Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Can You Stay Productive In the Face of Constant Distraction?

Can You Stay Productive In the Face of Constant Distraction?

The modern office is filled with distractions, and that’s to say nothing about the everyday user’s life. With so many devices and notifications interrupting focus for users all over the world, it’s more important than ever before to have a strategy for how to deal with these issues and become as productive as possible in the workplace. Today, we’ll be discussing some of the biggest distractions in the workplace and how your employees can overcome them.

Continue reading
0 Comments

Hackers Prey on Social Media Users

Hackers Prey on Social Media Users

Social media has been an emerging technology in recent years, and has produced many threats. Hackers have learned that they can take advantage of these communication mediums to launch dangerous new attacks on unsuspecting users. With enough ingenuity on a hacker’s part, they can potentially steal the identity of a social media user. Here are some of the best ways that your organization can combat identity theft through social media.

Continue reading
0 Comments

Are You Making Yourself Vulnerable Over Social Media?

Are You Making Yourself Vulnerable Over Social Media?

Social media might make it easy to stay connected, but it comes with a lot of negative side-effects--particularly in regard to security for both personal and professional use. If social media isn’t used properly, it could spell trouble for your organization. How can you foster proper social media usage so that your organization doesn’t suffer from poor security practices? It all starts by spreading awareness.

Continue reading
0 Comments

How Much Time Do Your Employees Waste on Social Media?

How Much Time Do Your Employees Waste on Social Media?

Social media is a phenomenon that has invaded the business world in more ways than one. While it might be a great way to endorse your brand and communicate with your local prospects, it can be a huge distraction for your in-house workers. A new study by communications agency, We Are Flint, claims that 84 percent of adults in the UK use social media, and two-thirds of them use it every day--be it at the office or at home.

Continue reading
0 Comments

3 Easy Ways to Get Your Business Started With Automation Technology

3 Easy Ways to Get Your Business Started With Automation Technology

Business use IT more today than ever before, and this has led business owners, CIOs and IT managers to constantly search for ways to deliver organizational profitability through technology. They do this by attempting, sometimes futilely, to pinpoint issues with their overall business strategy and practices while discovering technology solutions that will help mitigate these problems. Typically, if an IT manager speculates that a technology implementation will reduce costs or improve productivity, those solutions find a way to be implemented.

Continue reading
0 Comments

Hackers Use Social Media to Scam Employees Into Handing Over Company Data

Hackers Use Social Media to Scam Employees Into Handing Over Company Data

Social media is a great way for organizations to share information about their products and services, but while it’s great for those who want to reach a new audience, it’s also exposing you to another audience that you may not want to be familiar with: hackers. Believe it or not, there are hackers who are trying to take advantage of the personal information you share on your social media accounts.

Continue reading
0 Comments

Tip of the Week: Separate Your Facebook Timeline From What You Share on Your News Feed

Tip of the Week: Separate Your Facebook Timeline From What You Share on Your News Feed

Have you ever encountered something that you thought was interesting on social media, and you wanted to share it with your friends? Before, sharing a link or a story would also slap a status update on your Facebook profile, for all of the world to see. Now, however, Facebook offers an alternative, in the form of sharing a post on the News Feed without also posting it to your timeline.

Continue reading
0 Comments

Man Responsible for 27 Million Facebook Spam Messages Finally Nabbed

Man Responsible for 27 Million Facebook Spam Messages Finally Nabbed

Cyber security professionals and Internet users rejoice, for the “Spam King,” Sanford Wallace, has finally been sentenced for his longtime use of stolen Facebook credentials to spam other users. Between 2008 and 2009, he had stolen credentials for Facebook accounts, and then used the accounts to send credential-stealing web links. Now, he gets to spend the next two and a half years in prison, and pay an oddly-specific fine of $310,629.

Continue reading
0 Comments

Tip of the Week: Tweak These 5 Mobile Apps to Consume Less Data

Tip of the Week: Tweak These 5 Mobile Apps to Consume Less Data

Chances are that if you’re using a smartphone, you’ll have your WiFi turned on as often as you possibly can. This helps to keep data hogs (applications that use a ton of your monthly allotted mobile data) at bay. However, not everyone has the convenience of an Internet connection at all times, particularly while you’re out of the office. Here’s how you can limit the damage done by your favorite smartphone apps.

