Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Securing Your Business from the Internet of Things

Securing Your Business from the Internet of Things

Now that the holidays have come and gone, you might have a couple of new gadgets in your home or office that connect to the Internet. Depending on what these gadgets are, you might have a serious security issue sitting right in front of you without realizing it. Some devices that don’t normally connect to the Internet--also known as Internet of Things devices (IoT)--aren’t as secure as you’d like them to be, particularly in a business environment.

Continue reading
0 Comments

Tip of the Week: Improving Some Cybersecurity Basics

Tip of the Week: Improving Some Cybersecurity Basics

What are your chances of being hacked, or targeted by some kind of cyberattack? I hate to tell you this, but they’re probably a lot higher than you might think.

Continue reading
0 Comments

Your Business May Be Most Vulnerable from the Inside

Your Business May Be Most Vulnerable from the Inside

It can be easy, with all the threats covered in the news, to assume that the biggest dangers to your business all come from the outside. This is a dangerous mistake, as there are plenty of vulnerabilities that originate from within your organization, making it easier for outside threats to come in, if not being bigger threats in and of themselves. Below, we’ll review some of the biggest, mostly internal dangers that your business may face.

Continue reading
0 Comments

Looking Back at This Year’s Cybersecurity Issues

Looking Back at This Year’s Cybersecurity Issues

Every business in operation today needs to have some kind of comprehensive network security. Simply put, there are too many threats that can come in through an Internet connection for them to continue doing otherwise. The past year provides plenty of anecdotal proof of this fact, as a quick glance back can show.

Continue reading
0 Comments

Security Threats and Defensive Measures You Can Take

Security Threats and Defensive Measures You Can Take

Network security for small businesses is far from simple. There are countless threats out there that want to see your business fall, and it only takes one to see this come to fruition. Unless you take action now to protect your organization, you risk the future of your business. But what is it that businesses need to protect from, and what measures are out there that can accomplish this feat?

Continue reading
0 Comments

Are You Ready to Adapt to Network Security Changes?

Are You Ready to Adapt to Network Security Changes?

Humankind has always adapted and improved technology to make life easier, starting all the way back at fire and the wheel. Nowadays, our approach to making life easier through technology is centered around productivity and security - if we can accomplish more than before in the same amount of time, without worrying that it will be stolen, we’re happy.

Continue reading
0 Comments

FREE Printout: IT Security End-User Checklist

FREE Printout: IT Security End-User Checklist

This guide was created so that business owners, office managers, and IT departments can provide it as an educational resource to showcase some of the most basic IT security practices that can be implemented in your workplace. We recommend printing this out and handing it out to your staff for maximum results.

Continue reading
0 Comments

Tip of the Week: How to Protect Yourself from Invoice Impersonation

Tip of the Week: How to Protect Yourself from Invoice Impersonation

As cybercriminals become increasingly sophisticated in their methods of attack, it is important that your staff--the ones on the front lines--are educated to spot these attempts and know what to do if one is encountered. In order to spot these attacks, it is important to know what to look for.

Continue reading
0 Comments

There are New Ways to Secure Your Data

There are New Ways to Secure Your Data

Security is an aspect of running a business that absolutely cannot be ignored, regardless of whether or not you see it as a considerable issue in the near future. The fact remains that your organization will always be at risk unless you take actions to keep it safe today. By taking advantage of some of the latest and greatest security tools on the market, you’ll be able to protect not only from the basic threats, but more advanced ones as well.

Continue reading
0 Comments

Data Security Has to Be A Priority For Your Organization

Data Security Has to Be A Priority For Your Organization

Considering that since January 1st of this year, there has been upwards of 10 million personal information records lost or stolen each day, odds are that you, or someone you know, has had their records compromised by a data breach. With such a high incident rate, individuals and businesses that have never received any kind of notification that their records were included in a breach, generally consider themselves lucky and assume that they are not at risk of identity theft or unauthorized account usage. Unfortunately for them, that is not always the case.

Continue reading
0 Comments

October is Cybersecurity Awareness Month

October is Cybersecurity Awareness Month

Cybercrime is the fastest growing criminal activity in the world. From the largest enterprise to the individual, it can affect anyone, anywhere. To help ensure the cybersecurity of American citizens and their businesses, the Department of Homeland Security (DHS), United States Computer Emergency Readiness Team (CERT), and the Federal Bureau of Investigation (FBI) and other agencies work together every October to raise awareness about the threats people face online through a series of educational events and activities.

Continue reading
0 Comments

Who Needs To Be Involved In Network Security? Simple: Everyone

Who Needs To Be Involved In Network Security? Simple: Everyone

Network security is an important part of keeping both your business and your staff away from online threats, but it’s not enough to implement the best, most comprehensive solutions on the market. There are a surprising number of facets to network security, and in order to optimize protection against online threats, you’ll need to know all of them. Thankfully, you don’t have to do this alone.

