Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Checking in on Net Neutrality

Checking in on Net Neutrality

When we write about Net Neutrality, we typically write about how it is designed to keep the telecommunications conglomerates, who make Internet service available to individuals on the Internet, honest when laying out their Internet service sales strategy. One way to put it is that without net neutrality in place, the Big Four (which are currently Comcast, Charter, Verizon, and AT&T) have complete control over the amount of Internet their customers can access.

Continue reading
0 Comments

Keeping Your Info Safe

Keeping Your Info Safe

The Connection, Inc. has a plan to keep your info safe. Get the latest data protection software to keep your productivity high.

Tags:
Continue reading

What is Encryption, and Why Do We Need It?

What is Encryption, and Why Do We Need It?

When encryption is discussed, one of its high points that business professionals try to hammer home is that it’s more secure. But what does encryption really mean for businesses? Does it adequately protect data and devices? We’ll walk you through a brief rundown of how encryption works and the role it plays in keeping your business secure.

Continue reading
0 Comments

Google Knows Where You Are: Here’s How to Stop Them

Google Knows Where You Are: Here’s How to Stop Them

Late in the summer this past year there were several articles written about how Google would continue to track the location of a person’s smartphone after they had chosen to turn their location settings off. A Princeton researcher corroborated those claims for the Associated Press, traveling through New York and New Jersey with locations services off only to be tracked the entire way. Today, we will discuss this issue, and tell you what you need to know to keep Google from tracking you wherever you go.

Continue reading
0 Comments

Learn to Use Email Safely

Learn to Use Email Safely

Email is a core component to many businesses. With 124.5 billion business emails being sent and received each day, that doesn’t seem to be in danger of ending. Are the emails that are coming and going from your business secure? That may be another story, altogether. In order to keep your email security at a premium, we have outlined the following tips:

Continue reading
0 Comments

Tip of the Week: Here Are a Few of Our Favorite Security Practices

Tip of the Week: Here Are a Few of Our Favorite Security Practices

There will never be a time that we are not committed to improving the security of businesses. To continue striving for this goal, we’re dedicating this week’s tip to describing some solutions that can assist in locking a business and its data down.

Continue reading
0 Comments

Powerful Physical Security Options

Powerful Physical Security Options

Data security isn’t the easiest thing in the world to plan for, especially if your organization doesn’t have any dedicated security professionals on-hand. While protecting your data with traditional methods, like passwords, firewalls, and antivirus, is important, what measures are you taking to make sure a thief or hacker isn’t just walking into your office and making off with your technology?

Continue reading
0 Comments

Prioritize the Protection of Your Google Account

Prioritize the Protection of Your Google Account

Chances are you have a Google account, whether it’s for business or personal use. It’s more accessible today than ever before and provides a solid way to gain access to several important features and accounts. Considering how much can be done with a Google account, users forget that they can put their security and personal data at risk. Here are some ways that your Google account is at risk, as well as what you can do to fix it.

Continue reading
0 Comments

Tip of the Week: Watch Out for Scammers During the Holidays

Tip of the Week: Watch Out for Scammers During the Holidays

Scammers find the holidays to be a wonderful time for stealing from unsuspecting victims. They know that the gift-giving season inspires others to spend a lot of money, which means that sensitive information, like credit card numbers, is up for grabs in bulk. As a consumer yourself, you’ll have to keep an eye out for these scams to make sure that you’re staying as safe as possible this holiday season.

Continue reading
0 Comments

During the Holidays, Cybersecurity Matters at Work and Home

During the Holidays, Cybersecurity Matters at Work and Home

We’re right in the thick of the holiday season, which means two things: one, there’s a lot of data being exchanged between businesses and consumers, and (on a related note) two: there’s ample opportunities for cybercrime, targeting business and consumer both. Whichever side of the coin you are on at any moment, you need to be aware of the risks, and how to mitigate them.

Continue reading
0 Comments

Tip of the Week: Visiting Useful Windows 10 Features

Tip of the Week: Visiting Useful Windows 10 Features

Windows 10 isn’t just a great operating system for getting things done--it’s also jam-packed with features that you might not even have known about. This week’s tip is all about some of the handy features that Windows 10 can provide for your office.

Continue reading
0 Comments

Here is How Antivirus Keeps a Business Safe

Here is How Antivirus Keeps a Business Safe

A lot is made about antivirus as a part of a comprehensive network security platform, but how does the system really work to eliminate threats? Today, we will take a look at an antivirus solution to show you how it goes about removing unwanted files and other code.