Continue reading
0 Comments

The Cause of Social Media Addiction and How to Stop It

b2ap3_thumbnail_social_media_blocking_400.jpgSocial media addiction is a problem that plagues most modern businesses. Even though it’s a best practice to leverage social media to your business’s advantage, it’s a well-known fact that social media addiction can lead to wasted time and distractions in the office. In order to beat social media addiction in the office, it’s best to understand how it comes about, and what you can do to help your workers leave it alone, rather than locking everything down completely.

Continue reading
0 Comments

3 Modern Technologies Used By Every Political Campaign

b2ap3_thumbnail_campaign_it_400.jpgIn 19th century America, the hottest innovation for political campaigns was the exposed stump from a fallen tree, thus the stump speech. This technology revolutionized politics by allowing the candidate to elevate himself above the crowd for greater visibility and to better project one’s voice. Today, the political stump speech is obsolete, having its usefulness far surpassed by the technologies of the modern age.

Continue reading
0 Comments

Fans of Facebook Now Have a Facebook Business App

b2ap3_thumbnail_facebook_at_work_400.jpgFacebook has come a long way. Originally designed as a networking tool to be exclusively used by college students, Facebook now has 1.44 billion active users, making it the world’s largest social network. Today, businesses take Facebook seriously and utilize it for their marketing initiatives. However, it’s still viewed as a time-waster by many office managers who restrict or ban employees from accessing it.

Continue reading
0 Comments

Most Business Owners Only See 1-to-3% Consumer Engagement on Social Media

b2ap3_thumbnail_social_media_engagement_is_not_high_400.jpgYou’re surely aware of how valuable an asset social media is for your brand, but how much interaction are you really getting on your pages? No matter how many views, there’s always room for improvement. Well, you’ll be relieved to hear that even the large corporations don’t get too many hits on social media, despite the massive numbers in their favor.

Continue reading
0 Comments

Tip of the Week: How to Respond to Internet Trolls and Online Criticism

b2ap3_thumbnail_internet_troll_400.jpgNot everyone you meet on the Internet is going to have the same opinion as you. This ordinarily wouldn’t be a problem, since most people are reasonable and can realize when not to open their mouth; but on the Internet, anonymity breeds a foul creature with a mind for mischief: The Internet troll. They often respond to posts and comments in a condescending or crude, obnoxious manner in a deliberate attempt to anger the original poster.

Continue reading
0 Comments

Fight the Power: How A California Restaurant is Tackling Yelp’s Rating System

b2ap3_thumbnail_decisions_400.jpgThe Internet makes marketing your business much easier, but it's not that way for everyone. A restaurant in California has responded to the standard Internet marketing strategy with an out-of-the-box method of its own. David Cerretini, co-owner of the Italian restaurant Botto Bistro, has told his strategy to USA Today; "I want to be the worst restaurant in the San Francisco area!"

