The Connection, Inc Blog

The Connection, Inc has been serving the New Jersey area since 1992, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

Social Media Is A Tool For Any Sized Business

Social Media Is A Tool For Any Sized Business

Nowadays, social media companies have a lot of power and influence, which is part of the reason that so many of today’s largest businesses have adopted social media as a critical promotional tool. With the average person spending about two hours and 24 minutes on social media and messaging applications per day, this makes social media a clear opportunity for any sized business to embrace. Let’s consider a few ways this can be accomplished for these different businesses.

0 Comments
Continue reading

Tip of the Week: How to Control Facebook and Instagram Ads

Tip of the Week: How to Control Facebook and Instagram Ads

Social media platforms—like Facebook and Instagram—are a great place to communicate with people, as many political campaigns are now taking advantage of. With an election on the horizon, political advertisements abound on these platforms. Of course, not everyone wants their feeds cluttered with these ads… especially if these ads don’t align to their own politics.

0 Comments
Continue reading

Why Your Business Needs a Social Media Presence Right Now

Why Your Business Needs a Social Media Presence Right Now

Businesses around the world now find themselves in a situation unlike what most have ever seen. With so many trying to keep their distance from one another, many workplaces have deemed it necessary to close down for the time being or to operate remotely in order to reduce the risk they present to their clients and customers… but it isn’t as though these clients and customers are going to expect radio silence from these businesses.

0 Comments
Continue reading

Control Your Profile, Part II

Control Your Profile, Part II

In part one of this series we started to go through Facebook privacy failings, but we didn’t really give you any information you can use. For part two, we have decided to take you through some security setting for Facebook. 

Facebook has over two billion users, and as a result, it has its fair share of privacy snafus. While they do (finally) make available all of a person’s Facebook information, their strategies to success are important reasons why there are so many privacy concerns throughout the online world. 


Making it a priority to know how to take control over your personal information on Facebook is a good place to start. Let’s run through Facebook’s privacy settings, and get you set up with two-factor authentication.

Let’s start from a PC. Head over to facebook.com and log in.

Making Sense of Facebook’s Security and Privacy Options

Once you’re logged in to facebook.com, you’ll want to click the little down arrow on the top right of the page. In that menu click on Settings. This can get a little confusing, so if you ever need to start from the beginning know that using the little down arrow can bring you back. 

Make Sure the General Account Settings are Right

You will want to verify that you own and control all of the email accounts tied to your Facebook account. If you used an old email address (that you can’t get into), you’ll have a hard time getting back into the account if something were to happen. 

Security and Login - Find Out Where You’ve Logged into Facebook

Click Security and Login on the right.

On this screen, you can see all the devices your Facebook account is currently signed into. You will be confused why there are so many, but think about it: how long have you been using Facebook? For many people it’s not out of line to suggest that they are on their fourth or fifth phone since first using the Facebook app. This means that these devices will show up. You don’t use a Nokia Lumia 920 any longer? Not many people do. Facebook gives you the option to sign out of any of these devices by accessing the three-dot icon next to the device’s name. 

It’s a good practice to keep your account logged out on devices you don’t typically use to access Facebook. If you see any suspicious devices among your list of approved devices, you will immediately need to change your password (directions below).

Change Your Password

Changing your password regularly is a good idea, but you definitely don’t want to use the same password over multiple accounts. To do so here, you will want to click on the down arrow on the top right of Facebook, going to Settings, and clicking Security and Login.

How to Enable Two-Factor Authentication

If you haven't heard of two-factor authentication, it is the practice of setting your account up with an additional layer of security. To get started, select Use two-factor authentication and click edit. Click Get Started.

A screen will pop up that gives you two Security Methods. Before choosing an option, you should understand both.

Option 1 - Authentication App - Clicking on this option will allow you to use a third-party app to authenticate your identity. Popular authentication apps include Google Authenticator, Last Pass Authenticator, or Duo Mobile. Using the authentication app option is more secure than option 2, but it does require you to have access to the mobile device that the authenticator app is installed on. 

To set this up, open your authentication app on your mobile device. It makes the most sense to use the authenticator app that you use for other accounts, but if you don’t have one, and you have a Google account, use Google Authenticator. 

