Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google Knows Where You Are: Here’s How to Stop Them

Google Knows Where You Are: Here’s How to Stop Them

Late in the summer this past year there were several articles written about how Google would continue to track the location of a person’s smartphone after they had chosen to turn their location settings off. A Princeton researcher corroborated those claims for the Associated Press, traveling through New York and New Jersey with locations services off only to be tracked the entire way. Today, we will discuss this issue, and tell you what you need to know to keep Google from tracking you wherever you go.

Continue reading
0 Comments

Smaller Practices are Choosing Cloud-Based EHR

Smaller Practices are Choosing Cloud-Based EHR

The medical field has spawned all kinds of new technology that takes patient care to the next level. Regulations demand that even smaller practices need to make the jump to electronic medical record systems (also known as electronic health records). These EMR/EHR solutions provide an interface that give providers and patients a way to keep themselves connected to each other--a tool to promote a more efficient delivery method for these services. We’ll take a look at these EMR and EHR solutions that are hosted in the cloud, giving your organization more information to make an educated choice on implementing this software.

Continue reading
0 Comments

Monitoring Pros and Cons

Monitoring Pros and Cons

Dealing with other people, whether in the office or a home environment, can often be troublesome. There is always a case of someone trying to be better than someone else, or trying to take advantage of their naiveté. There are solutions out there that make it easier than ever to help keep your home and business safe. Here are some of the best out there.

Continue reading
0 Comments

How is Blockchain Going to Work with the GDPR?

How is Blockchain Going to Work with the GDPR?

The European Union’s General Data Protection Regulation (GDPR) has gone into effect, and with this new law comes a lot of information your organization needs to consider regarding individual data protection. In particular, the technology of blockchain is difficult to talk about in regard to GDPR, as it’s basically an encrypted and distributed digital ledger. How can blockchain work properly in tandem with the new GDPR regulations?

Continue reading
0 Comments

Want to Keep Your “Personal” Browsing a Secret? Scam Says: Pay Up!

Want to Keep Your “Personal” Browsing a Secret? Scam Says: Pay Up!

A new email scam is making its rounds and it has a lot of people concerned with just how much a hacker can peer into one’s private life. How would you react if a stranger emailed you saying they had inappropriate webcam footage of you?

Continue reading
0 Comments

Tech Term: Encryption Key

Tech Term: Encryption Key

It is no secret that security is an absolutely crucial part of computing in the modern era. Data can very fairly be called the most valuable currency today, which means it needs to be protected. One way to do this is through the use of encryption keys. In this Tech Term, we’ll go over how these keys can protect your data, and how they do so.

Continue reading
0 Comments

Some Providers are Offering Blockchain as a Service

Some Providers are Offering Blockchain as a Service

There’s a big risk associated with implementing any new technology solution for your organization. For one, it’s difficult to know how a specific solution will run without first implementing it. This leads many businesses to avoid implementing a new solution for fear that it won’t be worth the investment. On the other hand, if they fail to implement a new solution, they could potentially lose out on valuable new tools they could use to succeed. How can you get around this issue?

Continue reading
0 Comments

Tech Term: Encryption

Tech Term: Encryption

Your business’ data is often quite sensitive, which is why the professional world employs cryptology to keep it secure while it’s in transit. In terms of computing systems, this is called encryption. It’s the ideal way to secure important assets when you send or store information.

Continue reading
0 Comments

How Your Smartphone Keeps Your Data Safe

How Your Smartphone Keeps Your Data Safe

Smartphones are the predominant mode of communication, as well as now being the devices most used to access the Internet. With so much depending on the modern smartphone, it has become one of the largest, and most competitive, markets of any consumer item. As a result, manufacturers are building devices with software that is able to encrypt the phone against unauthorized access.

Continue reading
0 Comments

According to Study, Only 28% Utilize Two-Factor Authentication

According to Study, Only 28% Utilize Two-Factor Authentication

2FA, or two-factor authentication, is a simple and effective means of boosting your cybersecurity. Despite this, a study performed by Duo Labs suggests that 2FA has not been adopted as much as one might expect, or as much as it should be.

Continue reading
0 Comments

Data Security Has to Be A Priority For Your Organization

Data Security Has to Be A Priority For Your Organization

Considering that since January 1st of this year, there has been upwards of 10 million personal information records lost or stolen each day, odds are that you, or someone you know, has had their records compromised by a data breach. With such a high incident rate, individuals and businesses that have never received any kind of notification that their records were included in a breach, generally consider themselves lucky and assume that they are not at risk of identity theft or unauthorized account usage. Unfortunately for them, that is not always the case.

