Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can the Government Really Stop People From Sharing Netflix Passwords?

Can the Government Really Stop People From Sharing Netflix Passwords?

Do you loan out your Netflix password to friends so that they can catch up on their favorite shows? If so, you’re in violation of a recent federal court ruling, which declares that sharing a password of any kind is now a federal offense. So, if you plan on watching the new Netflix original series Stranger Things, you may want to reconsider how you plan to do so.

Continue reading
0 Comments

Tip of the Week: Forgot Your Wi-Fi Password? Here’s How to Find It

Tip of the Week: Forgot Your Wi-Fi Password? Here’s How to Find It

You might know your Wi-Fi password, but can you tell your new staff members, guests, and clients, what it is off the top of your head? If you don’t write your password down, or store it somewhere that’s easily accessible, it can be difficult to remember; especially if it’s long and complex like it should be. Thankfully, if you already have a computer connected to the network, you can easily find out what your Wi-Fi password is.

Continue reading
0 Comments

Tip of the Week: What to Do When Passwords “Don’t Cut the Mustard” Anymore

b2ap3_thumbnail_password_locks_400.jpgVirtually every kind of online account requires a password. Yet, due to the aggressive nature of hackers, passwords alone are no longer enough to protect your information. The best way to approach network security is to have more protections in place than just a flimsy password.

Continue reading
0 Comments

Passwords May Be “Ineffective,” But They’re Still Necessary

b2ap3_thumbnail_security_solution_password_400.jpgIt seems like we can’t go on the Internet without reading about some sort of data breach. Sometimes they’re caused by poor security measures, like lack of data encryption or two-factor authentication; other times, it’s because of lackluster password security. Despite the antiquity of the username and password, they’re staples in the modern office. Thus, it’s important that they’re as secure as possible at all times.

