Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 4 Key Spots Every Business Should Cover With Security Cameras

Tip of the Week: 4 Key Spots Every Business Should Cover With Security Cameras

Whether you are looking to prevent theft, curb employee time-wasting, or get a handle on workplace efficiency, security cameras are a solution that prevents and protects you from a wide variety of issues.

Continue reading
0 Comments

FBI Issues Warning About Critical Infrastructure Getting Hacked

FBI Issues Warning About Critical Infrastructure Getting Hacked

There aren’t many instances of hackers targeting physical infrastructure, but the few that make themselves known tend to be quite catastrophic. Take, for example, the devastating cyber attack on the Ukrainian power infrastructure, which left thousands of citizens powerless. Now, several months later, authorities believe that other major countries could also become a target of similar attacks.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Consumers Bandwidth Current Events Instant Messaging Taxes Windows 10 Company Culture Virtualization Update Data Breach Heating/Cooling IT Budget Website Network Content Filtering Paperless Office Virtual Reality Virtual Private Network Break Fix Smart Tech Small Business Software Tips Artificial Intelligence Encryption Outsourced IT Vulnerabilities Wearable Technology Hard Drives Electronic Health Records Wireless Storage Financial Microsoft Office Infrastructure Unified Communications Motion Sickness Business Technology Save Money Remote Workers Upgrades Managed IT Unified Threat Management Identities Data Management BDR Hacking Vulnerability Analytics Chromebook Identity Consultation User Hackers End of Support Holiday Risk Management IT service Computer Office Files Migration Supercomputer Work/Life Balance Apps Big Data Avoiding Downtime Conferencing Screen Reader Firefox Dark Web Miscellaneous G Suite Best Practice Experience Data Backup Cyberattacks Piracy IoT Computer Care Employees Features Proactive IT Computers Health Network Congestion Software as a Service Hard Disk Drive Data Security Maintenance Notifications Mirgation Computer Repair Asset Tracking Information Administrator Marketing Communication Google Calendar Tech Term Best Practices Going Green WiFi Managed IT Service Downtime Tech Terms The Internet of Things Tip of the week Mobility Permissions Google Gadget History IT Consulting Internet Exlporer Save Time Star Wars Mobile Device Management Regulations IT Technicians Drones Solid State Drive Environment Black Market Human Error Botnet Favorites Automation Business Continuity Statistics Assessment Productivity Government Twitter Business Management Web Server Employer-Employee Relationship Remote Monitoring Servers Computing GPS Digital Payment IP Address Shortcut Mobile Devices IT Support Humor Specifications Personal Information CCTV Websites Two-factor Authentication IT Services Social Networking Writing Gmail Saving Money Uninterrupted Power Supply Android HIPAA Alert Staffing Data Warehousing Training Fleet Tracking Email Utility Computing Cache Fraud Network Management VoIP Time Management Upgrade Business Intelligence Bitcoin Business Mobile Device Managment MSP Connectivity Settings Managed Services Provider Bookmarks Tracking Recycling Remote Computing Backup Samsung Mobile Computing Internet Lithium-ion Battery Windows Quick Tips Blockchain Mobile Security Programming High-Speed Internet Phishing Wi-Fi Malware Private Cloud Mobile Windows 8 Politics Internet of Things Social Media Proactive Remote Worker Cryptocurrency Application RMM Cameras Business Owner Backup and Disaster Recovery Data loss Cloud Computing Software Business Computing Authentication Innovation Telephony Productivity Superfish Chrome CIO Undo Hiring/Firing Redundancy Scam Managed Service Net Neutrality Permission 5G Modem Competition Healthcare Techology Digital Smartphone Information Technology Google Docs Google Wallet VoIP WannaCry Data Recovery Mouse Phone System Patch Management Tablet Cybersecurity Mail Merge Running Cable Test Passwords Enterprise Content Management Tech Support Cabling Saving Time Virtual Desktop Retail Server Management How To Workplace Tips Intranet Customer Service Technology Laws Spyware Trending Efficiency Cost Management Robot Office Tips Authorization Hard Drive Corporate Profile Vendor Management Webcam Applications Password Managed IT services Law Enforcement Language Hardware Compliance Cybercrime Word YouTube Server Troubleshooting Public Cloud IT solutions Education Public Speaking Firewall Printing Business Growth Google Drive Chatbots 3D Printing Geography Zero-Day Threat Technology Tips Flexibility Cortana SaaS Halloween iPhone Safety SharePoint Multi-Factor Security Distributed Denial of Service Google Maps Digital Signature IT Consultant Documents Antivirus Read Only Monitoring Meetings Error PDF App Staff Managed IT Services Fun Disaster Recovery Knowledge Deep Learning Unsupported Software Licensing User Tips Address Gadgets Windows 10 Computing Infrastructure Users communications Procurement Nanotechnology Black Friday Processors Sync Mobile Device Hosted Solution WPA3 Management Point of Sale Machine Learning Finance Mobile Data Telephone Systems Emoji IBM E-Commerce Customer Relationship Management eWaste Cables Budget Domains Touchscreen Managed Service Provider Relocation Ransomware Security Cameras Downloads Hosted Solutions Hacks File Sharing Disaster Resistance Router User Error Consulting Disaster Remote Monitoring and Management Search Money ROI IT Support Theft Networking Entrepreneur Virus Administration Security IT Management Cookies Operations Lenovo Data storage Cloud Display Recovery Cyber Monday Network Security Data Access Control Travel Apple Monitors Backups OneNote Spam Hacker Office 365 Electronic Medical Records Legal Typing Enterprise Resource Planning Wireless Technology Project Management Document Management Refrigeration Outlook Legislation Unified Threat Management Automobile Sports Printer Mobile Office Smartphones Browser Smart Technology Collaboration How To Augmented Reality Social Engineering Dark Data Technology USB Co-managed IT BYOD Microsoft Excel Cooperation Managing Stress Development PowerPoint Facebook Tip of the Week Comparison Help Desk Microsoft Laptop Cleaning Scary Stories Bring Your Own Device Crowdsourcing Presentation VPN Motherboard Bluetooth Alerts Employee-Employer Relationship Privacy Physical Security Analyitcs Identity Theft Operating System LiFi Alt Codes Buisness Wires Social Hotspot

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code