Then, from Facebook on your computer (see the above screenshot), select Authentication App and click Next.

Facebook will present you with a QR code to scan. In your Authenticator App, add a new account (typically there is a + icon to tap) and scan the QR code. Once scanned, the app will generate a six-digit number to use. Facebook will ask for a Confirmation Code. Type in the six-digit number and you’ll be set.

Option 2 - Text Message - Option number two sends a code via text message to your mobile device. Make sure that you enter the correct number. This method may not be as secure as using an authentication app, but for practical purposes it will do. 

Select the Text Message option and click Next, Facebook will text you a code. Type that code into Facebook and voila, you are in.

Depending on the option you choose, Facebook will walk you through the next steps to verify and enable two-factor.

Add a Backup Plan
Once you’ve set up your method, Facebook will provide you with an option to Add a Backup. If you chose to set up two-factor with an Authentication App then Facebook will allow you to set Text Message 2FA as a backup, and vice versa. It’s not a bad idea to set up the other method as well, just in case.

Nowadays, a lot of online accounts offer 2FA, but Facebook also lets you have Recovery Codes (Google also does this, so if you have a Google account or use Gmail, it’s a good idea to get all of this set up over there as well).

Back on the Two-Factor Settings page, under the Add a Backup, there is an option for Recovery Codes.

Click Setup, and Facebook will pop up a window telling you about recovery codes and click Get Codes.

At this time, Facebook will provide you with 10 recovery codes. You can use them in an emergency to get back into your account. These codes are just single-use 2FA codes, so you’ll need to know your password and one of these codes to get back into your account. Since these codes can only be used once, you can request 10 new codes at any time by returning to the Two-Factor Settings page. Keep these codes in a safe place to ensure your account isn’t accessed by anyone else.

Setting Up Extra Security

If you go back to the Security and Login area of the settings menu, scroll down to Setting Up Extra Security.

This area allows you to set alerts when a new device or browser is used to log into your Facebook. The menu allows you to define additional email addresses. You can also have those notifications sent to you via Facebook Messenger, SMS, or as a Facebook notification. 

Below that option, you can choose 3 to 5 Friends to Contact if you get locked out of your Facebook account. If you choose this option, you will want to make sure that you only list people that you trust. If they are like-minded about their own privacy, the better off you will be.

This is admittedly a lot to take in, but setting up two-factor authentication and having control over who can access your Facebook account will go a long way toward securing your Facebook experience. You’ll still be inundated with stupid memes, but at least your personal data will remain secure. 

Check back for part three of our Facebook privacy series and leave any thoughts you may have in the comments section below. 

0 Comments
Continue reading

Can You Stay Productive In the Face of Constant Distraction?

Can You Stay Productive In the Face of Constant Distraction?

The modern office is filled with distractions, and that’s to say nothing about the everyday user’s life. With so many devices and notifications interrupting focus for users all over the world, it’s more important than ever before to have a strategy for how to deal with these issues and become as productive as possible in the workplace. Today, we’ll be discussing some of the biggest distractions in the workplace and how your employees can overcome them.

0 Comments
Continue reading

Hackers Prey on Social Media Users

Hackers Prey on Social Media Users

Social media has been an emerging technology in recent years, and has produced many threats. Hackers have learned that they can take advantage of these communication mediums to launch dangerous new attacks on unsuspecting users. With enough ingenuity on a hacker’s part, they can potentially steal the identity of a social media user. Here are some of the best ways that your organization can combat identity theft through social media.


First, it helps to understand why social media is such an attractive vector of attack for identity thieves. For one, the anonymity provided by the Internet has long been a staple reason why it’s been commonly used by hackers to steal sensitive information from organizations. This was (and still is) done through spam and scam emails, but nowadays, strategies have changed enough where individuals have to be more cognizant of their personally identifiable information, because by using social media constructs like Facebook, Instagram, Twitter, and the like, they are much more exposed. Enterprise-level spam filters are readily available to all kinds of organizations, prompting hackers to step up their game and create nefarious new ways of stealing information.