Continue reading
0 Comments

The US Military Plans to Bring Biometric Passwords to the Public

b2ap3_thumbnail_biometric_security_systems_400.jpgHumans are always trying to improve security protocols that can protect against increasingly advanced online threats. Unfortunately, the threats only grow stronger in response, and the war against malicious online activity rages on. Biometrics are security measures that are growing in popularity, but are expensive and difficult to integrate. Now, the US military is funding a campaign to make it more readily available to end users.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Administrator Programming Word Superfish Hacker Consulting WannaCry Password Smartphones Cloud Computing Mobile Device Management Proactive IT Smartphone Backup and Disaster Recovery Managed IT Services Error MSP 5G Point of Sale Financial Internet of Things Remote Worker Buisness Operations Wireless Users Cyberattacks Holiday Retail E-Commerce Web Server BDR Technology Tips Unified Threat Management Computer Business Growth Voice over Internet Protocol Update Patch Management Data Backup Office 365 Authentication Digital Payment Telephony Screen Reader IT Technicians Mobile Device Managment Vendor Management Dark Web Apps High-Speed Internet Save Time Infrastructure Email Best Practice Migration Alerts YouTube Remote Computing Training Tablet Artificial Intelligence Digital Signature Notifications Licensing Permissions Outsourced IT Smart Technology SaaS Fun Google Calendar Samsung Bitcoin GPS Gadgets Wireless Technology Botnet Authorization Competition Customer Service Websites iPhone Application Chrome Mouse Black Market Language Favorites Security Cameras Microsoft Office Maintenance Private Cloud Money Bookmarks Printing IT Services Remote Monitoring communications Hacks Electronic Medical Records Information Modem User Tips Twitter App Data Breach Upgrades WPA3 Office Staff Education Applications Downloads Downtime Cache Enterprise Content Management Business Intelligence Conferencing Co-managed IT Tip of the week Break Fix Digital Statistics Travel Techology Fraud Data Security Help Desk Network Management Unified Communications Google Maps Multi-Factor Security Enterprise Resource Planning Smart Tech Computer Care Files Windows 7 Hotspot Communication IT Budget Entrepreneur Business Computing Content Filtering Crowdsourcing Heating/Cooling Computing Infrastructure Corporate Profile LiFi VoIP Laptop Remote Monitoring and Management Virtual Assistant VoIP Budget Hosted Solution Risk Management Hackers IoT Permission Windows Cookies Hard Drive CIO Mobility Mobile Gmail IBM Running Cable Read Only Business Owner Lenovo Troubleshooting Browser Sync Development Analytics VPN Data Warehousing Software Address Save Money Data Recovery Saving Time Google Drive Telephone Systems Government Humor Vulnerability Taxes USB How To Project Management Motion Sickness Business Business Technology File Sharing Public Speaking Meetings Legislation Trending Storage Hard Drives Deep Learning Machine Learning Data storage Human Error Firewall Printer Managed Service IT Consultant Halloween Piracy Spam Managed Services Provider Analyitcs Networking Relocation Antivirus Internet Exlporer Personal Information Wearable Technology Consumers Mobile Data Chatbots Social Networking Phone System Identities Best Practices Managed IT Service Asset Tracking Managing Stress Network Security Ransomware User Fleet Tracking Malware Touchscreen Computers G Suite Current Events Bluetooth Processors Alt Codes Employer-Employee Relationship Cortana Information Technology Efficiency Access Control Time Management Electronic Health Records User Error OneNote eWaste Bring Your Own Device Mirgation Virtual Private Network Intranet Paperless Office Disaster HIPAA Instant Messaging Zero-Day Threat Public Cloud 3D Printing Wi-Fi Recycling Data Management Business Continuity Firefox IP Address Operating System Android Tip of the Week Avoiding Downtime Business Management Windows 10 Mobile Devices Employees Environment Monitors Quick Tips IT Management Distributed Denial of Service Uninterrupted Power Supply Bandwidth Dark Data Network Congestion Disaster Recovery Blockchain Redundancy Backup PowerPoint Spyware Security Emoji Drones Net Neutrality Website Mobile Security Comparison Safety Utility Computing Domains Remote Workers Tech Support Robot Software Tips Hard Disk Drive Office Tips Work/Life Balance Connectivity Data loss Productivity Marketing Database Automation Management Microsoft Data Mail Merge Webcam IT Support Servers IT solutions Undo Cybercrime Politics Virus Legal Technology Laws Features Law Enforcement Display Flexibility Windows 8 Passwords Productivity Disaster Resistance Phishing How To Cabling IT Support Cables Wires Managed Service Provider Finance Facebook Server Management Shortcut Technology Windows 10 End of Support Hiring/Firing Virtualization Theft Vulnerabilities ROI Identity Theft Chromebook Search IT service Unsupported Software Tech Term The Internet of Things Assessment Typing Tracking Customer Relationship Management Scary Stories Cloud Backups Test Server Administration Augmented Reality Alert Privacy Saving Money PDF Mobile Computing Going Green Geography Tech Terms Staffing Healthcare Mobile Device CCTV Cybersecurity Scam Small Business Company Culture Internet Computer Repair Consultation Document Management Compliance Settings Hosted Solutions Innovation Recovery Nanotechnology Cost Management Collaboration Gadget Experience Hacking Cyber Monday Knowledge SharePoint Notes Regulations Lithium-ion Battery Wasting Time Sports Social Engineering Supercomputer Google Wallet Hardware Monitoring Social Managed IT Employee-Employer Relationship Refrigeration IT Consulting Outlook Unified Threat Management Big Data WiFi Encryption Cameras Workplace Tips Professional Services Star Wars Google Docs Cryptocurrency Procurement Solid State Drive Router Health Virtual Reality Proactive Documents Black Friday Microsoft Excel Cooperation RMM Computing Software as a Service Mobile Office Identity Automobile History Presentation Virtual Desktop Specifications Miscellaneous Google Cleaning BYOD Managed IT services Writing Apple Network Social Media Two-factor Authentication Motherboard Physical Security Upgrade

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code