Continue reading
0 Comments

A Secure Wireless Network Allows for Better Business

A Secure Wireless Network Allows for Better Business

Wireless Internet access for a user’s devices isn’t just a luxury these days--it’s expected. If the Wi-Fi drops out for any reason at all, chaos strikes, rendering any ability to stream content or access the Internet a moot point. This is particularly the case for businesses that have technology solutions reliant on wireless access. How can you make sure your wireless network is as strong and reliable as possible?

Continue reading
0 Comments

Your Business May Be Most Vulnerable from the Inside

Your Business May Be Most Vulnerable from the Inside

It can be easy, with all the threats covered in the news, to assume that the biggest dangers to your business all come from the outside. This is a dangerous mistake, as there are plenty of vulnerabilities that originate from within your organization, making it easier for outside threats to come in, if not being bigger threats in and of themselves. Below, we’ll review some of the biggest, mostly internal dangers that your business may face.

Continue reading
0 Comments

Tech Term: Zero-Day

Tech Term: Zero-Day

You might hear the term “zero-day” when discussing security threats, but do you know what they actually are? A zero-day threat is arguably one of the most devastating and dangerous security issues your business could face, and if you’re not prepared, they could be the end of it.

Continue reading
0 Comments

Uber Demonstrates the Importance of Disclosing a Data Breach

Uber Demonstrates the Importance of Disclosing a Data Breach

If your business was breached, would it be better to keep it a secret, or should you disclose it to your clients? Uber has proven that trying to hide it is a mistake, and a costly one at that.

Continue reading
0 Comments

Cloud-Based Security Is Concerning for Small Businesses

Cloud-Based Security Is Concerning for Small Businesses

The cloud is such an important part of today’s business environment that most organizations use it to some extent, even if it’s just for basic storage needs. However, the cloud needs to be properly maintained, starting with the way you secure your cloud services. Take a moment to ask yourself if your cloud--whether it’s hosted on-site or by a provider--is safe and secure.

Continue reading
0 Comments

Windows 10 Itself Helps Keep You Secure

Windows 10 Itself Helps Keep You Secure

Windows 10 is the most utilized operating system on PCs today. As a result, Microsoft has made it a priority to take on some of today’s most prevalent threats. We’ll go through these security features based on the state of the computer’s usage to get a better idea of how much is done to improve your security.

Continue reading
0 Comments

Data Security Issues of 2018

Data Security Issues of 2018

Each year there are changes that need to be made in the way that organizations manage their IT security. In 2017, ransomware burst on the scene in full force, and cyber security strategies reacted, coming up with fully managed security platform that remediate issues better, and cost organizations far more than they would have spent on IT security just a short time ago. In 2018, the same problems persist, while other developing technologies threaten the natural order of things. Today, we will look at how cybersecurity is being approached in 2018.

