Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Securing Your Business from the Internet of Things

Securing Your Business from the Internet of Things

Now that the holidays have come and gone, you might have a couple of new gadgets in your home or office that connect to the Internet. Depending on what these gadgets are, you might have a serious security issue sitting right in front of you without realizing it. Some devices that don’t normally connect to the Internet--also known as Internet of Things devices (IoT)--aren’t as secure as you’d like them to be, particularly in a business environment.

Continue reading
0 Comments

Tip of the Week: Improving Some Cybersecurity Basics

Tip of the Week: Improving Some Cybersecurity Basics

What are your chances of being hacked, or targeted by some kind of cyberattack? I hate to tell you this, but they’re probably a lot higher than you might think.

Continue reading
0 Comments

Your Business May Be Most Vulnerable from the Inside

Your Business May Be Most Vulnerable from the Inside

It can be easy, with all the threats covered in the news, to assume that the biggest dangers to your business all come from the outside. This is a dangerous mistake, as there are plenty of vulnerabilities that originate from within your organization, making it easier for outside threats to come in, if not being bigger threats in and of themselves. Below, we’ll review some of the biggest, mostly internal dangers that your business may face.

Continue reading
0 Comments

Looking Back at This Year’s Cybersecurity Issues

Looking Back at This Year’s Cybersecurity Issues

Every business in operation today needs to have some kind of comprehensive network security. Simply put, there are too many threats that can come in through an Internet connection for them to continue doing otherwise. The past year provides plenty of anecdotal proof of this fact, as a quick glance back can show.

Continue reading
0 Comments

Security Threats and Defensive Measures You Can Take

Security Threats and Defensive Measures You Can Take

Network security for small businesses is far from simple. There are countless threats out there that want to see your business fall, and it only takes one to see this come to fruition. Unless you take action now to protect your organization, you risk the future of your business. But what is it that businesses need to protect from, and what measures are out there that can accomplish this feat?

Continue reading
0 Comments

Are You Ready to Adapt to Network Security Changes?

Are You Ready to Adapt to Network Security Changes?

Humankind has always adapted and improved technology to make life easier, starting all the way back at fire and the wheel. Nowadays, our approach to making life easier through technology is centered around productivity and security - if we can accomplish more than before in the same amount of time, without worrying that it will be stolen, we’re happy.

Continue reading
0 Comments

FREE Printout: IT Security End-User Checklist

FREE Printout: IT Security End-User Checklist

This guide was created so that business owners, office managers, and IT departments can provide it as an educational resource to showcase some of the most basic IT security practices that can be implemented in your workplace. We recommend printing this out and handing it out to your staff for maximum results.

Continue reading
0 Comments

Tip of the Week: How to Protect Yourself from Invoice Impersonation

Tip of the Week: How to Protect Yourself from Invoice Impersonation

As cybercriminals become increasingly sophisticated in their methods of attack, it is important that your staff--the ones on the front lines--are educated to spot these attempts and know what to do if one is encountered. In order to spot these attacks, it is important to know what to look for.

Continue reading
0 Comments

There are New Ways to Secure Your Data

There are New Ways to Secure Your Data

Security is an aspect of running a business that absolutely cannot be ignored, regardless of whether or not you see it as a considerable issue in the near future. The fact remains that your organization will always be at risk unless you take actions to keep it safe today. By taking advantage of some of the latest and greatest security tools on the market, you’ll be able to protect not only from the basic threats, but more advanced ones as well.

Continue reading
0 Comments

Data Security Has to Be A Priority For Your Organization

Data Security Has to Be A Priority For Your Organization

Considering that since January 1st of this year, there has been upwards of 10 million personal information records lost or stolen each day, odds are that you, or someone you know, has had their records compromised by a data breach. With such a high incident rate, individuals and businesses that have never received any kind of notification that their records were included in a breach, generally consider themselves lucky and assume that they are not at risk of identity theft or unauthorized account usage. Unfortunately for them, that is not always the case.

Continue reading
0 Comments

October is Cybersecurity Awareness Month

October is Cybersecurity Awareness Month

Cybercrime is the fastest growing criminal activity in the world. From the largest enterprise to the individual, it can affect anyone, anywhere. To help ensure the cybersecurity of American citizens and their businesses, the Department of Homeland Security (DHS), United States Computer Emergency Readiness Team (CERT), and the Federal Bureau of Investigation (FBI) and other agencies work together every October to raise awareness about the threats people face online through a series of educational events and activities.

Continue reading
0 Comments

Who Needs To Be Involved In Network Security? Simple: Everyone

Who Needs To Be Involved In Network Security? Simple: Everyone

Network security is an important part of keeping both your business and your staff away from online threats, but it’s not enough to implement the best, most comprehensive solutions on the market. There are a surprising number of facets to network security, and in order to optimize protection against online threats, you’ll need to know all of them. Thankfully, you don’t have to do this alone.

