Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Password Protecting a Word Document

Tip of the Week: Password Protecting a Word Document

The funny thing about some documents is how the data written on them can strongly influence how important they are. If, for instance, there were two pieces of paper on a table, there is objectively no difference between the two, and so they are objectively equivalent in value.

Continue reading
0 Comments

Want to Keep Your “Personal” Browsing a Secret? Scam Says: Pay Up!

Want to Keep Your “Personal” Browsing a Secret? Scam Says: Pay Up!

A new email scam is making its rounds and it has a lot of people concerned with just how much a hacker can peer into one’s private life. How would you react if a stranger emailed you saying they had inappropriate webcam footage of you?

Continue reading
0 Comments

A QR Code Could Be your New Wi-Fi Password

A QR Code Could Be your New Wi-Fi Password

There is no understating the importance of strong, reliable passwords to your organization’s network security, especially to protect its wireless connection. However, this can create some friction with your staff when they try to connect to Wi-Fi using their mobile device. To make accessing the Internet easier, scannable QR codes can be used to connect to the Internet.

Continue reading
0 Comments

Let’s All Move on From These 4 IT Frustrations

Let’s All Move on From These 4 IT Frustrations

Technology is supposed to make things easier, yet it’s a common source of frustration when it doesn’t do what it’s supposed to. As an IT company, we experience technology frustrations all the time, and we wish that many of these frustrations could just be eliminated altogether. In our opinion, here are four technology frustrations that need to go.

Continue reading
0 Comments

Tip of the Week: Revamp Your Password Policy with a Password Manager

b2ap3_thumbnail_password_security_400.jpgChanging your password is a pain. After you’ve gone several months with the same one, it can be difficult to remember your new password. Despite this, it’s always recommended that you change your passwords often. Unfortunately, when you change all of your passwords often, it’s even easier to forget them. Instead of using a post-it note on your monitor, you should instead try using a password manager.

Continue reading
0 Comments

Personal and Private Data Continues to Leak from Sony

b2ap3_thumbnail_password_protection_400.jpgThis holiday season might leave technology and entertainment supergiant Sony with nothing but a big lump of coal in its stocking. In a high-profile hack, hackers continue to leak Sony’s employees’ sensitive information like Social Security numbers, passports, and even personal emails. This is obviously an issue for the company, but so is its lack of IT security, as shown by their passwords being stored in a folder named “Passwords.”