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Office Tips Superfish Remote Monitoring Conferencing Data loss Infrastructure Virtualization Politics WannaCry Legal Network Management Black Friday Mouse Laptop Office 365 Twitter Electronic Health Records End of Support Domains Consumers Mobile Device Intranet Office Blockchain Technology Enterprise Resource Planning Spyware Managed Service Provider IT Management Zero-Day Threat Nanotechnology Troubleshooting Users Efficiency Automobile Browser Wireless Development Company Culture Machine Learning Security Cameras Disaster Resistance Business Management Storage Tech Term Server Tip of the week Privacy History Health Best Practices Vendor Management VPN Vulnerability Downtime Private Cloud VoIP Distributed Denial of Service Maintenance SaaS Travel Proactive IT VoIP Workplace Tips Small Business Alert Personal Information Wireless Technology Botnet Social Networking Entrepreneur IT service Business Computing Holiday Cabling MSP Project Management Productivity Hard Disk Drive Mobile Device Management Encryption Motherboard Backup and Disaster Recovery communications Marketing Wires Word Procurement Financial Dark Web Public Speaking IT Budget Technology Laws Scam Heating/Cooling Retail Favorites Network Security Permission Managed IT Service Public Cloud Cyber Monday Social Media Proactive Network Congestion Human Error CCTV Software Google Wallet Alt Codes Save Time Managing Stress Cameras Access Control Webcam Firewall Phone System Internet Lenovo Backup Google Operations Managed IT services Enterprise Content Management Smart Technology Staffing ROI Address Fleet Tracking Unified Threat Management Black Market Search Alerts Hacks Phishing Meetings Mirgation Consultation Corporate Profile Typing Bluetooth Asset Tracking Update Knowledge Administration Patch Management Sync Outsourced IT E-Commerce Wi-Fi File Sharing Screen Reader Employees Cybercrime Google Maps Help Desk Regulations Outlook Drones Presentation Healthcare Solid State Drive Managed IT Samsung Digital Payment Consulting Documents IBM Unsupported Software Gmail Business IP Address Application Cookies Hotspot Processors Servers Data Breach Business Technology GPS HIPAA BYOD Spam Web Server IT Consultant Upgrade YouTube OneNote Digital Language Break Fix Read Only Migration Geography Virtual Reality Trending Monitors Business Growth Firefox Theft G Suite Remote Computing Recovery Hackers Undo Router Work/Life Balance Cooperation Data Security Error Digital Signature Notifications Physical Security Gadgets Data Innovation Bring Your Own Device Identities Smartphone Security Upgrades Productivity Data Backup Business Intelligence Collaboration Microsoft Social Engineering Save Money Mobility Chatbots Networking Customer Service Computing Infrastructure Hacker Employer-Employee Relationship Chrome Windows 10 Downloads Shortcut Finance Customer Relationship Management How To Humor Saving Money Bookmarks Windows 8 Co-managed IT Operating System Star Wars Competition Mail Merge Authentication iPhone Email Touchscreen Augmented Reality IT Technicians Bitcoin Printer Business Owner Cybersecurity IoT Halloween Motion Sickness Crowdsourcing Mobile Office Managed Services Provider Analytics Telephone Systems Cleaning Google Docs Mobile Devices Safety Computers Windows 10 Telephony Monitoring Identity Theft Training Data Recovery Data Management USB The Internet of Things Server Management Managed IT Services Data storage Internet of Things Cloud Google Calendar Specifications Software as a Service Saving Time Antivirus Mobile IT Consulting Dark Data Remote Worker Recycling Computer Care Automation Virtual Desktop IT Support Instant Messaging Relocation Identity Compliance Supercomputer Files Flexibility Staff Legislation Smart Tech Running Cable Fun Data Warehousing Paperless Office Miscellaneous Apps Test Information Features Employee-Employer Relationship Bandwidth Settings Net Neutrality Sports Artificial Intelligence Statistics Environment Quick Tips Comparison Budget Printing Content Filtering Unified Communications Android Point of Sale Mobile Computing Buisness Money Unified Threat Management Modem Disaster Information Technology Analyitcs Education Cryptocurrency Redundancy SharePoint Applications Windows High-Speed Internet Government Piracy BDR Computer Multi-Factor Security eWaste Emoji Lithium-ion Battery PDF Going Green WPA3 IT solutions Taxes Big Data Document Management Hacking Cloud Computing Tip of the Week Virus Vulnerabilities Software Tips Hosted Solution Computing Malware Hard Drives Current Events Mobile Security Hosted Solutions IT Services Virtual Private Network Deep Learning Password Programming Chromebook Disaster Recovery User Authorization Google Drive Remote Workers LiFi Backups Electronic Medical Records User Tips App Hardware Website Mobile Device Managment Microsoft Excel Writing Managed Service Robot Ransomware Display RMM PowerPoint Uninterrupted Power Supply User Error Scary Stories Cortana Law Enforcement Tech Terms 5G Smartphones Business Continuity Cables Utility Computing Tracking Facebook Mobile Data Connectivity Cost Management Cache Remote Monitoring and Management Techology Internet Exlporer Administrator Best Practice Tech Support Passwords Gadget Permissions Social Websites Avoiding Downtime Licensing Hiring/Firing Computer Repair CIO IT Support Assessment Fraud Time Management WiFi 3D Printing Microsoft Office Wearable Technology Experience Network Management Communication Apple Cyberattacks Risk Management Technology Tips How To Two-factor Authentication Tablet Hard Drive Refrigeration

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code