Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is Election Technology Solid or Simply Antiquated

Is Election Technology Solid or Simply Antiquated

Election Day in the United States is coming up quick on November 6th. It doesn’t matter what your thoughts or opinions on U.S. politics are--the fact remains that millions of Americans will be using the technology available at polling places to cast their ballots, and if this technology isn’t secured properly, the integrity of the voting system will be at risk.

Continue reading
0 Comments

How Do You Feel About ISPs Selling Your Internet Browsing History?

How Do You Feel About ISPs Selling Your Internet Browsing History?

In October of 2016, the Federal Communications Commission designed a set of rules known as the Broadband Consumer Privacy Proposal. These rules had intended to flip the status quo and require Internet service providers (ISPs) to gain their customers’ permission before they harvested their browsing histories to sell to advertisers. This proposal is now moot with the establishment of a new law that passed through Congress and was signed by President Trump in April 2017.

Continue reading
0 Comments

Hackers Target Voter Information Databases to Steal Personal Data

Hackers Target Voter Information Databases to Steal Personal Data

Hackers are always getting their hands into sticky situations, but one of the hot topics in world politics--the 2016 United States presidential election--is one of the nastier ones in recent years. In the past few months alone, hackers have reportedly breached not only the Democratic National Committee, but have also infiltrated at least two state election databases.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Cabling Wearable Technology Physical Security Business Computing Mobile Device Managment Webcam Files Websites Bitcoin Chatbots Tracking Unified Communications Small Business Wires Business Intelligence IT Consultant Public Speaking Legislation Heating/Cooling Firewall Lithium-ion Battery User Error Passwords Virtualization Save Money Internet Exlporer Security Cameras Operations Cameras SharePoint Mobile Security Instant Messaging Cybersecurity Compliance Permissions Staff Recovery Multi-Factor Security Networking Word Business History Sports Information Lenovo Upgrades Work/Life Balance The Internet of Things Geography Privacy Hosted Solution IT Technicians Managed IT Mobile Computing Miscellaneous Tip of the week Cooperation Server Management Augmented Reality Internet of Things Managing Stress Intranet Security Uninterrupted Power Supply Mouse Server Education Environment Business Continuity Robot Language Meetings Proactive Techology Hotspot Remote Workers Network Management Communication MSP Hosted Solutions Computing Infrastructure BDR Emoji Co-managed IT Save Time Taxes Bring Your Own Device Avoiding Downtime Dark Web Notes Gmail VoIP Office 365 Alert Remote Monitoring and Management Digital Tech Support Competition Email Vulnerabilities Automobile Nanotechnology Motion Sickness Laptop Office Technology Tips Remote Worker Document Management Spam WannaCry IT service Disaster Recovery Scary Stories Development Favorites OneNote Users Disaster Cyber Monday Network Electronic Health Records Vendor Management Enterprise Resource Planning BYOD Statistics Fleet Tracking Social Google Calendar IT Support Management Consumers Typing Theft Malware Identity Theft Backup and Disaster Recovery Productivity Firefox Cleaning Authorization Chromebook E-Commerce Human Error How To Twitter Data Breach Android Specifications Business Management IT Management Data Security Website Corporate Profile Printing Identities Health Unified Threat Management Undo Apple Politics Supercomputer Update SaaS CIO Business Growth VPN Professional Services Test Running Cable Outlook Smart Technology Programming End of Support Dark Data Notifications Private Cloud Data Warehousing Business Owner Windows Saving Time Enterprise Content Management Managed IT services Administration IoT Project Management Regulations Knowledge Features RMM Comparison Financial Net Neutrality Assessment Technology Managed Services Provider Google Hard Disk Drive Permission Printer Downloads Botnet WPA3 Cost Management Computers Settings Cyberattacks Collaboration Relocation Law Enforcement Computer Cloud Computing Address Big Data Cortana Hiring/Firing Error Blockchain Retail Access Control Flexibility Wi-Fi Bluetooth Electronic Medical Records Hackers Machine Learning Black Market Internet Screen Reader Google Maps Virtual Desktop Productivity Company Culture Two-factor Authentication Presentation Windows 10 Data Backup Money Servers Government Chrome Licensing Paperless Office Superfish Consulting GPS Shortcut Quick Tips Microsoft Drones Computing Crowdsourcing HIPAA Motherboard Recycling Employees Cache Cybercrime Social Engineering Data Recovery Personal Information Mirgation Wasting Time Help Desk Bandwidth Hardware Smartphone Consultation 3D Printing File Sharing Smartphones Windows 7 Software Tips Efficiency Conferencing Hard Drives Web Server Cloud Refrigeration Encryption Employee-Employer Relationship Halloween Fun Budget Black Friday Holiday PowerPoint Password Entrepreneur Ransomware Humor How To ROI Artificial Intelligence Infrastructure Safety Break Fix User Vulnerability Outsourced IT Proactive IT Windows 10 Spyware Unsupported Software Tip of the Week Tech Term Trending Processors IT Support Virtual Assistant Gadgets Applications Computer Care 5G Mobile Office Patch Management Bookmarks Application Tablet Router Microsoft Excel Maintenance communications Software Display Travel Office Tips Distributed Denial of Service Virtual Reality Cookies Phishing CCTV User Tips Google Drive Sync Upgrade Fraud LiFi High-Speed Internet Administrator Microsoft Office Information Technology Backups Public Cloud Telephony Mobile Device iPhone Staffing Employer-Employee Relationship Procurement Content Filtering WiFi Automation Social Networking Analyitcs Healthcare Remote Computing Mobile Devices Virus Tech Terms App Storage Technology Laws Google Docs Managed IT Service Facebook Point of Sale Workplace Tips Search Gadget Analytics Managed IT Services Data loss Unified Threat Management YouTube Digital Payment Data Wireless Technology IT Services Windows 8 Troubleshooting VoIP USB Digital Signature Customer Service Legal Cables Hacker Finance Customer Relationship Management Wireless Read Only Monitors Best Practice Business Technology Deep Learning Domains Scam Migration Hacking eWaste Zero-Day Threat Samsung Identity Apps Data storage Phone System Innovation G Suite Training Downtime Alerts Time Management Hacks Remote Monitoring Writing Smart Tech Solid State Drive Backup Alt Codes Google Wallet Voice over Internet Protocol Computer Repair PDF Mobile Network Security Best Practices IT solutions Disaster Resistance Mail Merge Star Wars Database IT Consulting Browser Risk Management Data Management Mobile Data Telephone Systems Touchscreen IP Address Authentication Mobility Monitoring Software as a Service Operating System Buisness Piracy Managed Service Provider Experience Saving Money Hard Drive Utility Computing Social Media Documents IT Budget Marketing Antivirus Managed Service Virtual Private Network Modem Current Events Cryptocurrency IBM Connectivity Going Green Asset Tracking Network Congestion Mobile Device Management Redundancy

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...
QR-Code