Continue reading
0 Comments

When It Comes To Your IT, There's No Such Thing As A Dumb Question!

When It Comes To Your IT, There's No Such Thing As A Dumb Question!

Especially with so many people claiming to be tech-savvy, asking a question about IT can be a bit nerve wracking. Because of this hesitation, there are a lot of people who don’t ask questions about technology because they feel like their questions might be stupid. For example, having an updated operating system is a term that is tossed around a lot by IT professionals, and even some not-so-professionals.

Continue reading
0 Comments

Tip of the Week: 12 Security Rules Every PC User Should Follow

Tip of the Week: 12 Security Rules Every PC User Should Follow

While you are probably spending a fair amount of time thinking about your business’ security, can you confidently say the same about those that you’ve employed? Unfortunately, your workers may not put much thought into network security. This could very possibly lead to some severe issues potentially harming your business operations.

Continue reading
0 Comments

How Does a UTM Firewall Protect Your Business?

How Does a UTM Firewall Protect Your Business?

Every time you pick up a personal computer from a vendor, chances are that it will have an extremely basic firewall pre-installed. These consumer-grade firewalls leave much to be desired, especially in the business environment. You’ll want to make sure that your organization is equipped with enterprise-level solutions designed to protect on both a fundamental level and an advanced level. To do this, you want to take advantage of a Unified Threat Management solution.

Continue reading
0 Comments

An Extreme Example of a Fired IT Administrator Taking Revenge

An Extreme Example of a Fired IT Administrator Taking Revenge

It can be easy to underestimate the importance of maintaining permissions on your network. In fact, sometimes it takes a good dose of misfortune to present the consequences of unchecked access to your network. This time, the misfortune befell PA Online, an Internet service provider located in Pennsylvania.

Continue reading
0 Comments

We Dig Into the Hacker’s Playbook for Some Solid Security Lessons

We Dig Into the Hacker’s Playbook for Some Solid Security Lessons

What crosses your mind when you think about hacking attacks and data breaches? Do you picture a hacker in a ski mask typing furiously, or do you imagine scenes made memorable like those in television and film in works like Mr. Robot or Live Free or Die Hard? In the latter, hacking attacks are perpetrated by masterminds or those with grand ambition. Yet, this trend may portray an inaccurate representation of the typical hacker.

Continue reading
0 Comments

Why You Should Be Skeptical of USB Devices

Why You Should Be Skeptical of USB Devices

USB technology is widely-used and you’d be hard-pressed to find an organization that doesn’t utilize USB devices in some way, shape, or form. However, these devices often harbor unexpected threats that could put the security of your entire infrastructure in jeopardy. All it takes is one infected device to compromise your network. Do you know where your USB devices have been?

Continue reading
0 Comments

Tip of the Week: 5 Best Practices for Traveling With Technology

Tip of the Week: 5 Best Practices for Traveling With Technology

Do you find yourself traveling for your business? Be it for a conference, a series of meetings that require your attendance, or some other reason, you may very likely need to spend some time on the road; time that could be spent on tasks your business needs to function. Despite the lack of a traditional workspace, this time spent traveling doesn’t necessarily need to be time wasted. Thanks to the technology of today, you have the ability to remain productive while mobile.

