Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Find the Best VPN for Your Privacy

Tip of the Week: How to Find the Best VPN for Your Privacy

With all of the talk about the FCC and Net Neutrality in the recent news, a lot of computer users are concerned about the amount of privacy afforded them by their Internet service providers--and rightfully so. Regardless of whether the net neutrality ruling was justified (hint: it wasn’t), users are finding that they have to take their privacy into their own hands. The easiest way to do so is with a Virtual Private Network.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

File Sharing Antivirus End of Support Distributed Denial of Service Tablet Mobile Computer Workplace Tips How To Tech Term Upgrades IP Address Save Money Meetings Flexibility Remote Monitoring and Management communications Quick Tips Windows 7 Document Management Retail Business Mobile Device Scam Blockchain Mobile Office Enterprise Resource Planning Halloween Bluetooth Telephone Systems Internet of Things Permissions Cabling VoIP Privacy Avoiding Downtime Hard Disk Drive Mobile Computing Tip of the week Unified Threat Management Proactive Firefox Solid State Drive Apps Competition Virtual Assistant Relocation Computer Repair Alt Codes Business Computing Firewall Samsung Data Warehousing VoIP Office Tips Virtual Private Network Screen Reader Maintenance Storage Unified Communications Digital Signature Dark Data History Printing Education Social Data loss IT Management Net Neutrality Running Cable Passwords Hackers Facebook Software Tips Saving Money Public Cloud Managed IT Mobility Address Outlook Knowledge Experience Network Congestion Proactive IT IT solutions Shortcut Windows IT Technicians Smartphone Technology Cyber Monday Multi-Factor Security Compliance Mirgation Web Server Applications Data storage Administration Digital Payment Consultation Analyitcs Computing Permission Analytics Windows 10 Legal Wireless Technology Enterprise Content Management Productivity Holiday Machine Learning Safety Read Only IT Budget Scary Stories Microsoft Excel Intranet Telephony Server Management Best Practice Notes Bring Your Own Device Taxes How To RMM IT Support Collaboration Co-managed IT Application Politics Operations SaaS Time Management 5G Lenovo Point of Sale Wireless Software as a Service Save Time Technology Tips Authentication Managed IT Service Google Wallet Cables IBM Hard Drives IoT Company Culture Remote Workers Hosted Solution Recycling Modem Instant Messaging Computing Infrastructure Undo Business Technology Infrastructure Smart Tech Black Market LiFi Managed Service Provider Human Error BDR Wasting Time App CIO WannaCry IT Support Bitcoin Troubleshooting IT Consultant Alerts CCTV Wearable Technology Twitter Government Hardware Phishing Alert Computer Care Employees Data Recovery Business Owner Virtual Desktop Office Break Fix Star Wars Word Superfish Internet Exlporer Employer-Employee Relationship Mobile Data Hiring/Firing Techology Conferencing Wires Redundancy Tip of the Week Piracy Voice over Internet Protocol Virtual Reality Personal Information Router Physical Security Apple Security Cameras Internet Processors Managed Services Provider iPhone Risk Management Business Continuity Network Management Money Employee-Employer Relationship Fun Social Engineering Drones Deep Learning Vulnerability Cryptocurrency Legislation Printer Hosted Solutions Technology Laws Content Filtering Saving Time Programming Remote Worker Users Small Business Software MSP Healthcare Development Update Cloud Downtime Error Microsoft Spyware Search Network Security Remote Monitoring Outsourced IT Access Control WiFi Assessment Efficiency Connectivity Managed Service Motherboard Cameras Entrepreneur Two-factor Authentication Data Public Speaking Favorites Bookmarks Gadget Current Events Windows 8 Password Tech Support Lithium-ion Battery YouTube Cookies Chromebook BYOD Social Media Environment Smartphones Identity Theft Buisness Heating/Cooling User Tips PDF Consumers Training Asset Tracking Cost Management Black Friday Laptop Microsoft Office Website Data Breach Big Data Database Smart Technology Browser Dark Web Office 365 Touchscreen Hacker Gmail Cache 3D Printing Test Professional Services Email Google Calendar Health Google Maps Private Cloud Identities Presentation USB Websites User Licensing Language Files Business Growth Identity Features Robot Going Green Disaster Recovery The Internet of Things High-Speed Internet Backup and Disaster Recovery Remote Computing Networking Chrome Virus Automation Botnet Trending Regulations Project Management Procurement Tracking PowerPoint Nanotechnology Digital Operating System Electronic Health Records Cloud Computing Staffing Webcam Mobile Devices Authorization Disaster Mobile Device Management Vulnerabilities Backups Consulting Data Backup Sync Backup VPN Typing Managing Stress Travel Marketing Android Specifications Wi-Fi Unsupported Software Augmented Reality Domains Documents Tech Terms Customer Service Supercomputer Refrigeration Cortana Servers Innovation Hacking Automobile Display Network Hacks Business Management Server Zero-Day Threat IT Consulting eWaste Security Management Patch Management Bandwidth Work/Life Balance Staff Computers Virtualization Emoji Google Docs Productivity Chatbots G Suite ROI Artificial Intelligence Downloads Recovery Geography Hard Drive Cybersecurity Data Management IT service Statistics Monitoring Cleaning Comparison Spam Settings Crowdsourcing Cybercrime Fleet Tracking Migration Ransomware Administrator WPA3 Customer Relationship Management Best Practices Law Enforcement Paperless Office Managed IT Services Mobile Device Managment Managed IT services HIPAA E-Commerce Cyberattacks Corporate Profile User Error Malware Uninterrupted Power Supply Writing Monitors Fraud Information Mail Merge Google Drive Humor Communication Business Intelligence Mobile Security Vendor Management Information Technology Budget Finance Cooperation Disaster Resistance OneNote Windows 10 Financial Encryption GPS Phone System Unified Threat Management Data Security Google Help Desk Notifications IT Services SharePoint Mouse Miscellaneous Sports Utility Computing Theft Gadgets Hotspot Social Networking Upgrade Motion Sickness Electronic Medical Records

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...
QR-Code