Continue reading
0 Comments

When It Comes To Your IT, There's No Such Thing As A Dumb Question!

When It Comes To Your IT, There's No Such Thing As A Dumb Question!

Especially with so many people claiming to be tech-savvy, asking a question about IT can be a bit nerve wracking. Because of this hesitation, there are a lot of people who don’t ask questions about technology because they feel like their questions might be stupid. For example, having an updated operating system is a term that is tossed around a lot by IT professionals, and even some not-so-professionals.

Continue reading
0 Comments

Tip of the Week: 12 Security Rules Every PC User Should Follow

Tip of the Week: 12 Security Rules Every PC User Should Follow

While you are probably spending a fair amount of time thinking about your business’ security, can you confidently say the same about those that you’ve employed? Unfortunately, your workers may not put much thought into network security. This could very possibly lead to some severe issues potentially harming your business operations.

Continue reading
0 Comments

How Does a UTM Firewall Protect Your Business?

How Does a UTM Firewall Protect Your Business?

Every time you pick up a personal computer from a vendor, chances are that it will have an extremely basic firewall pre-installed. These consumer-grade firewalls leave much to be desired, especially in the business environment. You’ll want to make sure that your organization is equipped with enterprise-level solutions designed to protect on both a fundamental level and an advanced level. To do this, you want to take advantage of a Unified Threat Management solution.

Continue reading
0 Comments

An Extreme Example of a Fired IT Administrator Taking Revenge

An Extreme Example of a Fired IT Administrator Taking Revenge

It can be easy to underestimate the importance of maintaining permissions on your network. In fact, sometimes it takes a good dose of misfortune to present the consequences of unchecked access to your network. This time, the misfortune befell PA Online, an Internet service provider located in Pennsylvania.

Continue reading
0 Comments

We Dig Into the Hacker’s Playbook for Some Solid Security Lessons

We Dig Into the Hacker’s Playbook for Some Solid Security Lessons

What crosses your mind when you think about hacking attacks and data breaches? Do you picture a hacker in a ski mask typing furiously, or do you imagine scenes made memorable like those in television and film in works like Mr. Robot or Live Free or Die Hard? In the latter, hacking attacks are perpetrated by masterminds or those with grand ambition. Yet, this trend may portray an inaccurate representation of the typical hacker.

Continue reading
0 Comments

Why You Should Be Skeptical of USB Devices

Why You Should Be Skeptical of USB Devices

USB technology is widely-used and you’d be hard-pressed to find an organization that doesn’t utilize USB devices in some way, shape, or form. However, these devices often harbor unexpected threats that could put the security of your entire infrastructure in jeopardy. All it takes is one infected device to compromise your network. Do you know where your USB devices have been?

Continue reading
0 Comments

Tip of the Week: 5 Best Practices for Traveling With Technology

Tip of the Week: 5 Best Practices for Traveling With Technology

Do you find yourself traveling for your business? Be it for a conference, a series of meetings that require your attendance, or some other reason, you may very likely need to spend some time on the road; time that could be spent on tasks your business needs to function. Despite the lack of a traditional workspace, this time spent traveling doesn’t necessarily need to be time wasted. Thanks to the technology of today, you have the ability to remain productive while mobile.

