Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can the Government Really Stop People From Sharing Netflix Passwords?

Can the Government Really Stop People From Sharing Netflix Passwords?

Do you loan out your Netflix password to friends so that they can catch up on their favorite shows? If so, you’re in violation of a recent federal court ruling, which declares that sharing a password of any kind is now a federal offense. So, if you plan on watching the new Netflix original series Stranger Things, you may want to reconsider how you plan to do so.

Continue reading
0 Comments

Tip of the Week: Forgot Your Wi-Fi Password? Here’s How to Find It

Tip of the Week: Forgot Your Wi-Fi Password? Here’s How to Find It

You might know your Wi-Fi password, but can you tell your new staff members, guests, and clients, what it is off the top of your head? If you don’t write your password down, or store it somewhere that’s easily accessible, it can be difficult to remember; especially if it’s long and complex like it should be. Thankfully, if you already have a computer connected to the network, you can easily find out what your Wi-Fi password is.

Continue reading
0 Comments

Tip of the Week: What to Do When Passwords “Don’t Cut the Mustard” Anymore

b2ap3_thumbnail_password_locks_400.jpgVirtually every kind of online account requires a password. Yet, due to the aggressive nature of hackers, passwords alone are no longer enough to protect your information. The best way to approach network security is to have more protections in place than just a flimsy password.

Continue reading
0 Comments

Passwords May Be “Ineffective,” But They’re Still Necessary

b2ap3_thumbnail_security_solution_password_400.jpgIt seems like we can’t go on the Internet without reading about some sort of data breach. Sometimes they’re caused by poor security measures, like lack of data encryption or two-factor authentication; other times, it’s because of lackluster password security. Despite the antiquity of the username and password, they’re staples in the modern office. Thus, it’s important that they’re as secure as possible at all times.

