Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

4 Old Internet Protocols Increasingly Vulnerable to Hacking Attacks

b2ap3_thumbnail_language_security_400.jpgWhen the Internet was first established, malware and hacking were in their infancy, and not as much of an immediate problem as they are today. Thanks to this fact, the Internet wasn’t really created with a certain security design in mind, and has instead adapted to shifts in its environment. Unfortunately, as hackers grow more powerful, several of these patchwork protocols are growing outdated.

Continue reading

Can Minecraft Teach Kids Valuable Real-World Programming Skills? [VIDEO]

b2ap3_thumbnail_minecraft_class_400_20140910-173724_1.jpgChildren across the world are heading back to school, and their parents breathe a sigh of relief. Instead of playing video games, children can now expand their minds in institutions designed for learning. But, what if a popular video game could teach children how valuable programming is as a real-world skill?

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Technology Laws BYOD Maintenance Outsourced IT Big Data E-Commerce Websites Small Business Zero-Day Threat Chatbots Wasting Time Halloween Passwords Compliance Remote Workers Scary Stories Miscellaneous Remote Worker Phishing Permission Domains Notes SaaS Cortana Electronic Medical Records Work/Life Balance Hardware Cyberattacks Recycling Unsupported Software Apps IT Technicians Smartphone Data Management Operations Cameras Personal Information Avoiding Downtime Workplace Tips Security Cameras Virus Recovery Mirgation Networking Virtual Assistant Website Tablet Hosted Solutions Corporate Profile Environment MSP Mobile Security Google Drive Monitors Browser Analytics Read Only Fun Office LiFi Physical Security Digital Signature Printer Microsoft Office Hacking Managed IT services Business Growth Microsoft Excel Education Presentation Alerts CCTV Saving Money Travel Technology Tips Training Google Digital Consulting Regulations Authorization Gmail Net Neutrality 3D Printing Humor Relocation Privacy Voice over Internet Protocol Motherboard WiFi Legislation Social Networking GPS Upgrades Staffing Politics Mobile Device Deep Learning Crowdsourcing Productivity IT Support Collaboration High-Speed Internet Ransomware Gadget Google Docs Drones Productivity WPA3 IT Support HIPAA Lenovo Data Breach Identity Theft IoT Computing Infrastructure Hacks Unified Threat Management Data storage Managed Services Provider Superfish Mobile Device Management Buisness Licensing Cookies CIO Windows 10 Features Money Save Time Artificial Intelligence Address Network Congestion Geography Blockchain Lithium-ion Battery Writing Hard Disk Drive Automation Tech Support Virtualization Business Continuity Downloads Virtual Reality Cooperation Apple Update Favorites Bookmarks Managed Service Provider OneNote How To Undo Disaster Resistance Administration Webcam Cables Shortcut Mobile Devices Sports Mail Merge Law Enforcement Employees Computer Statistics Monitoring Asset Tracking Enterprise Resource Planning Tip of the Week IT Consultant Wireless Android Star Wars Uninterrupted Power Supply Professional Services Holiday Identity Storage Enterprise Content Management Save Money Windows 10 Efficiency Employer-Employee Relationship Software as a Service IT Budget Business Intelligence Settings VPN Unified Communications Specifications Security Wireless Technology Applications Techology Microsoft Malware Antivirus Managed Service Legal SharePoint User The Internet of Things Development Company Culture Processors Conferencing Twitter VoIP Wi-Fi Information Gadgets Redundancy Business Computing Web Server Disaster Experience Computing IT Services PowerPoint Spam Wires Technology IT Consulting Hard Drive Managed IT Proactive USB Dark Data Typing Current Events Samsung Vulnerability Solid State Drive Multi-Factor Security Mobility Managed IT Services Mouse Virtual Private Network Facebook Computers Time Management Risk Management Server Management Printing Assessment Machine Learning IP Address communications Internet Exlporer Laptop Cleaning Modem Backups Internet Knowledge Social ROI Cybercrime Analyitcs Screen Reader Proactive IT Notifications Network Management Files Network eWaste Consultation Data Backup Comparison Co-managed IT Content Filtering Emoji Word Dark Web Data Warehousing Public Speaking Cost Management Public Cloud Google Wallet Office 365 Communication Cache Network Security Black Friday Motion Sickness How To Government Scam Procurement App Firewall Fraud Social Engineering Disaster Recovery Computer Care Human Error Saving Time Telephony Augmented Reality Piracy Database Managing Stress Mobile Office Social Media Backup and Disaster Recovery Alert Spyware Downtime Digital Payment Meetings Internet of Things Instant Messaging IT Management Cloud Computing Touchscreen Mobile Theft Windows Tech Term Distributed Denial of Service Tip of the week Paperless Office Data Business Owner History Servers Customer Relationship Management Utility Computing Flexibility Tech Terms Firefox Password Software BDR Unified Threat Management Bring Your Own Device Google Calendar Upgrade Robot Connectivity Document Management Hackers Smartphones Hard Drives Retail Remote Monitoring and Management 5G IT solutions Marketing Nanotechnology Managed IT Service Heating/Cooling Outlook Going Green Infrastructure Refrigeration Hotspot Quick Tips Tracking Remote Computing Wearable Technology Best Practice Sync RMM Access Control Mobile Device Managment Troubleshooting Migration Intranet Smart Tech Taxes Entrepreneur Alt Codes YouTube Virtual Desktop Software Tips Fleet Tracking Documents User Tips Administrator Botnet Identities Healthcare G Suite Customer Service Backup VoIP Finance Competition Application Office Tips Innovation Computer Repair Financial Windows 7 Patch Management Hosted Solution Point of Sale Users Email Test Cryptocurrency Business Management User Error Consumers Cyber Monday WannaCry Best Practices Information Technology Bitcoin End of Support Cabling Staff IT service Search Data Security Management Employee-Employer Relationship Automobile Help Desk Hiring/Firing Mobile Data iPhone Router Trending Business Technology Cloud Chrome Black Market Safety Display Business Project Management Budget Authentication Programming Chromebook Permissions Data loss Telephone Systems Smart Technology Hacker Phone System Bandwidth Google Maps Remote Monitoring Bluetooth Server Language Vendor Management Supercomputer Mobile Computing Vulnerabilities PDF Health File Sharing Private Cloud IBM Running Cable Break Fix Operating System Windows 8 Two-factor Authentication Error Electronic Health Records Data Recovery Cybersecurity Encryption

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...