Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are You Making Yourself Vulnerable Over Social Media?

Are You Making Yourself Vulnerable Over Social Media?

Social media might make it easy to stay connected, but it comes with a lot of negative side-effects--particularly in regard to security for both personal and professional use. If social media isn’t used properly, it could spell trouble for your organization. How can you foster proper social media usage so that your organization doesn’t suffer from poor security practices? It all starts by spreading awareness.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Distributed Denial of Service Cost Management Machine Learning Finance Upgrade Mobility Saving Time Saving Money Programming Data loss IT Support Social Networking Electronic Medical Records Social Engineering OneNote Gmail Mobile Device Management Networking Current Events Network Congestion Best Practices eWaste Remote Monitoring Proactive Cybersecurity Unified Threat Management Halloween Meetings Windows 7 Router Utility Computing Twitter Digital Payment Sync Display VPN Test Notes Smart Technology Going Green Uninterrupted Power Supply Net Neutrality IT solutions Legal BDR Managed IT services Bandwidth Administration Licensing IT Support Business Intelligence Miscellaneous Crowdsourcing Asset Tracking Managed IT Services Remote Worker Scam Computer Care Human Error IBM Internet Business Health Analyitcs Websites Safety Wearable Technology Social Media Telephony Patch Management Point of Sale SaaS Mobile Device Search Best Practice Enterprise Resource Planning Tip of the Week Malware Big Data Productivity Backup and Disaster Recovery IT Consulting Recovery IoT Gadgets Relocation Google Wallet Managed Service Apps Applications Entrepreneur Managed Services Provider Virtual Assistant Google Maps Computing CCTV Security Information Technology Public Speaking Laptop Digital Signature Business Continuity User Tips Alt Codes Business Management Employees Time Management MSP Remote Computing Law Enforcement Nanotechnology Touchscreen GPS ROI RMM Shortcut Data Breach Update Smartphone Facebook Mobile Security Innovation Antivirus Travel Hard Disk Drive Information Smartphones Data Security Backups Office Recycling Windows 8 Address Connectivity Hard Drive IT Technicians Presentation High-Speed Internet Workplace Tips Techology Knowledge Technology Laws Troubleshooting Office Tips Wi-Fi Public Cloud Cables Star Wars Data Network Security LiFi Mobile Office Trending Humor Internet Exlporer Outsourced IT Cookies Vulnerability HIPAA Computing Infrastructure Wireless Network Management Google Docs Productivity Administrator Retail communications Save Time Chromebook Infrastructure Cameras Data Warehousing Botnet Wireless Technology Drones Virus Training Database Efficiency Tech Term Legislation Migration Phone System Compliance Google Specifications Paperless Office Unified Threat Management Server Hacking Mouse Apple Running Cable Private Cloud E-Commerce Windows 10 Printer Staffing CIO Typing G Suite App Dark Data Tablet Hard Drives Experience Computers Alert PDF Upgrades Politics File Sharing Disaster USB Writing Statistics Screen Reader Proactive IT Emoji Consulting IP Address Break Fix Communication Bitcoin Authorization Application Regulations Government Business Technology Permissions Users Collaboration Motherboard Small Business Security Cameras Bring Your Own Device IT Management Scary Stories Downloads History Privacy Identities Firewall BYOD Piracy Assessment Office 365 Hiring/Firing PowerPoint Smart Tech IT service Processors Disaster Recovery Content Filtering Google Drive Work/Life Balance Technology Tips Encryption Redundancy Spam Development Avoiding Downtime Tech Terms Cloud Tip of the week Cybercrime Virtual Reality Virtual Desktop Storage Webcam Cyber Monday Server Management Network Blockchain Dark Web IT Budget Identity Automation Internet of Things Risk Management Competition IT Services Downtime VoIP Managed IT Business Growth Cyberattacks How To Data Management VoIP Operating System Cryptocurrency Hosted Solutions Mobile Computing Employee-Employer Relationship Software as a Service Conferencing Identity Theft Tech Support Firefox Domains Servers Voice over Internet Protocol Hotspot Augmented Reality Disaster Resistance Physical Security Tracking Lenovo Cabling 3D Printing Money Buisness Windows 10 Budget Mail Merge Authentication Gadget Data storage Cleaning Data Recovery Comparison Remote Workers Instant Messaging Staff Business Owner The Internet of Things Phishing Bluetooth Help Desk Android Automobile Virtualization Vulnerabilities Theft Undo Document Management Co-managed IT Favorites Wires Hacker Solid State Drive iPhone Education Chatbots Management Documents Supercomputer Samsung Social Environment Superfish Fun Hackers Web Server Financial Company Culture Spyware Fleet Tracking Zero-Day Threat Customer Service Mobile Devices Project Management Password Corporate Profile User Error Digital Robot Hosted Solution Telephone Systems Microsoft Mobile Mirgation Passwords IT Consultant Multi-Factor Security Managed IT Service Maintenance Flexibility Geography Heating/Cooling Sports Bookmarks WannaCry Healthcare Save Money Notifications Outlook Personal Information Language Refrigeration Fraud Two-factor Authentication Read Only Chrome Printing How To Monitors SharePoint Quick Tips Taxes Black Market End of Support Cloud Computing Windows Intranet Software Enterprise Content Management Monitoring Holiday Backup Unsupported Software Browser Virtual Private Network Procurement WPA3 Consultation Managing Stress Lithium-ion Battery Access Control Alerts Analytics Error Operations Unified Communications Cooperation Customer Relationship Management Business Computing Hacks Files Microsoft Excel Marketing Software Tips YouTube Ransomware Electronic Health Records Data Backup 5G WiFi Managed Service Provider Features Google Calendar Computer Microsoft Office Technology Wasting Time Computer Repair Hardware Word Vendor Management Mobile Device Managment Cache Mobile Data Deep Learning Motion Sickness Settings Consumers Modem Website Cortana Permission Artificial Intelligence User Black Friday Remote Monitoring and Management Employer-Employee Relationship Professional Services Email

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...