Continue reading
0 Comments

The US Military Plans to Bring Biometric Passwords to the Public

b2ap3_thumbnail_biometric_security_systems_400.jpgHumans are always trying to improve security protocols that can protect against increasingly advanced online threats. Unfortunately, the threats only grow stronger in response, and the war against malicious online activity rages on. Biometrics are security measures that are growing in popularity, but are expensive and difficult to integrate. Now, the US military is funding a campaign to make it more readily available to end users.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Samsung IT solutions Sync Outsourced IT ROI Gadgets Save Money Hard Drive Upgrade Company Culture Business eWaste Unified Threat Management Telephony Administrator Remote Monitoring Best Practices Computer Repair Solid State Drive Test Mobile Device Managment Microsoft Development G Suite Touchscreen Chrome Wireless Technology Telephone Systems Digital Payment Zero-Day Threat Cooperation Alerts SharePoint Data Security Managed IT Services Collaboration Applications Managed IT Government File Sharing Business Management Data storage Legal Cyber Monday Network Congestion Automobile Mobile Office Chatbots Retail Mobile Device Microsoft Excel Content Filtering Data Management Intranet IBM Black Market Proactive Hosted Solutions Storage Running Cable Upgrades Privacy Bookmarks Ransomware Scam The Internet of Things Outlook Spyware Procurement Webcam Shortcut Workplace Tips Analytics Unified Communications PDF Employer-Employee Relationship Presentation How To Training Dark Data Wireless Computer Gadget Windows 8 Computers Specifications Productivity Private Cloud Data Backup Managed Service Mobile Device Management Innovation Hosted Solution Humor Productivity Users Identity Help Desk Undo Managed Service Provider PowerPoint Google Calendar Servers USB Electronic Medical Records Downtime Travel Finance Mail Merge Two-factor Authentication GPS Laptop 5G Work/Life Balance Corporate Profile Identities Physical Security Piracy Buisness Emoji Co-managed IT Automation Disaster Hard Drives Business Intelligence Uninterrupted Power Supply Hotspot Mobile Data Geography Law Enforcement Lithium-ion Battery Backups Alt Codes Settings Smart Technology Encryption Malware Deep Learning Phone System Comparison Mobility Features Assessment High-Speed Internet Scary Stories Firewall Supercomputer Documents Bluetooth RMM Internet Exlporer Tracking How To Favorites Tech Term Risk Management Crowdsourcing Digital Signature Blockchain Environment Saving Money Website Vulnerabilities Social Media Instant Messaging Nanotechnology Network Management Remote Worker Hacker Alert Google Wallet Hacks Operating System Management Employees Cyberattacks Asset Tracking Enterprise Resource Planning Electronic Health Records Cloud Computing Backup Project Management Cybercrime Competition BDR IT Support Taxes Software Phishing Recycling Bitcoin Break Fix Computing Superfish Hiring/Firing Customer Service Printing Conferencing Save Time Tip of the week Network Security Augmented Reality IT Technicians E-Commerce Tech Support Web Server Cost Management Antivirus Virtual Private Network Email Miscellaneous iPhone Windows 10 Networking Apps Compliance Distributed Denial of Service VPN Cryptocurrency Enterprise Content Management Android Permission Computer Care CCTV Business Continuity Digital communications Virus Efficiency End of Support Office Customer Relationship Management Update Internet Authorization Sports Network Cortana Current Events Proactive IT Mobile Application Google Docs Connectivity SaaS Unsupported Software Server Point of Sale Knowledge Read Only Public Cloud Access Control Maintenance Operations Permissions IT Support Botnet Lenovo Technology Tips Disaster Resistance Business Growth Typing HIPAA Politics User Error Cache IT service Halloween Security Machine Learning Google Drive Black Friday Google Software as a Service WPA3 Statistics Hackers Motion Sickness Quick Tips Programming Tip of the Week Legislation Remote Monitoring and Management Public Speaking Data Breach Managing Stress Downloads Cables Hard Disk Drive Virtual Reality Personal Information Google Maps Windows 10 Managed IT Service Windows Employee-Employer Relationship Identity Theft Data Warehousing Server Management Meetings Data loss Virtualization Printer 3D Printing Administration Virtual Desktop Computing Infrastructure BYOD Screen Reader OneNote Wearable Technology Relocation Business Technology Router Gmail VoIP Avoiding Downtime Remote Workers Motherboard Refrigeration Mobile Computing Fraud IT Budget Artificial Intelligence Password Cabling WiFi Experience Authentication Techology Marketing User Tips Cleaning Browser Remote Computing Files Facebook VoIP Cybersecurity Migration Internet of Things MSP Recovery Information Technology Cloud Managed Services Provider Smartphones Monitoring Cameras Apple Microsoft Office IT Services Safety Education Technology Laws Passwords Language Websites Word Communication Managed IT services Consulting Error Business Computing Drones Smartphone Spam Holiday Technology Tech Terms Consultation Staffing Regulations IoT Vendor Management Chromebook Dark Web Notifications Saving Time Hacking Fleet Tracking Backup and Disaster Recovery Mobile Devices Licensing Paperless Office IT Management Cookies Small Business Trending Processors Wi-Fi IT Consulting Flexibility Entrepreneur Troubleshooting Domains Data Recovery Going Green Document Management Consumers Information Office 365 Monitors CIO Twitter Health App Human Error Disaster Recovery Mouse Vulnerability Unified Threat Management LiFi WannaCry Security Cameras Hardware Social Networking Financial Multi-Factor Security Mobile Security Staff Star Wars Office Tips Wires Social Engineering Best Practice Business Owner Display Theft Data Tablet Search Fun Big Data Mirgation Time Management Money Analyitcs Patch Management Smart Tech Firefox Heating/Cooling YouTube Redundancy Utility Computing Modem Bring Your Own Device Robot IP Address Healthcare Bandwidth IT Consultant Writing Address Infrastructure Software Tips User History Budget Net Neutrality Social

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code