Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

WPA3 is Boosting Network Security

WPA3 is Boosting Network Security

Did you know that prior to this past January, the last big update to Wi-Fi occurred in 2004, when WPA2 was released? The Wi-Fi alliance has introduced a new type of wireless connection called WPA3--one that can dramatically improve security. In reality, it was created with the intention of shoring up weaknesses found as a result of the KRACK vulnerability, which exposed serious issues with WPA2 that needed to be addressed.

Tags:
Continue reading
0 Comments

Tip of the Week: How to Adjust Your Router to Improve Your Connections

Tip of the Week: How to Adjust Your Router to Improve Your Connections

Wi-Fi has been one of the single most useful innovations for the modern office. Connecting to your Internet without having to be physically connected to it via an ethernet wire has been an incredibly freeing process--one that opens up all sorts of possibilities of where (and how) you can get work done. How can you make sure that your Wi-Fi signals are as clear and reliable as possible?

Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Data Backup Hiring/Firing Troubleshooting Computing Infrastructure Document Management Specifications IP Address Windows 7 Google Calendar Assessment Geography Break Fix Cloud Computing Bring Your Own Device Bandwidth Mobile Computing Patch Management USB Wireless Features Technology Laws Administration Network Congestion LiFi Public Cloud Information Webcam Virtual Desktop Internet Exlporer Sports Cache Web Server Government Android Social Engineering Typing Server Management Screen Reader IT Consultant Gadget Unified Communications Google Drive Hacking Google Docs Physical Security Enterprise Content Management Microsoft Excel Small Business WannaCry Notifications Black Friday Risk Management Collaboration Current Events Multi-Factor Security Virtual Assistant Marketing WiFi Staff Hosted Solution Maintenance Windows Quick Tips Identity Theft Undo Smart Tech Piracy Blockchain Presentation Employees G Suite Telephone Systems Technology Alerts Mail Merge Instant Messaging Gmail Read Only Smartphone Cloud Tip of the Week Printer Cameras Social Media Running Cable Error Big Data CIO Operating System Employer-Employee Relationship Chromebook Managing Stress Virus Windows 10 Hard Drive Supercomputer Upgrade Mobile Office Mobile Security Customer Service Techology Samsung User Tips Asset Tracking Content Filtering Computer Computer Care Downloads Office Tips Financial High-Speed Internet Motherboard IT solutions Lithium-ion Battery Encryption Microsoft Gadgets Politics Hard Disk Drive Data Security Competition Consultation Hacker Help Desk Smartphones Hackers Halloween Remote Monitoring and Management SaaS Test Holiday IT Consulting Upgrades Chatbots Computing Writing Cortana Innovation Private Cloud Migration Bookmarks Telephony Avoiding Downtime Business Computing Information Technology Phishing Human Error Employee-Employer Relationship Licensing Favorites Corporate Profile Administrator Programming Computer Repair Managed Services Provider Business Owner Hosted Solutions Apps Browser Wearable Technology Mobility Windows 8 How To Voice over Internet Protocol Network Security Cables Meetings IBM Malware Taxes Project Management Fraud Best Practices User Error Social Networking Productivity GPS How To 5G IT Support 3D Printing Disaster Recovery Monitors Authentication Tech Terms Retail Business Intelligence Botnet Data storage Mobile Devices Alert Documents Backup Identities Software Tips Tip of the week Privacy Public Speaking RMM Lenovo Software Buisness Display Point of Sale Operations Finance Managed IT Procurement E-Commerce Password Bitcoin Vulnerabilities Mobile Business Continuity Data loss Humor Safety Mobile Device Management BYOD eWaste Email Mirgation Customer Relationship Management Crowdsourcing Modem Consumers Theft Outsourced IT Recycling Staffing Internet User Disaster Resistance Unified Threat Management IT Management Best Practice Scam Electronic Medical Records Nanotechnology Managed IT services Smart Technology Mobile Device Managment Search Backup and Disaster Recovery VoIP Training Machine Learning CCTV Server Domains Cost Management IoT Uninterrupted Power Supply Communication iPhone Fleet Tracking Word Legal IT Services Net Neutrality Managed IT Service Router Vulnerability Efficiency Heating/Cooling Deep Learning Money Robot Dark Data Twitter Paperless Office Remote Workers Network Automation Downtime Authorization IT Budget Hotspot Managed Service Provider Compliance Wireless Technology PowerPoint Personal Information Antivirus Files Cryptocurrency Law Enforcement Cookies Facebook Website Data Recovery Cooperation Network Management Solid State Drive Application BDR Data Warehousing Settings Save Money HIPAA Analyitcs Comparison Bluetooth SharePoint Legislation Hardware Tracking Firefox Processors Connectivity Servers Dark Web Technology Tips Cyberattacks App Identity Backups Notes Mouse Google Wallet Regulations Relocation MSP Budget Knowledge Spyware Business Management Entrepreneur Digital Signature Mobile Device Managed Service Update Security Office Wasting Time Data Breach Permission Proactive Zero-Day Threat Scary Stories Storage Distributed Denial of Service Management Data Infrastructure Shortcut Development Cabling Remote Computing Two-factor Authentication WPA3 Windows 10 Social Motion Sickness Tech Support Augmented Reality Miscellaneous Experience Websites Intranet Black Market Environment Travel Workplace Tips communications Trending Save Time Consulting The Internet of Things Emoji Printing Address Language Going Green PDF Recovery Productivity Unified Threat Management Applications Enterprise Resource Planning Google Maps Internet of Things Star Wars Database Conferencing Tablet Remote Worker Healthcare Phone System End of Support Monitoring Cybersecurity Cyber Monday Ransomware Outlook Company Culture Virtualization Laptop IT service Cleaning Managed IT Services Tech Term Proactive IT History VPN Professional Services OneNote Digital IT Technicians Microsoft Office Work/Life Balance Firewall Users Computers Utility Computing Analytics Superfish Health Google File Sharing Software as a Service Vendor Management Electronic Health Records Flexibility ROI Mobile Data Spam Education Co-managed IT Office 365 Saving Money Automobile Hacks Security Cameras Unsupported Software Alt Codes Time Management Permissions Digital Payment Saving Time Virtual Private Network Business Redundancy Business Growth Statistics Apple Artificial Intelligence YouTube Fun Refrigeration Access Control Sync Chrome Remote Monitoring Business Technology Disaster Wi-Fi IT Support Passwords Wires Hard Drives Cybercrime Touchscreen Virtual Reality VoIP Networking Drones Data Management

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code