Continue reading
0 Comments

Protect Your Business From Phishing Attacks

Protect Your Business From Phishing Attacks

Spam is a major hindrance when running a business that relies on email, but it’s easy to protect your employee’s time from the average spam messages with the right technological support. Unfortunately, hackers have adapted to this change and made it more difficult to identify scam emails. More specifically, they have turned to customizing their spam messages to hit specific individuals within organizations.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Staffing Recovery Windows Shortcut Connectivity Hard Drive E-Commerce Business Continuity Remote Workers Alert The Internet of Things Firewall Business Management Chrome Data Backup Legislation CCTV Cost Management Storage Mail Merge VoIP Wireless Technology Cryptocurrency Mobile Security Processors Competition SharePoint Cache Hiring/Firing Employer-Employee Relationship Development Relocation Avoiding Downtime Blockchain Enterprise Resource Planning Office Tips Samsung Search High-Speed Internet Augmented Reality Disaster Resistance Lenovo Electronic Medical Records Tablet Features Voice over Internet Protocol Workplace Tips Managed Service Apple Education Enterprise Content Management Uninterrupted Power Supply Wireless IT Budget Lithium-ion Battery Entrepreneur Data Solid State Drive Buisness Programming Robot Email Cybercrime Display Healthcare IT Support Access Control Social Managed Service Provider Flexibility Instant Messaging Laptop Digital Theft Motion Sickness Administrator Efficiency Wearable Technology Regulations How To Mobile Devices Outlook Internet Twitter Tip of the week Deep Learning Documents Best Practice Gmail End of Support Computing Infrastructure Network Congestion Geography Networking Cabling Cables Superfish Private Cloud Productivity Staff Bookmarks Retail Hacks Maintenance Tech Support IT Support Fleet Tracking Backups Privacy Business Computing Data storage Travel Business Technology Asset Tracking RMM Upgrade Small Business Servers Ransomware Server Management Star Wars Cooperation Utility Computing Facebook Virtual Desktop Wasting Time Mirgation Router Remote Computing Cybersecurity Computer Humor Word Recycling IT service App Virtualization Outsourced IT Spyware Alerts Point of Sale Smartphones Time Management Health GPS Net Neutrality Software Bluetooth Miscellaneous Monitors Android File Sharing Electronic Health Records Cloud Data Management Remote Monitoring Vulnerability Upgrades Malware Managed IT Service Unified Threat Management Gadget Backup BDR Halloween Analyitcs Tracking Password IBM Modem Operations Web Server Procurement Public Cloud Zero-Day Threat Heating/Cooling Migration Office 365 Running Cable Social Networking Business Growth Notes Legal Comparison Google Money Business Intelligence Hosted Solutions Virtual Private Network Project Management Internet Exlporer Information IoT Safety Application PowerPoint User Tips Government Software Tips Sync OneNote Going Green Drones Current Events Virus Dark Web Data loss Hosted Solution Mobile Data Network Management Bitcoin Automobile Downloads Consulting Human Error Managed IT services Webcam Google Wallet Address Smart Tech Meetings Server Google Calendar Microsoft Corporate Profile BYOD Help Desk communications Disaster Wi-Fi ROI Managed IT Proactive Mobile Device User Error Typing Presentation Crowdsourcing Bandwidth Permission Database Automation Budget 3D Printing Windows 10 Websites Machine Learning Financial Social Engineering Employees Technology Laws Google Docs Remote Monitoring and Management Favorites Digital Payment Techology Botnet Telephony Telephone Systems 5G Professional Services Applications Cloud Computing Printer Cookies Intranet Mobile Office LiFi Cyberattacks Distributed Denial of Service Holiday IT Services Troubleshooting Data Security Data Recovery YouTube Operating System Emoji VPN User Paperless Office Hardware Infrastructure VoIP Quick Tips Consumers Encryption Public Speaking Smart Technology Gadgets Company Culture Technology Cleaning Experience Redundancy Save Time IT solutions Sports Mobility Identity Permissions iPhone Google Drive Vendor Management Managed Services Provider Piracy Hacker IT Consultant Dark Data Training Spam IP Address Virtual Reality IT Management Scary Stories Users Mobile Device Managment Communication Refrigeration Trending How To IT Consulting Supercomputer Firefox Computers Tech Term Test Patch Management Co-managed IT Internet of Things Identities Administration Two-factor Authentication Windows 10 Security Cameras Cameras Customer Relationship Management Hackers Document Management Content Filtering Authorization Computer Care Digital Signature Vulnerabilities Managed IT Services Multi-Factor Security Virtual Assistant Statistics Motherboard Phishing Consultation Hard Drives Notifications Network Security Screen Reader Black Friday Scam Error Marketing Smartphone Cyber Monday Undo IT Technicians Business Owner Wires Technology Tips Antivirus Productivity Browser Settings Saving Money Touchscreen Authentication Apps Downtime Mouse Microsoft Office Compliance Innovation WPA3 G Suite Files eWaste Finance Google Maps Windows 7 Save Money Hard Disk Drive Proactive IT Break Fix Mobile Computing WiFi Fraud Social Media Law Enforcement Language Taxes Conferencing Fun Data Breach Update Knowledge Microsoft Excel Tech Terms Disaster Recovery Bring Your Own Device Cortana Chatbots Saving Time Software as a Service Personal Information Unsupported Software Read Only Hacking USB HIPAA Office Risk Management Security Environment Customer Service Mobile Device Management Business Alt Codes Identity Theft Information Technology Network Printing Data Warehousing Monitoring Hotspot Managing Stress Mobile Analytics Work/Life Balance Artificial Intelligence Assessment PDF Passwords Backup and Disaster Recovery MSP Computing Unified Communications Website Big Data Politics Management Specifications Writing CIO Computer Repair Licensing Remote Worker Nanotechnology Black Market Collaboration SaaS Unified Threat Management Phone System Tip of the Week Domains Chromebook Physical Security Employee-Employer Relationship WannaCry History Best Practices Windows 8

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code