Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Password Protecting a Word Document

Tip of the Week: Password Protecting a Word Document

The funny thing about some documents is how the data written on them can strongly influence how important they are. If, for instance, there were two pieces of paper on a table, there is objectively no difference between the two, and so they are objectively equivalent in value.

Continue reading
0 Comments

Want to Keep Your “Personal” Browsing a Secret? Scam Says: Pay Up!

Want to Keep Your “Personal” Browsing a Secret? Scam Says: Pay Up!

A new email scam is making its rounds and it has a lot of people concerned with just how much a hacker can peer into one’s private life. How would you react if a stranger emailed you saying they had inappropriate webcam footage of you?

Continue reading
0 Comments

A QR Code Could Be your New Wi-Fi Password

A QR Code Could Be your New Wi-Fi Password

There is no understating the importance of strong, reliable passwords to your organization’s network security, especially to protect its wireless connection. However, this can create some friction with your staff when they try to connect to Wi-Fi using their mobile device. To make accessing the Internet easier, scannable QR codes can be used to connect to the Internet.

Continue reading
0 Comments

Let’s All Move on From These 4 IT Frustrations

Let’s All Move on From These 4 IT Frustrations

Technology is supposed to make things easier, yet it’s a common source of frustration when it doesn’t do what it’s supposed to. As an IT company, we experience technology frustrations all the time, and we wish that many of these frustrations could just be eliminated altogether. In our opinion, here are four technology frustrations that need to go.

Continue reading
0 Comments

Tip of the Week: Revamp Your Password Policy with a Password Manager

b2ap3_thumbnail_password_security_400.jpgChanging your password is a pain. After you’ve gone several months with the same one, it can be difficult to remember your new password. Despite this, it’s always recommended that you change your passwords often. Unfortunately, when you change all of your passwords often, it’s even easier to forget them. Instead of using a post-it note on your monitor, you should instead try using a password manager.

Continue reading
0 Comments

Personal and Private Data Continues to Leak from Sony

b2ap3_thumbnail_password_protection_400.jpgThis holiday season might leave technology and entertainment supergiant Sony with nothing but a big lump of coal in its stocking. In a high-profile hack, hackers continue to leak Sony’s employees’ sensitive information like Social Security numbers, passports, and even personal emails. This is obviously an issue for the company, but so is its lack of IT security, as shown by their passwords being stored in a folder named “Passwords.”