Continue reading
0 Comments

October is Cybersecurity Awareness Month

October is Cybersecurity Awareness Month

Cybercrime is the fastest growing criminal activity in the world. From the largest enterprise to the individual, it can affect anyone, anywhere. To help ensure the cybersecurity of American citizens and their businesses, the Department of Homeland Security (DHS), United States Computer Emergency Readiness Team (CERT), and the Federal Bureau of Investigation (FBI) and other agencies work together every October to raise awareness about the threats people face online through a series of educational events and activities.

Continue reading
0 Comments

What Hackers Are Looking For On Your Network

What Hackers Are Looking For On Your Network

When a hacker tries to infiltrate your network, they are doing so with a purpose in mind. Usually they are looking for specific information, like account credentials, personal information, or files that can be used to blackmail victims. Regardless, we’ll go over what a hacker can do with the information that they collect from you, and how you can best protect it from them.

Continue reading
0 Comments

Tip of the Week: Using These Websites Can Help Preserve Your Privacy

Tip of the Week: Using These Websites Can Help Preserve Your Privacy

Everyone has a right to privacy. However, with the popularity of social networks, the Internet is a very hard place to remain a private individual. Digital communication is everywhere. Cybercrime has become a fairly regular event. This week’s tip of the week takes a glance at three websites that you can use to help enforce your right to privacy.

Continue reading
0 Comments

Would You Share Your Browser History? This Ransomware Will

Would You Share Your Browser History? This Ransomware Will

Ransomware is a tricky piece of malware that locks down the precious files located on a victim’s computer, then (in theory) will return access to them when a ransom has been paid. Depending on the files stored on a victim’s computer, they might simply blow it off and not worry too much about losing access to a couple of pictures or videos--but what if this ransomware threatened to expose your web browsing history?

Continue reading
0 Comments

Are You Prepared For Incoming Threats To Your Systems?

Are You Prepared For Incoming Threats To Your Systems?

It doesn’t matter if you’re a small business, a large enterprise, or if you're in a rural town, or a larger city. You still have to worry about the security of your data and the integrity of your infrastructure. Thankfully, there are services out there that allow even small businesses to leverage powerful, enterprise-level tools for maximum network security. The most valuable of all is perhaps the Unified Threat Management (UTM) tool.

Continue reading
0 Comments

How Do You Feel About ISPs Selling Your Internet Browsing History?

How Do You Feel About ISPs Selling Your Internet Browsing History?

In October of 2016, the Federal Communications Commission designed a set of rules known as the Broadband Consumer Privacy Proposal. These rules had intended to flip the status quo and require Internet service providers (ISPs) to gain their customers’ permission before they harvested their browsing histories to sell to advertisers. This proposal is now moot with the establishment of a new law that passed through Congress and was signed by President Trump in April 2017.

Continue reading
0 Comments

Eliminate Webcam Worry With a Piece of Tape

Eliminate Webcam Worry With a Piece of Tape

Even webcams are susceptible to infestation from RATs, though they may not be the same creatures that haunt subway tunnels or dank basements. Remote Access Tools can be troublesome and, in some cases, invasive. RATs can be used to remotely access a computer and perform any number of functions, including turning on a device’s webcam.

Continue reading
0 Comments

Why Internal Threat Detection is Just as Important as External Threat Protection

Why Internal Threat Detection is Just as Important as External Threat Protection

We all know the dangers of doing business with the Internet. Even a small business has sensitive information that could potentially be stolen. While it’s important to take preventative measures to keep threats out of your infrastructure, it’s equally as important to have measures put into place that can detect threats within your infrastructure.