Continue reading
0 Comments

When it Rains, it Pours – Keep Your Cloud-Based Data Safe

b2ap3_thumbnail_keep_cloud_data_safe_400.jpgDo you see those black clouds culminating on the horizon? They represent the possibility that hackers will gain access to your cloud storage. Though it is protected a number of ways, it will not stop an experienced hacker. To them, your defenses are as transparent as those thin, wispy, cirrus clouds that are so welcome on a boiling hot summer day.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Apps Productivity Black Friday Notifications Tech Term Recycling Telephone Systems How To Network Congestion Geography IT Support Administration WiFi Techology Cookies Recovery Wireless Technology Tips Supercomputer Save Time Managing Stress Going Green Saving Time Twitter Smart Technology Solid State Drive HIPAA Error Humor Managed Service Lithium-ion Battery Nanotechnology Bring Your Own Device Running Cable Motion Sickness Sports Net Neutrality Identities Monitoring Infrastructure Documents Hacks Identity Theft Two-factor Authentication Security Cameras Hard Disk Drive Instant Messaging Remote Computing Data storage Gadgets Competition Robot Malware Corporate Profile Encryption Digital Signature Collaboration Data Breach Office 365 Technology Office Mobile Enterprise Resource Planning Zero-Day Threat Business Owner High-Speed Internet Mobile Security Experience Address Law Enforcement BYOD Software as a Service Social Engineering Marketing Business Technology Analytics Backup and Disaster Recovery Holiday Google Drive Unified Threat Management Server Management Blockchain Star Wars Cameras Vulnerability Analyitcs Cache Display IT Consultant Innovation Efficiency Productivity Cybercrime Networking Document Management SaaS Government Smart Tech Gadget Hiring/Firing IT service Botnet Computing Infrastructure Google Presentation Hacker Firefox Cabling Help Desk IoT CIO Mobile Data Disaster Resistance Screen Reader Internet Motherboard Crowdsourcing Printer Uninterrupted Power Supply Mouse Digital Payment Cryptocurrency Microsoft Communication Management Business Growth Password Human Error Small Business Backup Office Tips Managed IT services Migration How To IT Technicians Tip of the Week Intranet Comparison USB Windows 10 Permission Security Tracking Black Market Network Processors Cyber Monday Downtime Managed IT Service Access Control Personal Information Phishing Trending Staffing Google Wallet Mobile Devices Scam Operating System Hard Drive Data Software Customer Service Assessment Remote Monitoring and Management Education Virus Hosted Solution Computer Google Calendar Spyware Business Training Connectivity Operations Knowledge Social Media Managed IT Services Domains Employer-Employee Relationship Chatbots Environment Unsupported Software Data loss Chromebook Privacy Business Intelligence Scary Stories Budget Meetings Employee-Employer Relationship Hardware Redundancy Statistics Passwords Flexibility IT Budget Backups Consultation Email Upgrades Mobile Device Managment Physical Security Relocation communications Technology Laws Mobile Office YouTube Mobile Computing Cables Servers Cloud Consulting IP Address Best Practices Tech Support App Mobile Device 5G SharePoint Content Filtering Business Continuity Router Search Downloads Hotspot Update Features Cortana Avoiding Downtime Firewall Wires Dark Data Data Security Wearable Technology Touchscreen Information Technology Undo Deep Learning Wi-Fi E-Commerce Upgrade Augmented Reality Authorization Managed IT Piracy Retail Microsoft Excel PDF Laptop Legal Safety Save Money Quick Tips Alert Alerts Miscellaneous VPN WannaCry Risk Management Automation Computers Read Only Development Windows Artificial Intelligence Employees Remote Worker Drones Information Google Maps Paperless Office User Applications Co-managed IT Printing Hard Drives Proactive IBM Web Server Virtual Reality VoIP Gmail Fun Enterprise Content Management Theft Cyberattacks History Data Recovery Fleet Tracking Tip of the week Buisness Public Speaking Company Culture Machine Learning Administrator Politics 3D Printing Conferencing Bluetooth Travel CCTV Utility Computing Digital Multi-Factor Security OneNote Network Management Writing Telephony User Error RMM Authentication Financial Compliance Business Management Licensing Test ROI Word Ransomware Healthcare Patch Management Maintenance Hacking Disaster Recovery VoIP Bookmarks Smartphone Social Proactive IT Windows 8 Apple IT Support File Sharing Settings Chrome Public Cloud Google Docs Halloween Tablet Finance Work/Life Balance Website Customer Relationship Management Virtual Private Network Time Management IT Services Virtual Desktop Refrigeration Electronic Medical Records Monitors Modem Language User Tips Spam WPA3 Vulnerabilities Wireless Technology Cloud Computing Cleaning eWaste Programming Favorites Data Warehousing Distributed Denial of Service Project Management Dark Web Big Data Cybersecurity Outsourced IT Money Specifications Entrepreneur Virtualization Saving Money Smartphones Health Bandwidth Business Computing Internet Exlporer Workplace Tips Regulations Legislation Disaster Browser Permissions Managed Services Provider Hackers Point of Sale Cost Management Hosted Solutions IT Consulting Emoji PowerPoint Network Security GPS Data Backup Consumers Lenovo Samsung IT solutions Remote Monitoring Best Practice Software Tips Identity Webcam Internet of Things Sync Windows 10 Computer Care Current Events Application IT Management Procurement Asset Tracking Mobile Device Management Outlook Vendor Management Mail Merge Superfish Tech Terms Files Bitcoin Alt Codes Phone System Antivirus Taxes Storage Private Cloud Social Networking BDR Staff Computing G Suite Websites Fraud MSP Remote Workers Mirgation Shortcut The Internet of Things Managed Service Provider Heating/Cooling Unified Threat Management Users Cooperation Microsoft Office End of Support LiFi Automobile Typing Android Troubleshooting Mobility Data Management Server Computer Repair iPhone Facebook Break Fix Unified Communications Electronic Health Records

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code