Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

WPA3 is Boosting Network Security

WPA3 is Boosting Network Security

Did you know that prior to this past January, the last big update to Wi-Fi occurred in 2004, when WPA2 was released? The Wi-Fi alliance has introduced a new type of wireless connection called WPA3--one that can dramatically improve security. In reality, it was created with the intention of shoring up weaknesses found as a result of the KRACK vulnerability, which exposed serious issues with WPA2 that needed to be addressed.

Tags:
Continue reading
0 Comments

Tip of the Week: How to Adjust Your Router to Improve Your Connections

Tip of the Week: How to Adjust Your Router to Improve Your Connections

Wi-Fi has been one of the single most useful innovations for the modern office. Connecting to your Internet without having to be physically connected to it via an ethernet wire has been an incredibly freeing process--one that opens up all sorts of possibilities of where (and how) you can get work done. How can you make sure that your Wi-Fi signals are as clear and reliable as possible?

Continue reading
0 Comments

Tech Term: Modems and Routers

Tech Term: Modems and Routers

The Internet is a valuable tool that can be accessed through a wired connection and wirelessly via Wi-Fi, but the devices that offer these connections can be somewhat complicated and difficult to understand. If you don’t know which device does what, you’re in for a treat--today’s tech term will examine the differences between the modem and the router.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Disaster Resistance Remote Monitoring and Management Backup and Disaster Recovery Productivity CCTV Internet Presentation Backups Mobile Computing Law Enforcement Chromebook Business Connectivity Mobile Data Virtual Desktop Break Fix Typing Help Desk Cyber Monday Display Tablet Halloween Data Twitter Cabling Financial Multi-Factor Security BYOD Mail Merge Business Owner Spyware Unified Threat Management PowerPoint Innovation Infrastructure Mobile Managing Stress Theft Cryptocurrency eWaste Mobile Device Vulnerabilities Health IT solutions Mouse Competition Networking Upgrades Co-managed IT Superfish Computing PDF IT Technicians Consulting Google Upgrade IT Consulting Bandwidth Management Corporate Profile Browser Data Security Migration SaaS Error Proactive IT Telephone Systems Android Bitcoin Social Business Intelligence Malware E-Commerce App Wi-Fi Artificial Intelligence Test Supercomputer Websites Employer-Employee Relationship Company Culture Comparison Tech Support Printer Virtual Reality Data Management Travel Unsupported Software Cookies Best Practice RMM Data Breach Quick Tips Features Fun Analyitcs Dark Data Cloud Address Document Management Hacker Email Staff Black Market Managed IT services Cybersecurity Heating/Cooling Gadgets Bookmarks Remote Worker The Internet of Things Electronic Medical Records Monitors Business Growth Cables Mobility Smartphones Managed IT Services Computer Repair Augmented Reality Scam Screen Reader Spam Administration Project Management Mirgation Office Wearable Technology Social Networking IBM Piracy Two-factor Authentication Office Tips Star Wars Tech Terms Running Cable Net Neutrality Shortcut Smartphone Customer Service Intranet Smart Technology Printing Techology Microsoft Office Storage Human Error Operating System Statistics Utility Computing Network Management Risk Management IT Consultant Google Maps Virtualization Hosted Solutions ROI Regulations 3D Printing Digital Payment Mobile Device Managment HIPAA WiFi Digital Signature USB Flexibility Remote Workers CIO VoIP Update Downloads Search Save Time High-Speed Internet Taxes Uninterrupted Power Supply IT service Alt Codes Servers Firewall Asset Tracking Computer Telephony Consultation Personal Information Safety Google Wallet Maintenance Network Congestion Vulnerability Finance Legislation Wireless Information Permission Internet of Things Automobile Robot Antivirus Staffing WPA3 IT Budget Bluetooth Entrepreneur Enterprise Resource Planning Big Data IT Support Google Docs Hardware Processors Passwords Hard Drives Saving Time Technology Laws Technology WannaCry LiFi Government Cortana Procurement Cameras Going Green Operations Electronic Health Records Administrator Physical Security Website Facebook Emoji Budget Business Management Google Drive Security Cameras Gmail Notifications Compliance Encryption Outsourced IT Hotspot Content Filtering Office 365 Data loss Licensing VPN Hard Disk Drive Wireless Technology Lithium-ion Battery Workplace Tips Analytics Recycling Word Distributed Denial of Service Social Engineering Nanotechnology Solid State Drive Motherboard Buisness Alerts Development File Sharing OneNote User Error Password YouTube Microsoft Redundancy Gadget Server Management Point of Sale Cloud Computing Hacks Files Network Security Cache IT Services Training Security Settings Retail Patch Management Employees IT Management Zero-Day Threat Computer Care Computers Botnet Mobile Devices Privacy Digital User Tips Remote Monitoring Phishing Legal Managed IT Service Miscellaneous Windows Ransomware Education Managed IT Data Recovery Network GPS Work/Life Balance Cybercrime Saving Money BDR Black Friday Cooperation End of Support Tip of the Week Marketing Public Cloud IT Support Efficiency Conferencing Authorization Domains Scary Stories Deep Learning Machine Learning Bring Your Own Device IoT Hackers Disaster Alert G Suite Time Management Touchscreen Applications Motion Sickness Experience Unified Communications Small Business Writing Trending Refrigeration History Software Tips Access Control Business Technology Tracking Unified Threat Management Social Media Mobile Security Backup Managed Services Provider Virtual Private Network Crowdsourcing How To Tech Term Specifications Hiring/Firing Money Windows 10 Identity Undo Enterprise Content Management Windows 10 Data storage Fraud Virus Software as a Service iPhone Paperless Office Meetings Hard Drive MSP VoIP Sync Wires Computing Infrastructure How To User Recovery Google Calendar Relocation Apps Users Language Data Backup Geography Firefox SharePoint Productivity Troubleshooting Phone System Business Computing Fleet Tracking Outlook Chatbots Documents Cost Management Windows 8 Holiday Identities Assessment Technology Tips Router Microsoft Excel Humor Tip of the week Managed Service Hacking Authentication Knowledge Internet Exlporer Laptop Cleaning Webcam Modem Chrome Cyberattacks Application Save Money Best Practices Automation Information Technology Communication Public Speaking Web Server Managed Service Provider Lenovo Employee-Employer Relationship communications Private Cloud Apple Politics Collaboration Server Monitoring Hosted Solution Healthcare 5G Mobile Office Downtime Favorites Environment Dark Web Current Events Business Continuity Avoiding Downtime Mobile Device Management Read Only Vendor Management Instant Messaging Data Warehousing Permissions Identity Theft Software IP Address Disaster Recovery Smart Tech Samsung Sports Consumers Customer Relationship Management Remote Computing Programming Proactive Drones Blockchain

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code