Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are You Making Yourself Vulnerable Over Social Media?

Are You Making Yourself Vulnerable Over Social Media?

Social media might make it easy to stay connected, but it comes with a lot of negative side-effects--particularly in regard to security for both personal and professional use. If social media isn’t used properly, it could spell trouble for your organization. How can you foster proper social media usage so that your organization doesn’t suffer from poor security practices? It all starts by spreading awareness.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Identity Personal Information Printer Mobility Shortcut Staff Upgrades Knowledge Machine Learning Hacks Server Management Computer Repair Retail G Suite High-Speed Internet VoIP Work/Life Balance Screen Reader Drones Zero-Day Threat Unified Communications Backups Mobile Data Government Processors Documents Relocation Comparison IT Budget Electronic Medical Records Information Technology Mobile Device Disaster Resistance Managed Service Provider Sports Apps Productivity Software Tips Presentation Password Troubleshooting Router Migration Marketing Virus Deep Learning Software as a Service Mobile Device Managment Cortana Gadgets Software Identity Theft Alt Codes WiFi Administration Windows 10 VPN Compliance Instant Messaging IT Consulting Automation Computer User Error Phone System Windows 8 Hotspot Hard Drive Settings Customer Relationship Management Virtual Desktop Help Desk Test Sync Vendor Management Remote Computing Office Tips Uninterrupted Power Supply CCTV Save Time Hard Disk Drive Writing Current Events Experience Business Management Business Intelligence Firewall Consumers Human Error Travel Artificial Intelligence Alert Holiday Vulnerability Search Big Data Specifications Telephone Systems Mobile Computing Asset Tracking Employees Technology Laws 5G Workplace Tips Paperless Office Bring Your Own Device End of Support Scary Stories Statistics Analyitcs Read Only Recovery Hosted Solutions Identities Smart Technology Upgrade Redundancy Hiring/Firing Data Recovery RMM Email Communication Licensing Cybercrime Lenovo Augmented Reality Hackers Humor ROI Remote Monitoring and Management WannaCry Language Computing Website SharePoint Wireless Technology Backup and Disaster Recovery OneNote Corporate Profile Gmail Outlook Data storage Automobile Employer-Employee Relationship Mobile Operating System Fraud Chrome Permission Enterprise Resource Planning IoT Politics Undo Cabling Chatbots Internet Superfish Monitoring Business Hacking Cloud Computing Intranet Network GPS Windows Webcam Mouse Mobile Security Monitors Google Docs Avoiding Downtime Operations Google Drive Law Enforcement Cybersecurity Proactive IT Network Congestion Point of Sale Management Project Management Patch Management IP Address MSP Running Cable Staffing Internet of Things Business Computing Lithium-ion Battery Cameras PowerPoint Two-factor Authentication Cyberattacks Malware Consultation Innovation Spyware Storage Going Green Business Continuity Samsung Cooperation Laptop Websites Authorization Training BDR Tip of the Week Alerts Fleet Tracking Servers Social Engineering Tech Terms Public Speaking Safety Printing SaaS Managed IT Phishing BYOD Cookies Antivirus Theft Users Break Fix Ransomware Risk Management Tracking Firefox Customer Service Touchscreen Browser Save Money Crowdsourcing Financial Address Managed IT services Buisness Microsoft Excel Private Cloud IT service Business Technology Collaboration Computers Co-managed IT Passwords File Sharing WPA3 Emoji Networking Social Networking Favorites IT Technicians Content Filtering Enterprise Content Management Education Cables Consulting Application User Tech Term Hacker Distributed Denial of Service Miscellaneous Security Cameras Applications Saving Money Piracy Spam Disaster Administrator eWaste Flexibility Meetings Best Practices Remote Worker Social Media Heating/Cooling Files Maintenance Trending Managed IT Service Hosted Solution Mirgation Digital Signature Unsupported Software History Cleaning 3D Printing Encryption Features Network Management Blockchain Cryptocurrency Bluetooth IT Management User Tips Wireless Procurement PDF Android Data Security Wearable Technology Electronic Health Records CIO Data Management IT Support Downtime Windows 10 Gadget IT Support Notifications Google Calendar Office Wires Company Culture Utility Computing Internet Exlporer Physical Security Digital Domains Data Backup Technology Tips Server How To Cost Management Hard Drives Environment Entrepreneur Tip of the week Social Recycling YouTube Conferencing Mobile Device Management Office 365 Telephony Web Server Fun Solid State Drive Downloads Productivity Data Breach Healthcare Cyber Monday Typing Vulnerabilities Techology Privacy Digital Payment Display Information Botnet Business Growth Dark Web Computer Care Apple Proactive Infrastructure communications Chromebook Net Neutrality Modem Quick Tips Competition Unified Threat Management Saving Time Bandwidth Mobile Office Document Management Smart Tech iPhone Smartphones Refrigeration IT Consultant Data loss Nanotechnology Data Warehousing Halloween Legislation IT Services Star Wars Bookmarks Mail Merge Google Maps Regulations Public Cloud Microsoft Motherboard Unified Threat Management HIPAA Time Management Technology How To Virtual Private Network Virtual Reality IT solutions Programming The Internet of Things Error Remote Monitoring Outsourced IT Microsoft Office Permissions Network Security Efficiency Backup Money Scam Multi-Factor Security Black Friday Google Taxes Managed Service IBM Authentication Motion Sickness Black Market LiFi Analytics Dark Data Managing Stress Geography USB Managed IT Services Connectivity Small Business Hardware Assessment Robot Facebook Access Control Cloud Data Google Wallet Employee-Employer Relationship Supercomputer Virtualization VoIP Wi-Fi Budget Word Remote Workers Tablet Health E-Commerce Business Owner Development Security Twitter Cache Mobile Devices Update Bitcoin Legal Smartphone Best Practice Finance Managed Services Provider Disaster Recovery Tech Support App Computing Infrastructure

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...