Spear phishing tactics were the result of these efforts. Intending to bypass the likes of spam blockers and content filters through seemingly legitimate sources, phishing tactics come in a variety of forms, with the most successful of these coming from sources that hide the true intentions of the one making the attack. The Internet can mask the true identity of hackers so that they can seem to be someone else, either in an email scam, social media attack, or otherwise. This is known as spoofing, and has been a infiltration tactic for decades.

In particular, social media can provide attackers with a lot of information without them working too hard. Think about the kind of information that you might have on your personal Facebook or Twitter feed. Do you have a phone number? What about an email address or physical address? Do you have any information about the musicians you listen to, or the books that you enjoy? All of this information (and more) can be used to help a potential scammer steal your identity and use it for various ill offenses - the gravest of which could be stealing your identity and using it to attack those you hold dear.

Imagine what could happen if someone were to steal the credentials to your social media pages and use them to impersonate you. They could fool all of your closest friends and family into giving up whatever information they are looking for. For example, they might be able to coax your parents or loved ones into parting with personally identifiable information such as your Social Security number or credit card number, which could be used to open new lines of credit or make fraudulent purchases. Regardless, the threat posed by identity theft through social media is considerable, and you must take precautions to ensure that you don’t fall for these traps in the future. Here are some ways that you can make sure this doesn’t happen.

  • Be on the lookout for suspicious activity on your accounts: If you suspect for even a second that your accounts have been compromised, be sure to change your passwords so that they can’t be used to hurt those closest to you.
  • Look out for dangerous messages sent to you: If you suddenly receive messages from those who you haven’t heard from in a long time, and their behavior is suspicious, perhaps it’s best to ignore these messages or alert those who you think may be affected.
  • Limit the information you share on social media accounts: Information can’t be stolen if you don’t choose to share it. Consider implementing more powerful privacy settings for your accounts.

Businesses are just as vulnerable to spear phishing attacks as individuals, if not more so. If you are like billions of others, social media has become an important part of your life, and quite possibly, your business. To ensure that you are doing what you can to protect yourself and your organization from the threats that social media and other innovative communications technologies enable, consider reaching out to the IT professionals at The Connection, Inc.

0 Comments
Continue reading

Are You Making Yourself Vulnerable Over Social Media?

Are You Making Yourself Vulnerable Over Social Media?

Social media might make it easy to stay connected, but it comes with a lot of negative side-effects--particularly in regard to security for both personal and professional use. If social media isn’t used properly, it could spell trouble for your organization. How can you foster proper social media usage so that your organization doesn’t suffer from poor security practices? It all starts by spreading awareness.

0 Comments
Continue reading

How Much Time Do Your Employees Waste on Social Media?

How Much Time Do Your Employees Waste on Social Media?

Social media is a phenomenon that has invaded the business world in more ways than one. While it might be a great way to endorse your brand and communicate with your local prospects, it can be a huge distraction for your in-house workers. A new study by communications agency, We Are Flint, claims that 84 percent of adults in the UK use social media, and two-thirds of them use it every day--be it at the office or at home.


The provided statistics come from a report that assesses the United Kingdom’s use of social media, though we think it’s safe to say that the rest of the Western world has similar statistics.

  • YouTube is the most commonly used social media site at 85 percent, while Facebook trails it at 78 percent.
  • As for daily uses, people use Facebook (59 percent), WhatsApp (28 percent), and YouTube (27 percent) most commonly.
  • Young people (18-29 years old) still use mostly Facebook and YouTube at 92 percent and 96 percent accordingly.

While this may not seem like such a shock, another survey from People Per Hour has shown that some workers are wasting away their workday on social media sites. Five percent of men and 11 percent of women spend over 45 minutes of every hour using social media sites while in the workplace. In particular, Facebook is a major culprit--54 percent of workers post Facebook updates from the office. Yet, despite the incredulous amount of time wasted on social media, only five percent of workers have ever received warnings regarding their use of social media at work.

So, we’d like to ask the question again. How much time does your business waste on employees using social media? Chances are that it’s a significant amount that needs to be addressed in some way, shape, or form. Ultimately, it depends on what you, as a business owner, deem to be wastes of time. Marketing personnel likely need access to social media in order to do their jobs properly, and not all employees use social media in a wasteful manner. Therefore, it comes down to identifying problematic employees who aren’t getting work done, but have plenty of time to tweet about an adorable cat video they just watched.

