Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 4 Key Spots Every Business Should Cover With Security Cameras

Tip of the Week: 4 Key Spots Every Business Should Cover With Security Cameras

Whether you are looking to prevent theft, curb employee time-wasting, or get a handle on workplace efficiency, security cameras are a solution that prevents and protects you from a wide variety of issues.

Continue reading
0 Comments

FBI Issues Warning About Critical Infrastructure Getting Hacked

FBI Issues Warning About Critical Infrastructure Getting Hacked

There aren’t many instances of hackers targeting physical infrastructure, but the few that make themselves known tend to be quite catastrophic. Take, for example, the devastating cyber attack on the Ukrainian power infrastructure, which left thousands of citizens powerless. Now, several months later, authorities believe that other major countries could also become a target of similar attacks.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Staffing Budget Save Money Managed IT services Outlook Travel Email Office Tracking Risk Management Ransomware Virus Documents VPN Best Practice Identity Theft Server Monitoring Hiring/Firing Miscellaneous Mobile Devices iPhone Hacker Procurement Authorization Disaster Screen Reader Downloads Information Management Managing Stress Utility Computing Managed Service Provider Botnet BDR Tech Term Drones Remote Monitoring and Management Virtualization VoIP Windows 10 Voice over Internet Protocol Unified Threat Management User Remote Worker Security Computers Software Tips 3D Printing Google Docs Sports Robot Disaster Recovery IT solutions Wearable Technology Cybercrime Humor Small Business Redundancy Blockchain Conferencing Saving Money WiFi Cloud Computing Lenovo Browser Google Wallet Microsoft Excel Multi-Factor Security High-Speed Internet Uninterrupted Power Supply Phone System Bookmarks Mobile Computing Monitors Hard Drives Mobile Data Outsourced IT Break Fix Dark Data Help Desk Human Error Apps Network Management Proactive IT Analytics Data storage Specifications Mobile Security Recovery Internet of Things Technology Tips Cameras Taxes Telephony Best Practices Digital Payment Data Management Employees Web Server Hosted Solutions Encryption WannaCry Innovation Settings Vulnerability Wireless Professional Services Government Efficiency Technology Laws Authentication Point of Sale Computer Care Social Safety Cables Data Backup Word Administration Communication MSP IT Support Connectivity History Knowledge Electronic Medical Records Deep Learning Cache Corporate Profile Relocation Applications Search Hard Disk Drive Users Workplace Tips Error Smartphone Refrigeration Managed Service Phishing Solid State Drive Avoiding Downtime Wires Cloud Server Management Hardware IT service Data Warehousing Motherboard Motion Sickness Remote Workers Physical Security Programming Zero-Day Threat Marketing Hackers Office 365 Mirgation Health Financial Network Security Microsoft Scam Computer App Microsoft Office Cryptocurrency Trending Gadget User Error Gadgets Collaboration Access Control Upgrade Tech Terms Cortana IoT Finance Windows Current Events Two-factor Authentication Storage The Internet of Things Personal Information Network Test Facebook Privacy Asset Tracking Computer Repair Wireless Technology Typing Writing Remote Computing Legislation Automobile Fun Telephone Systems Assessment Productivity Database Internet Exlporer Internet Notes Google Calendar Google Drive Meetings Mouse Virtual Private Network CIO Automation Instant Messaging PowerPoint Saving Time Legal Permissions Competition Files Managed Services Provider Maintenance Chromebook Malware Tip of the week User Tips Education Consumers Running Cable Public Cloud Windows 8 Data Public Speaking Information Technology Customer Relationship Management Vendor Management Computing Supercomputer Analyitcs How To Wasting Time Bitcoin Bandwidth Administrator Law Enforcement Apple Permission WPA3 Politics 5G Business Tech Support Mobile Device Management IT Consultant Unified Threat Management Proactive Alert YouTube Mail Merge Work/Life Balance Application G Suite Regulations Intranet Virtual Desktop Business Computing communications Network Congestion Servers OneNote Business Continuity Display Cyber Monday Twitter Smart Technology Licensing Black Market SaaS Digital Passwords Bluetooth Office Tips PDF Retail Mobile Device Managment Going Green Wi-Fi Patch Management Holiday Development IT Consulting Digital Signature Tip of the Week Laptop Compliance End of Support VoIP Smartphones IT Services Unsupported Software Domains BYOD IT Technicians Printer Halloween Migration Electronic Health Records Environment Money Favorites Staff Star Wars Artificial Intelligence Router Managed IT Service Alt Codes Password IBM Mobile Office Hotspot Business Owner Gmail Presentation Fraud Virtual Reality Paperless Office Enterprise Resource Planning Touchscreen CCTV Cleaning Distributed Denial of Service Cooperation Features Data loss Vulnerabilities Chrome Modem Cookies Healthcare Chatbots Heating/Cooling Statistics Techology Theft ROI GPS Training Data Recovery Business Management Co-managed IT IP Address Big Data Undo Identities Samsung Social Engineering Scary Stories Buisness Virtual Assistant Social Networking Company Culture Infrastructure Read Only IT Budget Lithium-ion Battery Flexibility Consultation Cybersecurity Mobile Upgrades Networking Notifications Tablet Social Media Net Neutrality Google Bring Your Own Device Identity Cabling Hacks Backups Firewall Data Security Mobility Android Sync Backup Business Growth Spam Alerts Webcam Troubleshooting Comparison Unified Communications Superfish Mobile Device Crowdsourcing Employee-Employer Relationship Hard Drive Productivity Document Management Managed IT Customer Service Quick Tips Operations Address HIPAA Project Management Black Friday Website SharePoint IT Management Remote Monitoring Processors Websites Experience Consulting Operating System Private Cloud Augmented Reality Security Cameras LiFi Dark Web Computing Infrastructure Cost Management Business Intelligence Business Technology E-Commerce Nanotechnology Smart Tech Update Backup and Disaster Recovery Hacking eWaste Windows 7 Save Time Data Breach Antivirus Shortcut Spyware Disaster Resistance Entrepreneur Emoji Downtime Fleet Tracking Content Filtering File Sharing RMM Machine Learning Time Management Cyberattacks Employer-Employee Relationship Recycling Software Printing Geography Firefox USB Technology Windows 10 How To Hosted Solution Language Enterprise Content Management Google Maps Software as a Service Piracy IT Support Managed IT Services

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code