Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

4 Old Internet Protocols Increasingly Vulnerable to Hacking Attacks

b2ap3_thumbnail_language_security_400.jpgWhen the Internet was first established, malware and hacking were in their infancy, and not as much of an immediate problem as they are today. Thanks to this fact, the Internet wasn’t really created with a certain security design in mind, and has instead adapted to shifts in its environment. Unfortunately, as hackers grow more powerful, several of these patchwork protocols are growing outdated.

Continue reading

Can Minecraft Teach Kids Valuable Real-World Programming Skills? [VIDEO]

b2ap3_thumbnail_minecraft_class_400_20140910-173724_1.jpgChildren across the world are heading back to school, and their parents breathe a sigh of relief. Instead of playing video games, children can now expand their minds in institutions designed for learning. But, what if a popular video game could teach children how valuable programming is as a real-world skill?

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Business Technology Remote Workers Hosted Solution Healthcare Staffing Virus Mobile Device Management IT Support Mobile Computing Nanotechnology Flexibility End of Support Migration Unified Threat Management Features Public Speaking Storage Chrome Microsoft Office Mirgation Risk Management Gadgets Alert Application Typing Corporate Profile Work/Life Balance Sync Telephony Domains Crowdsourcing Sports Deep Learning Alt Codes Best Practice Users Network Security Language Office 365 Refrigeration Tip of the Week Permissions Point of Sale Google Drive RMM Apple User Gmail Phone System App Cameras Current Events Human Error Upgrades Gadget Office Tips Procurement Infrastructure Backups Business Owner Remote Monitoring and Management Redundancy Buisness Hotspot Data Backup Disaster Resistance Website Windows 10 GPS Comparison IT Management Hacker Environment Theft Information Hackers Virtualization HIPAA SharePoint Information Technology Emoji WPA3 Computer Entrepreneur Mobile Device Remote Worker Business Consulting Trending Fun Going Green Customer Service Google Docs Applications Save Time Cybersecurity Printing eWaste Malware Techology Taxes Development Training Cloud Computing Identity Microsoft Personal Information Recovery High-Speed Internet Solid State Drive Zero-Day Threat Law Enforcement Safety Scary Stories Bitcoin Black Friday Managed IT Service Windows 10 BYOD Computer Repair Chatbots Uninterrupted Power Supply History Tracking Test Saving Time Vulnerability Bandwidth Government VPN Operations Unified Threat Management Network Congestion Saving Money Geography Disaster Recovery Financial Cloud Analytics Computing Unified Communications Retail Hardware USB Employer-Employee Relationship CCTV Small Business Analyitcs Social Media Virtual Reality Motherboard IoT Specifications Bring Your Own Device Managed Service Provider Social Engineering Customer Relationship Management Conferencing Antivirus IT service Relocation Monitors Experience User Tips Cybercrime Instant Messaging iPhone Technology Laws Data Machine Learning The Internet of Things Cables Network Management Mail Merge Vulnerabilities File Sharing Wireless Star Wars Windows 8 Avoiding Downtime Computers Samsung Screen Reader Telephone Systems Business Computing Search Money Downtime Monitoring Encryption Server Management WannaCry Vendor Management Google Wallet Mobile Wires Mobile Device Managment WiFi Data Security Data storage Hacking Facebook Holiday Electronic Medical Records Internet Exlporer Automobile Tablet Humor Running Cable Company Culture OneNote Cabling Hosted Solutions communications Downloads PDF Break Fix Fleet Tracking Superfish Network G Suite Internet of Things Privacy Administration IT Consulting YouTube Documents Document Management Maintenance Word Automation Firefox IT Consultant Proactive Budget Marketing Best Practices Mouse Processors Licensing Legal Virtual Desktop Networking Laptop Hard Disk Drive Lithium-ion Battery Backup Help Desk Touchscreen User Error Innovation Business Continuity Cost Management Scam Recycling Mobile Office Cortana Software Access Control Project Management Co-managed IT Halloween Files Update Two-factor Authentication Botnet MSP CIO Smart Tech Managed Service Digital Payment IP Address Smartphones Mobile Data Employees IT Services Favorites Dark Data Business Growth Intranet Multi-Factor Security Blockchain Consultation Patch Management Travel Cyber Monday Enterprise Resource Planning ROI Collaboration Data Breach Identities Security Quick Tips Chromebook Supercomputer Upgrade Smart Technology Fraud Tip of the week Alerts Unsupported Software Private Cloud Browser Windows VoIP Hard Drives Legislation Managed IT services Big Data Cache 5G Communication Disaster Error Web Server Health Utility Computing Mobile Devices Password Management Shortcut Smartphone Router SaaS Software as a Service Managed Services Provider Distributed Denial of Service Public Cloud Social Piracy IT Technicians Authorization Staff How To PowerPoint Electronic Health Records Wireless Technology LiFi Meetings Motion Sickness Tech Term Hiring/Firing Artificial Intelligence Managed IT Twitter Drones Writing Identity Theft Mobile Security Managed IT Services Net Neutrality Finance Enterprise Content Management Notifications Heating/Cooling Hacks Time Management Dark Web Office Spam IT Support Data Management Assessment Undo Robot Cooperation Efficiency Save Money Websites Workplace Tips Hard Drive Authentication Modem Presentation Software Tips Microsoft Excel Outsourced IT Productivity Ransomware Cryptocurrency Lenovo Computing Infrastructure BDR Firewall Physical Security Google Maps Digital Signature Internet Digital Email Printer IT solutions Data Warehousing Bookmarks 3D Printing Android Settings Webcam Wi-Fi IBM VoIP Servers Wearable Technology Asset Tracking Education Social Networking Bluetooth Remote Computing Google Tech Support Statistics Tech Terms Content Filtering Competition Regulations Computer Care Technology Knowledge Politics Compliance Paperless Office Backup and Disaster Recovery Employee-Employer Relationship Display Apps Connectivity Cleaning E-Commerce Security Cameras Address Troubleshooting Business Management Passwords Remote Monitoring Server Data Recovery Consumers Administrator Proactive IT Outlook Productivity Read Only How To Spyware Augmented Reality Permission Miscellaneous Google Calendar Virtual Private Network Mobility Business Intelligence Black Market Managing Stress Cookies Cyberattacks Data loss Technology Tips Phishing Operating System IT Budget Programming

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...