A content filtering solution is ideal for this purpose for multiple reasons. For one, it allows you to block access to social media on a per user basis. This means that you can designate who can access sites like Facebook and YouTube, allowing your employees to do their jobs while keeping problem employees in check. Furthermore, a content filtering solution can keep your employees from visiting dangerous websites that may try to steal sensitive information. It’s a win-win, bolstering productivity and security in one fell thrust.

To learn more about content filtering, reach out to us at (732) 291-5938.

0 Comments
Continue reading

3 Easy Ways to Get Your Business Started With Automation Technology

3 Easy Ways to Get Your Business Started With Automation Technology

Business use IT more today than ever before, and this has led business owners, CIOs and IT managers to constantly search for ways to deliver organizational profitability through technology. They do this by attempting, sometimes futilely, to pinpoint issues with their overall business strategy and practices while discovering technology solutions that will help mitigate these problems. Typically, if an IT manager speculates that a technology implementation will reduce costs or improve productivity, those solutions find a way to be implemented.


In 2017, when there is more technology to choose from than there are colors in a box of crayons, it’s important to rely on competent and frugal managers to find you the technology that can work to make your business more efficient. Here are three ways businesses that have never relied on automation can leverage it to improve some aspect of their business.

Social Media
Nowadays, having a social media presence is standard operating procedure for businesses. Platforms like Facebook, YouTube, Twitter, and LinkedIn can help to boost your business’ traffic, but if you don’t have the resources to continuously keep up with updating social media, there are options out there that will add some degree of automation to your social media initiatives. The application called Hootsuite was created to assist organizations to enhance their social media presence without having to put as much time and effort into their social media marketing. Hootsuite offers a free plan that supports three social media profiles and two campaigns, and it also has affordable paid options that provide organizations with several additional tools.

Paperless Automation
Going paperless can save your business plenty of resources, but sticking with a paperless office strategy is no easy task. Utilizing modern scanning equipment (as opposed to the old one-page-at-a-time flatbed technology), you can process more documents in less time. Using software to organize, share, and distribute scanned documents, both on-premise or in the cloud, can speed up the overhead and save a lot of time in the long run. Equally as important, is to make sure digitized files are backed up automatically, so your data is stored redundantly in case of a disaster.

Point of Sales and E-Commerce
When your organization sets out to sell products, whether you are focusing on sales inside a brick and mortar store on selling to clients on the Internet, it is important that you have a secure and reliable sales interface. Since business often moves faster than people do, having a solution to process payments, and get products to customers, is essential. There is software that delivers automation by linking your organization's storefront to your fulfillment vendors. This automation, integrating the invoicing, shipping, and customer feedback processes into one easy-to-manage solution, provides any product-based organization the tools they need to enhance customer satisfaction, build reliable customer relationships, and provide top notch support.

If your business is searching for solutions to your major business problems, there is a good chance that there is software that has been developed to remedy those issues. Do you already use automated services to help your business be more efficient? Have you considered trying some to further your organization’s goals? Tell us all about it in the comments section below.

0 Comments
Continue reading

Hackers Use Social Media to Scam Employees Into Handing Over Company Data

Hackers Use Social Media to Scam Employees Into Handing Over Company Data

Social media is a great way for organizations to share information about their products and services, but while it’s great for those who want to reach a new audience, it’s also exposing you to another audience that you may not want to be familiar with: hackers. Believe it or not, there are hackers who are trying to take advantage of the personal information you share on your social media accounts.

0 Comments
Continue reading

Tip of the Week: Separate Your Facebook Timeline From What You Share on Your News Feed

Tip of the Week: Separate Your Facebook Timeline From What You Share on Your News Feed

Have you ever encountered something that you thought was interesting on social media, and you wanted to share it with your friends? Before, sharing a link or a story would also slap a status update on your Facebook profile, for all of the world to see. Now, however, Facebook offers an alternative, in the form of sharing a post on the News Feed without also posting it to your timeline.

