerce Relocation Cryptocurrency Managed IT Service Piracy Saving Time Backup and Disaster Recovery Staff Social Engineering Cables Identities Public Speaking Outsourced IT Chatbots Software Gadgets Google Calendar Lithium-ion Battery Refrigeration Statistics Bluetooth Data Mail Merge Digital Signature CCTV Hard Drive Bandwidth Internet Exlporer Server Samsung OneNote User Tips VoIP Save Time Development IT Technicians History Network Congestion Shortcut Proactive IT Star Wars Patch Management Managed Service Spam Unsupported Software Language Robot Geography Business Continuity Black Friday Distributed Denial of Service IT solutions Display Artificial Intelligence IBM Users Utility Computing Dark Data Privacy Touchscreen HIPAA Help Desk Unified Threat Management Business Regulations Gadget Nanotechnology Retail Downtime Data Security Security Cameras Analyitcs IT Consultant IT Budget Cooperation Hiring/Firing LiFi Features Staffing MSP Server Management Administration Work/Life Balance Vulnerabilities Mirgation User Access Control Phone System Software Tips Notifications PDF Outlook Best Practices End of Support Hacking Assessment Content Filtering Two-factor Authentication Wires Settings Innovation Tablet Trending Tip of the Week Smart Technology Authorization IT Management Knowledge Saving Money Drones Big Data WPA3 Blockchain Wearable Technology Voice over Internet Protocol Instant Messaging Passwords Analytics Networking Communication Laptop Small Business Computer Security Mobile Device Management Google Wallet Heating/Cooling Information Remote Worker iPhone Connectivity Managed IT services Management Network Management Black Market How To App Chromebook Workplace Tips Virtual Reality High-Speed Internet Experience Competition Webcam Save Money Holiday Social Public Cloud Password Database IT Services Email Cost Management Hackers Flexibility Quick Tips Cybercrime VoIP Business Management Office 365 Information Technology Proactive Botnet Hotspot Bitcoin Cybersecurity Going Green Windows 8 Comparison Consulting Programming Data Breach Training Mobile Office Redundancy Troubleshooting Solid State Drive Law Enforcement Data Recovery Customer Service Multi-Factor Security Business Computing Identity IP Address BDR Chrome Mobile Device Managment Scary Stories Microsoft Office Tech Support Apple Alt Codes communications Business Technology IoT Cameras Employer-Employee Relationship Cloud Computing Unified Communications Budget Disaster Resistance Paperless Office Monitors Motion Sickness User Error Corporate Profile Wasting Time Windows 7 Mobile Security Tech Term Telephony Professional Services Physical Security Technology Laws Financial RMM Phishing Supercomputer Legal Lenovo IT Support Productivity Uninterrupted Power Supply Social Networking Smartphones Machine Learning Cyberattacks Remote Workers SharePoint Environment YouTube Risk Management The Internet of Things Spyware Company Culture Tracking Electronic Health Records Business Owner Efficiency Tip of the week Maintenance Address Word Co-managed IT Office Tips Hardware Office Applications Superfish Tech Terms Remote Computing eWaste Dark Web Windows 10 Smartphone Education Mobile Devices Sync Cache BYOD Productivity Monitoring USB Operations Migration Firefox Compliance Halloween Backups Wi-Fi Cleaning Fun Health Data storage Healthcare Internet Facebook Money Screen Reader Operating System Google Maps Cabling Websites Router Malware Unified Threat Management Vendor Management Motherboard Managing Stress Storage G Suite Ransomware Remote Monitoring WannaCry Marketing Employee-Employer Relationship Cortana Managed Service Provider Permissions Hosted Solution Crowdsourcing Travel Electronic Medical Records Private Cloud Collaboration Time Management Technology Fraud Hard Drives Technology Tips Hard Disk Drive Virtual Assistant Encryption Customer Relationship Management Government Browser Presentation Managed Services Provider Permission Domains Project Management Data Warehousing Politics Scam Bring Your Own Device Identity Theft Asset Tracking Avoiding Downtime Alert Vulnerability 5G Computers Licensing Automobile Running Cable Gmail Twitter Managed IT Services Apps Cookies Finance Specifications Wireless Hosted Solutions Web Server Disaster Fleet Tracking Authentication Google Drive Digital Antivirus Downloads Mouse Zero-Day Threat Taxes Recycling Printing Meetings Safety Undo Mobile Data Data Management Bookmarks Mobile Device Microsoft Telephone Systems Smart Tech Alerts Sports Enterprise Content Management Google Docs

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...