Continue reading
0 Comments

Is Your Company’s Data Encrypted? It Should Be

Is Your Company’s Data Encrypted? It Should Be

Data might be the most important aspect of your organization, but how well do you protect it throughout your network? Every organization has data like personally identifiable information and financial credentials stashed away somewhere on the network, so security isn’t something that you can ignore. One of the best ways you can safeguard your data is through the use of encryption.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Remote Computing Alert Telephony Business Intelligence Time Management Bitcoin Law Enforcement IT Budget Bluetooth Mobile Data Outlook Best Practice Display Data Security How To Virtual Private Network Mobile Device Managment Information Mobile Device Management Supercomputer Tip of the Week Identity Distributed Denial of Service Employer-Employee Relationship Processors Shortcut Technology Tips Piracy Regulations Hosted Solution Humor Files Current Events User Error Point of Sale Modem Instant Messaging Tech Support Specifications Settings Automobile Help Desk Nanotechnology Meetings Operations Recovery Virtual Desktop Mobile Devices Dark Data Data Breach Multi-Factor Security Users Information Technology Internet of Things Black Market PowerPoint Migration Smartphone Cleaning Compliance Bandwidth Documents History Geography Touchscreen Cybersecurity Miscellaneous Authorization Workplace Tips Chatbots Browser Software as a Service Network Management Business Computing Fun Motion Sickness Professional Services Network communications Laptop VoIP Business Continuity Servers File Sharing IoT Efficiency Google Wallet Solid State Drive OneNote Document Management Managed IT services Social Engineering Statistics Language Privacy Cloud Computing Router Mobility Connectivity IT Technicians Gadgets Competition Health Saving Time Politics Entrepreneur Unsupported Software Consultation Cabling Test Black Friday Best Practices USB Innovation YouTube Identity Theft Utility Computing iPhone Windows 10 Cybercrime Tablet VPN Apps Upgrade Remote Workers Read Only Voice over Internet Protocol Halloween Proactive IT Computer Permissions Digital Windows 10 Cyberattacks Break Fix Monitors Co-managed IT Collaboration VoIP Google Docs Managed IT Spam Phishing Google Drive Hard Disk Drive Telephone Systems IT Support GPS Consumers Administrator Recycling Proactive Microsoft Office Social Media BDR Corporate Profile Data Warehousing Vendor Management Cameras Notes Address Data storage Passwords Google Calendar CCTV Managed Service Provider Legislation Retail Comparison Features Office Tips Mirgation Backup Risk Management IT service Staff Permission 5G Business Growth Business Technology Hard Drives How To Unified Threat Management Security Cameras Going Green Data Management Business Samsung Notifications Computer Repair Mobile Device Domains Superfish Bookmarks Undo Disaster Windows 8 Patch Management Disaster Recovery Analytics Money Buisness Public Speaking The Internet of Things Data Backup Mobile Office Budget Database Malware Microsoft Excel Managed Services Provider Wasting Time IT Services Scam Training Smartphones Digital Signature Content Filtering E-Commerce SaaS Phone System User Tips Storage Drones Google Trending Cookies Lithium-ion Battery Website Augmented Reality IT Consultant Troubleshooting IT Consulting Update Enterprise Content Management Managed Service Tip of the week Mail Merge Crowdsourcing Typing Mouse Software Fraud Electronic Medical Records Server Management BYOD Office Managed IT Service Marketing End of Support Upgrades Enterprise Resource Planning Intranet LiFi Social Networking Technology Laws Wi-Fi Emoji HIPAA Operating System SharePoint Antivirus Firewall Cryptocurrency Spyware Internet Exlporer Computing Cortana Wearable Technology Uninterrupted Power Supply MSP Hardware Tech Term Experience Healthcare Business Owner Two-factor Authentication IP Address Robot Saving Money Lenovo Employees Computers IT solutions Vulnerability Automation Hacking Alt Codes Managing Stress Personal Information Hard Drive Windows 7 Management Public Cloud Botnet eWaste Network Security Downloads Avoiding Downtime Virus Hiring/Firing Hosted Solutions Printing Apple Refrigeration Microsoft Cooperation Business Management Cost Management Work/Life Balance Twitter Mobile Unified Threat Management Windows Consulting Running Cable Tracking Email Web Server Scary Stories Downtime Legal Access Control IT Support Tech Terms Asset Tracking Fleet Tracking Mobile Computing Bring Your Own Device Quick Tips Save Money Artificial Intelligence Virtualization Theft Hacks Programming Social Identities Wireless Technology Error Google Maps Flexibility Gmail ROI Chromebook Writing Safety Zero-Day Threat Private Cloud Encryption Electronic Health Records Unified Communications Net Neutrality Cyber Monday Travel Networking Save Time Human Error Outsourced IT Data Financial Analyitcs Paperless Office Redundancy Ransomware Facebook Applications Communication Assessment Computer Care Android Virtual Reality Backups Big Data Holiday Administration Deep Learning Blockchain Sports Internet Favorites Websites Disaster Resistance Maintenance IT Management Smart Tech Authentication Search Gadget Presentation Dark Web Heating/Cooling Taxes Backup and Disaster Recovery Government Technology Software Tips WannaCry Relocation Office 365 Hotspot Alerts Chrome Machine Learning Sync Screen Reader PDF Data loss Conferencing App Password Wireless Managed IT Services Hackers Company Culture Environment Productivity Network Congestion Smart Technology Data Recovery Firefox Procurement Education Cables Licensing Techology Productivity Application Vulnerabilities Server WPA3 Development Remote Monitoring Mobile Security IBM Word Webcam 3D Printing WiFi User High-Speed Internet Customer Service CIO Project Management Cache Security Customer Relationship Management Staffing RMM Knowledge Star Wars Infrastructure Remote Monitoring and Management Virtual Assistant Physical Security Cloud Finance Remote Worker G Suite Wires Employee-Employer Relationship Hacker Computing Infrastructure Motherboard Monitoring Printer Small Business Digital Payment

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code