Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is Election Technology Solid or Simply Antiquated

Is Election Technology Solid or Simply Antiquated

Election Day in the United States is coming up quick on November 6th. It doesn’t matter what your thoughts or opinions on U.S. politics are--the fact remains that millions of Americans will be using the technology available at polling places to cast their ballots, and if this technology isn’t secured properly, the integrity of the voting system will be at risk.

Continue reading
0 Comments

How Do You Feel About ISPs Selling Your Internet Browsing History?

How Do You Feel About ISPs Selling Your Internet Browsing History?

In October of 2016, the Federal Communications Commission designed a set of rules known as the Broadband Consumer Privacy Proposal. These rules had intended to flip the status quo and require Internet service providers (ISPs) to gain their customers’ permission before they harvested their browsing histories to sell to advertisers. This proposal is now moot with the establishment of a new law that passed through Congress and was signed by President Trump in April 2017.

Continue reading
0 Comments

Hackers Target Voter Information Databases to Steal Personal Data

Hackers Target Voter Information Databases to Steal Personal Data

Hackers are always getting their hands into sticky situations, but one of the hot topics in world politics--the 2016 United States presidential election--is one of the nastier ones in recent years. In the past few months alone, hackers have reportedly breached not only the Democratic National Committee, but have also infiltrated at least two state election databases.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Outlook IT Services Facebook Data Management VoIP Mobile Device Managment Staffing Gmail Hacks End of Support Human Error Samsung Specifications Data Backup Managed IT Service Smartphones BYOD Small Business Uninterrupted Power Supply Software Mouse Unsupported Software Server Management Business Continuity Smart Technology Operating System Retail CIO Collaboration Smartphone Emoji Update YouTube Data Recovery Tech Term Internet Telephony Buisness Wires Presentation Typing Employee-Employer Relationship Point of Sale Google Office Tips Finance Upgrades Computer Internet of Things 5G Mobility Business Intelligence Business Computing Managed IT services Co-managed IT IT Support Alt Codes Modem Mirgation Tracking Data storage Two-factor Authentication Asset Tracking Virtual Private Network Intranet OneNote Instant Messaging Monitors Cyberattacks Undo Patch Management Productivity Time Management Bookmarks Upgrade Features Black Friday Applications How To Mobile Devices Multi-Factor Security Touchscreen Smart Tech Application File Sharing Solid State Drive Automation Law Enforcement Enterprise Content Management Save Time Social Media Apple Files IT service Passwords The Internet of Things Permission Theft Phishing Mobile Office Twitter WiFi Entrepreneur Best Practices Unified Threat Management Halloween Mobile Security Cables Notifications Administrator Saving Time Budget Employees Experience Virtual Reality Search Disaster Social Networking Miscellaneous Authentication Politics Data Warehousing WPA3 Mobile How To Electronic Medical Records Computer Repair Digital Payment Money Utility Computing Company Culture Network Congestion Phone System Piracy USB Email Relocation Office Digital Signature Wireless Government LiFi Dark Data Favorites Computer Care Managed IT Meetings Privacy Cloud Computing Avoiding Downtime Remote Worker Data IoT Lithium-ion Battery Project Management Hosted Solutions IT Consultant Documents Risk Management Staff Cloud Operations Windows 10 Mail Merge Word Innovation Hardware Internet Exlporer Network Management Nanotechnology Bitcoin Healthcare IT Budget Business Technology Hosted Solution MSP Downloads Firewall Best Practice Distributed Denial of Service Google Drive Access Control Microsoft Office Read Only Consultation Address Customer Service Security Backups Microsoft Networking Motion Sickness Business Growth Sports Chrome Compliance Robot Windows Managing Stress Test Infrastructure Hard Drive Workplace Tips User SaaS Migration Data Security Downtime Tech Support Cost Management Marketing Productivity Break Fix Security Cameras Hard Disk Drive Computing Infrastructure Private Cloud Public Speaking Comparison Browser Mobile Computing Alerts Information Technology Dark Web Mobile Device Spam Web Server Software as a Service Social Recycling Hard Drives Network Troubleshooting Remote Workers Hacker Automobile E-Commerce Tech Terms Virtual Desktop Bandwidth Business Management Google Docs Firefox Tip of the week Android Conferencing Help Desk Cyber Monday Malware Vulnerabilities Computers Technology Tips Password IT Support Procurement Disaster Resistance Current Events Work/Life Balance Servers Users Managed Service Environment Cleaning Cookies App BDR Tablet Windows 8 Travel Physical Security Websites Augmented Reality Cortana Wearable Technology VoIP VPN Net Neutrality Office 365 RMM Cybercrime Cooperation Bring Your Own Device Proactive IT Information Social Engineering WannaCry ROI Managed Services Provider Network Security Disaster Recovery Chatbots Alert Deep Learning Outsourced IT Saving Money Zero-Day Threat Going Green Microsoft Excel Supercomputer Virtualization Domains Mobile Device Management Backup and Disaster Recovery Save Money Consulting Health Writing Wireless Technology Document Management Remote Monitoring and Management Legal Content Filtering Flexibility Scary Stories History Bluetooth Connectivity Analyitcs Website Competition IT Technicians Google Calendar Backup Electronic Health Records Business Owner Mobile Data Machine Learning Big Data IP Address Cybersecurity Vulnerability Superfish Computing Management Corporate Profile communications Recovery Fun CCTV Technology Proactive Google Wallet Sync Blockchain Error Server Star Wars Remote Monitoring Vendor Management Settings Language IT Consulting Windows 10 Personal Information Efficiency Cryptocurrency Data loss Remote Computing Identity Consumers Legislation Employer-Employee Relationship Education Holiday iPhone Hiring/Firing GPS Apps Unified Threat Management IBM Redundancy Running Cable Technology Laws Antivirus Administration Development Techology Regulations Quick Tips Training Wi-Fi Motherboard Webcam Cameras IT solutions Digital Shortcut Laptop Router PowerPoint Heating/Cooling Enterprise Resource Planning Customer Relationship Management Statistics Scam Public Cloud Google Maps User Tips Monitoring Humor Processors Paperless Office Authorization Ransomware Unified Communications Encryption IT Management eWaste Managed IT Services Botnet Taxes Hacking Assessment Display Licensing Drones Maintenance Crowdsourcing Cache Gadget Printing Fraud Telephone Systems Trending Geography Analytics Tip of the Week Artificial Intelligence Storage G Suite Hotspot Identities Cabling PDF Black Market Lenovo Screen Reader 3D Printing Managed Service Provider Knowledge Refrigeration Software Tips SharePoint Spyware Virus Safety Fleet Tracking Gadgets Chromebook Hackers Programming Printer Business Communication User Error Financial High-Speed Internet Identity Theft HIPAA Data Breach Permissions

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code