Continue reading
0 Comments

Having a Network that’s Tested Guarantees You’ll Overcome Any Disaster

Having a Network that’s Tested Guarantees You’ll Overcome Any Disaster

Does your SMB have an internal IT department? Chances are that it is a major pain point for your organization, and even if you do have one, it might be bogged down with so much work that mistakes can happen and threats can slip through the cracks. Sometimes the best way to protect your network is to know where and how threats manage to get there in the first place.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Save Money Firewall IP Address Hacking Undo Point of Sale IT Consulting Mobile Device Management IT service eWaste Microsoft Private Cloud Company Culture Gadget Social Spam Websites Vulnerabilities Windows Mobile Data Zero-Day Threat Refrigeration History Proactive iPhone communications Motherboard Wireless Experience Specifications Disaster Resistance Business Intelligence Network Unified Threat Management Mail Merge USB Settings High-Speed Internet Corporate Profile Fraud WannaCry Update 3D Printing Mobile Laptop Technology Laws Running Cable Augmented Reality Password Bluetooth Cloud Social Engineering Innovation Politics Data Recovery Mobile Security Drones Theft Cryptocurrency Automobile Hotspot Break Fix Machine Learning Migration Statistics Identities Analyitcs Nanotechnology Cortana Cost Management Tracking Automation Hard Drive Employee-Employer Relationship Chatbots Redundancy Training Budget Connectivity ROI BYOD Unified Threat Management Language Dark Data Domains Website Health Techology Proactive IT End of Support Search Backups Marketing Miscellaneous VPN Quick Tips Robot Microsoft Office Network Security Communication Digital Signature Government Cameras Fleet Tracking Paperless Office Managed Service Provider BDR Social Media Hosted Solutions Screen Reader IT solutions Instant Messaging Geography Data Legal Financial Internet Exlporer User Tips Phone System RMM Office 365 Holiday Mobile Computing Travel File Sharing Gmail Applications Business Owner Cache Writing Managed IT Services Collaboration Going Green Recovery Data Security Compliance Error Sync Management Ransomware Cloud Computing Browser Utility Computing Vulnerability Monitoring Twitter Data storage Botnet Favorites Computing Read Only Efficiency Money Malware Hard Disk Drive Customer Relationship Management Chromebook Tip of the Week Smartphones Net Neutrality Productivity Crowdsourcing Remote Workers Technology Tips Router Cooperation Consultation Tip of the week Administrator MSP Address Patch Management Uninterrupted Power Supply PDF Black Market IT Technicians Webcam Scary Stories Mobile Office Passwords Internet of Things Business Technology HIPAA Small Business Star Wars The Internet of Things Upgrade Hardware Time Management Cybersecurity Superfish Project Management Recycling Cyber Monday Processors Printing Security Cameras Identity How To Employees Co-managed IT Data Management Authentication PowerPoint Tech Terms Networking Hacks CCTV Saving Money Privacy Shortcut Software Tips Test Technology Identity Theft Bitcoin Help Desk Best Practice How To Users VoIP Android Downloads Network Congestion G Suite Business Managed Service Apple Google Maintenance Tech Support Blockchain Smartphone Managing Stress 5G Deep Learning Security Server Management Cabling WiFi Mobile Device Multi-Factor Security Intranet Administration Business Management Tech Term Environment Mirgation Outlook Apps Gadgets Telephony Supercomputer Work/Life Balance Competition IT Budget Printer Assessment Staff Chrome Hard Drives Display Network Management Computer Windows 10 Enterprise Resource Planning Monitors Managed IT Service Storage Software as a Service Alerts Business Growth Public Speaking Heating/Cooling Access Control Files IT Consultant Mobility Managed IT IoT Hackers Enterprise Content Management Troubleshooting Managed IT services Disaster Notifications Server Antivirus Bandwidth Save Time Spyware Firefox Employer-Employee Relationship Staffing App Telephone Systems Infrastructure Permissions Analytics Email Wires Alert Computer Care Public Cloud Windows 10 Entrepreneur Two-factor Authentication Humor Cleaning Presentation Lenovo Emoji Fun Remote Monitoring Bookmarks Risk Management IT Management Education IBM Saving Time Lithium-ion Battery VoIP Remote Computing Virus Big Data Mobile Device Managment Asset Tracking Windows 8 Data Breach Managed Services Provider Office Dark Web Software Conferencing Hiring/Firing Licensing Disaster Recovery Personal Information Digital Black Friday Google Maps User Error Typing Taxes Modem Cybercrime Regulations User Consulting Touchscreen Microsoft Excel Physical Security Relocation Servers LiFi Google Wallet Bring Your Own Device Backup Vendor Management Solid State Drive Unsupported Software Artificial Intelligence SaaS Sports Buisness SharePoint Backup and Disaster Recovery Content Filtering Wearable Technology Wi-Fi Web Server Smart Tech Finance Unified Communications Customer Service Business Continuity Programming Comparison Internet Phishing Facebook Productivity IT Services Alt Codes Information Technology Social Networking Tablet Authorization Data Backup Data Warehousing Procurement Downtime Hacker Safety Consumers Digital Payment Trending Office Tips Scam Avoiding Downtime Wireless Technology WPA3 YouTube Knowledge Documents Halloween Outsourced IT Virtual Reality Retail Best Practices Remote Worker Data loss Computer Repair Information Virtualization OneNote Remote Monitoring and Management Cookies Samsung Google Drive GPS Virtual Desktop Electronic Medical Records Permission IT Support Development Document Management IT Support Business Computing Features Distributed Denial of Service Application Cyberattacks Law Enforcement Computing Infrastructure Smart Technology Healthcare Mobile Devices Hosted Solution Current Events Word Google Calendar Operating System Workplace Tips CIO Mouse Google Docs Operations Motion Sickness Piracy Encryption Electronic Health Records Flexibility Legislation Upgrades E-Commerce Cables Computers Virtual Private Network Human Error Meetings

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code