Continue reading
0 Comments

When it Rains, it Pours – Keep Your Cloud-Based Data Safe

b2ap3_thumbnail_keep_cloud_data_safe_400.jpgDo you see those black clouds culminating on the horizon? They represent the possibility that hackers will gain access to your cloud storage. Though it is protected a number of ways, it will not stop an experienced hacker. To them, your defenses are as transparent as those thin, wispy, cirrus clouds that are so welcome on a boiling hot summer day.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Marketing Automobile IT Support BYOD Proactive Word Hackers Mouse RMM WPA3 Piracy Cache Mobile Security Data Warehousing Language User Time Management Botnet Outlook Unified Communications Public Cloud Solid State Drive PDF Social Networking Recovery How To Business Technology Blockchain Outsourced IT Data Security Disaster Recovery Law Enforcement Smart Technology Employees Network Knowledge Chatbots Writing Computer Mobile Computing Windows 10 Remote Workers Data Managed IT Service Identity Theft Social Media Instant Messaging Theft Black Friday Webcam Modem Typing Test Backups Technology Laws Trending Office Managed Services Provider Cyber Monday Migration Fleet Tracking Mail Merge Hacks IP Address Vulnerability Data Breach End of Support IoT Connectivity Identity 5G Mirgation Computers Wireless Technology Training Efficiency Entrepreneur Virus Windows 8 The Internet of Things Technology Tips Redundancy E-Commerce Search USB eWaste Miscellaneous Collaboration Monitoring Innovation VoIP Favorites Phishing Work/Life Balance IT Technicians File Sharing MSP Identities Computer Care Flexibility Analytics Cables Wireless Motion Sickness Network Security Documents Cryptocurrency Servers Privacy Chromebook Touchscreen Hosted Solution Virtual Private Network Monitors Bookmarks Superfish Software as a Service Motherboard Google Calendar Features Office 365 Read Only Communication Network Congestion Hard Disk Drive Internet of Things Hosted Solutions LiFi Administration Statistics Cybersecurity Technology Compliance Spam Safety Upgrades Human Error Voice over Internet Protocol Intranet Sports Website Bring Your Own Device Lenovo Help Desk Business Management Server Management Analyitcs Hardware Authorization Telephony Mobile Device Managment Tip of the week Content Filtering Gadgets Access Control Saving Time Database Files Physical Security communications Information Financial Authentication Cameras Consumers Comparison Microsoft Office Black Market Two-factor Authentication Specifications Malware IT Support OneNote Chrome How To Microsoft Excel Unified Threat Management Licensing Managed Service Competition Cleaning History Meetings Operating System Crowdsourcing Permission Security Cameras Refrigeration Budget Nanotechnology Tech Term Processors Cloud Managed IT services Hacking IT Consulting Address Alerts Backup and Disaster Recovery IBM Telephone Systems Techology Remote Computing Public Speaking Productivity Disaster Customer Relationship Management Domains Document Management Geography Employee-Employer Relationship Scam Data storage Computer Repair Windows 7 Virtual Reality Going Green App Wasting Time Halloween WiFi Procurement Business Owner Information Technology Project Management Paperless Office Company Culture Managing Stress Computing Microsoft Best Practice Proactive IT Consultation Display Screen Reader Money Tablet CCTV IT Budget Cyberattacks Apps Emoji Taxes Travel Legislation VPN Application Maintenance Shortcut Co-managed IT Cabling Mobility Government PowerPoint Break Fix Saving Money Retail Dark Data Business Growth Corporate Profile Update Bitcoin Best Practices WannaCry Running Cable Holiday Professional Services Network Management Internet Spyware Twitter BDR Cooperation Gmail Staff Alert Data loss Digital Payment Hard Drives Digital Notes Software Tips Mobile Devices Recycling Small Business Printer User Error Big Data Wearable Technology Zero-Day Threat Mobile Device Management Hard Drive Google Maps Cookies Distributed Denial of Service Drones Google Antivirus Dark Web Conferencing Bluetooth Storage Save Money Printing GPS Bandwidth Tracking Net Neutrality Password Firewall Security Customer Service Vendor Management Artificial Intelligence IT Management Management Mobile Office Private Cloud Android Remote Worker Office Tips Applications Virtual Assistant VoIP YouTube Star Wars Google Docs Finance Email Education Networking Web Server Permissions Vulnerabilities 3D Printing Backup Business Continuity Health High-Speed Internet Supercomputer Workplace Tips Operations Smart Tech Hacker Cybercrime CIO HIPAA Digital Signature Virtualization Buisness Quick Tips Encryption Hiring/Firing Deep Learning Cost Management Facebook Avoiding Downtime Data Management Google Wallet Gadget Machine Learning Assessment ROI Consulting Scary Stories Apple Regulations Upgrade IT solutions Enterprise Resource Planning Data Backup Electronic Medical Records Automation Utility Computing Programming Smartphone Internet Exlporer Business Intelligence Tip of the Week Electronic Health Records Cloud Computing Enterprise Content Management Heating/Cooling Presentation Relocation Social Smartphones Risk Management Downloads Politics Employer-Employee Relationship Legal Undo Laptop Settings Save Time Current Events Environment Error Asset Tracking Google Drive Ransomware IT Services Windows Infrastructure Multi-Factor Security Data Recovery Point of Sale Tech Terms Business IT Consultant Unsupported Software Personal Information Fun Tech Support Mobile SharePoint Troubleshooting Managed Service Provider Managed IT Services Augmented Reality Remote Monitoring and Management Server IT service Notifications Mobile Data Users Wi-Fi Development Staffing Sync Samsung Firefox SaaS Business Computing Wires iPhone User Tips Robot Windows 10 Software Passwords Websites Mobile Device Phone System Alt Codes Experience Virtual Desktop Remote Monitoring Humor Productivity Healthcare Social Engineering Downtime Computing Infrastructure G Suite Hotspot Administrator Patch Management Disaster Resistance Managed IT Lithium-ion Battery Uninterrupted Power Supply Browser Router Fraud Cortana Unified Threat Management

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code