0 Comments
Continue reading

Man Responsible for 27 Million Facebook Spam Messages Finally Nabbed

Man Responsible for 27 Million Facebook Spam Messages Finally Nabbed

Cyber security professionals and Internet users rejoice, for the “Spam King,” Sanford Wallace, has finally been sentenced for his longtime use of stolen Facebook credentials to spam other users. Between 2008 and 2009, he had stolen credentials for Facebook accounts, and then used the accounts to send credential-stealing web links. Now, he gets to spend the next two and a half years in prison, and pay an oddly-specific fine of $310,629.

0 Comments
Continue reading

Tip of the Week: Tweak These 5 Mobile Apps to Consume Less Data

Tip of the Week: Tweak These 5 Mobile Apps to Consume Less Data

Chances are that if you’re using a smartphone, you’ll have your WiFi turned on as often as you possibly can. This helps to keep data hogs (applications that use a ton of your monthly allotted mobile data) at bay. However, not everyone has the convenience of an Internet connection at all times, particularly while you’re out of the office. Here’s how you can limit the damage done by your favorite smartphone apps.

0 Comments
Continue reading

The Cause of Social Media Addiction and How to Stop It

b2ap3_thumbnail_social_media_blocking_400.jpgSocial media addiction is a problem that plagues most modern businesses. Even though it’s a best practice to leverage social media to your business’s advantage, it’s a well-known fact that social media addiction can lead to wasted time and distractions in the office. In order to beat social media addiction in the office, it’s best to understand how it comes about, and what you can do to help your workers leave it alone, rather than locking everything down completely.

0 Comments
Continue reading

3 Modern Technologies Used By Every Political Campaign

b2ap3_thumbnail_campaign_it_400.jpgIn 19th century America, the hottest innovation for political campaigns was the exposed stump from a fallen tree, thus the stump speech. This technology revolutionized politics by allowing the candidate to elevate himself above the crowd for greater visibility and to better project one’s voice. Today, the political stump speech is obsolete, having its usefulness far surpassed by the technologies of the modern age.

0 Comments
Continue reading

Fans of Facebook Now Have a Facebook Business App

b2ap3_thumbnail_facebook_at_work_400.jpgFacebook has come a long way. Originally designed as a networking tool to be exclusively used by college students, Facebook now has 1.44 billion active users, making it the world’s largest social network. Today, businesses take Facebook seriously and utilize it for their marketing initiatives. However, it’s still viewed as a time-waster by many office managers who restrict or ban employees from accessing it.

0 Comments
Continue reading

Most Business Owners Only See 1-to-3% Consumer Engagement on Social Media

b2ap3_thumbnail_social_media_engagement_is_not_high_400.jpgYou’re surely aware of how valuable an asset social media is for your brand, but how much interaction are you really getting on your pages? No matter how many views, there’s always room for improvement. Well, you’ll be relieved to hear that even the large corporations don’t get too many hits on social media, despite the massive numbers in their favor.

0 Comments
Continue reading

Tip of the Week: How to Respond to Internet Trolls and Online Criticism

b2ap3_thumbnail_internet_troll_400.jpgNot everyone you meet on the Internet is going to have the same opinion as you. This ordinarily wouldn’t be a problem, since most people are reasonable and can realize when not to open their mouth; but on the Internet, anonymity breeds a foul creature with a mind for mischief: The Internet troll. They often respond to posts and comments in a condescending or crude, obnoxious manner in a deliberate attempt to anger the original poster.

0 Comments
Continue reading

Fight the Power: How A California Restaurant is Tackling Yelp’s Rating System

b2ap3_thumbnail_decisions_400.jpgThe Internet makes marketing your business much easier, but it's not that way for everyone. A restaurant in California has responded to the standard Internet marketing strategy with an out-of-the-box method of its own. David Cerretini, co-owner of the Italian restaurant Botto Bistro, has told his strategy to USA Today; "I want to be the worst restaurant in the San Francisco area!"

0 Comments
Continue reading

Mobile? Grab this Article

QR Code

Customer Login

News & Updates

  The Connection, Inc is proud to announce the launch of our new website at http://www.tconnection.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our servic...

Contact us

Learn more about what The Connection, Inc can do for your business.

The Connection, Inc
51 Village CT
Hazlet, New Jersey 07730