Continue reading
0 Comments

Having a Network that’s Tested Guarantees You’ll Overcome Any Disaster

Having a Network that’s Tested Guarantees You’ll Overcome Any Disaster

Does your SMB have an internal IT department? Chances are that it is a major pain point for your organization, and even if you do have one, it might be bogged down with so much work that mistakes can happen and threats can slip through the cracks. Sometimes the best way to protect your network is to know where and how threats manage to get there in the first place.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Hiring/Firing Mobile Device Management Passwords Gadget Holiday Office Tips Connectivity Backup Drones Remote Computing High-Speed Internet Spam Scam Current Events Phishing Licensing Help Desk Monitoring Business Fleet Tracking Wearable Technology Finance Unified Communications Nanotechnology Phone System Server Management Employees Disaster Apps Digital Payment Tracking IT Technicians Windows 10 Search Cache Hosted Solution Access Control Patch Management Samsung Cameras Safety Distributed Denial of Service Dark Web Proactive IT Internet Exlporer Screen Reader Data Recovery Read Only Laptop Cortana Webcam Money Data File Sharing Documents Redundancy Politics BYOD Superfish Employee-Employer Relationship PDF Fraud Smart Tech Trending Personal Information Security Cameras Remote Monitoring Document Management Company Culture PowerPoint Proactive Hosted Solutions Google Drive Consultation Network Security Hacker Business Computing Mouse Entrepreneur Touchscreen Cryptocurrency Sports OneNote Cloud Outlook How To WPA3 3D Printing Cookies VPN Windows Techology Server Quick Tips Uninterrupted Power Supply Multi-Factor Security Virus Bandwidth History SharePoint CCTV Network Management Windows 7 Mobile Device Managment Healthcare Windows 8 Data Security Mobile Computing Solid State Drive Processors Computer Care Competition Shortcut Utility Computing Data loss Managing Stress Hotspot Piracy Motherboard Backup and Disaster Recovery Cooperation VoIP Recycling Flexibility Users User Error Lithium-ion Battery Technology Tips Firewall Business Technology Internet Black Friday communications Microsoft Mobile Security Networking GPS Vulnerabilities Automobile IT Budget Asset Tracking App Marketing Instant Messaging Disaster Resistance Google Docs Printer IoT Gadgets IP Address Staff Monitors Public Speaking The Internet of Things Servers Encryption Twitter USB Health Running Cable Ransomware Digital Signature Paperless Office ROI Smart Technology Privacy Electronic Health Records Hacks Human Error Features Net Neutrality Telephone Systems Domains Unified Threat Management Risk Management Managed Services Provider Knowledge Halloween Relocation Tablet Tech Terms IT Consulting Files Customer Relationship Management Augmented Reality Disaster Recovery Business Owner Data Warehousing Small Business Social Engineering Save Money Workplace Tips Legal Address Firefox Typing Miscellaneous Notes Unified Threat Management Co-managed IT Assessment Retail Google Maps Business Growth Crowdsourcing Enterprise Resource Planning Backups RMM Dark Data Cloud Computing Virtual Private Network Regulations Software Bitcoin Administration Big Data Virtual Desktop Software as a Service Voice over Internet Protocol Computer Spyware Corporate Profile Unsupported Software Upgrade Social Networking Refrigeration Tip of the week Deep Learning Malware Professional Services Content Filtering Identities Mobile Devices Collaboration Lenovo Work/Life Balance E-Commerce Identity Applications Cabling Network G Suite Technology Laws Router Computer Repair Notifications Geography HIPAA Conferencing Data storage Troubleshooting Managed Service Provider Bluetooth Password Social Word Mobile IT Support Outsourced IT Hard Drive Remote Worker Tech Term Mirgation Language Social Media Budget Vendor Management Identity Theft Artificial Intelligence Undo Upgrades Information Downtime Business Management Google Calendar Security Printing Chrome Taxes Staffing Maintenance Apple Fun Managed Service Law Enforcement Gmail Managed IT Service Financial Cables Network Congestion Supercomputer Black Market Experience 5G Efficiency Wires Employer-Employee Relationship Writing Email How To Customer Service Hard Drives Public Cloud Legislation Development Mobile Device Administrator Database Programming Time Management User Tips Data Backup Modem Smartphones Hardware Computing Website Avoiding Downtime Operations IT Services Emoji Sync YouTube Buisness Travel Permission Analytics Infrastructure Display Education Business Continuity Analyitcs CIO IT solutions Chromebook Procurement Private Cloud LiFi Microsoft Excel Physical Security IT Consultant Break Fix Tip of the Week IT Management Business Intelligence Point of Sale Humor Wireless Application Meetings Office 365 WiFi Bookmarks iPhone Vulnerability VoIP Software Tips Test Zero-Day Threat Mobile Data Cybercrime Enterprise Content Management Innovation Tech Support Alt Codes Authorization Digital Cost Management Wi-Fi Intranet Mobile Office Smartphone Downloads Hacking Computing Infrastructure Hard Disk Drive Google Hackers Android Robot Cyberattacks Recovery Google Wallet Websites Productivity Heating/Cooling Comparison Botnet Training Save Time Managed IT Chatbots Mail Merge Operating System Storage Automation End of Support Best Practices Web Server Browser Virtual Assistant Blockchain Information Technology Specifications Wireless Technology Error Environment Wasting Time Windows 10 Theft Settings Virtualization Managed IT Services Alert Cyber Monday Best Practice Bring Your Own Device Data Management Remote Workers Office Authentication Migration Telephony Remote Monitoring and Management Scary Stories Virtual Reality Antivirus Star Wars Compliance Management Saving Time Data Breach Microsoft Office User Alerts Electronic Medical Records Statistics eWaste Project Management Productivity WannaCry Facebook Computers MSP Cleaning Consumers Update IT Support BDR IBM Machine Learning SaaS Government Going Green Two-factor Authentication IT service Saving Money Consulting Motion Sickness Communication Presentation Cybersecurity Technology Permissions Managed IT services Favorites Internet of Things Mobility

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code