Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Want to Go Mobile? Make Sure Your Device Management Software Has These 3 Features

Want to Go Mobile? Make Sure Your Device Management Software Has These 3 Features

Now that mobile devices have taken over the workplace, you need to consider the security of your business’s data more than ever before. You need to think about which devices access certain data, as well as what they do with that data. In particular, you need to make sure that only your employees can access corporate information, and there are several ways to do so.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Theft communications Google Maps Virus HIPAA Bring Your Own Device WiFi Tech Terms IT Budget Mobility Best Practice Licensing Employee-Employer Relationship Virtualization Microsoft Software Distributed Denial of Service Business Computing Avoiding Downtime VoIP Project Management Solid State Drive Telephony GPS Downloads Meetings Migration Competition Consumers Save Money Maintenance Point of Sale Black Friday Presentation Enterprise Content Management Mobile Hacking IT Consulting Remote Computing Settings File Sharing Internet Office Tips Digital Screen Reader Collaboration Email Mobile Data Proactive IT Cleaning Company Culture Techology Retail Productivity Programming Wi-Fi Financial Bitcoin Mobile Devices Applications Hotspot Windows 10 Productivity Hackers Wires SharePoint Hosted Solution Touchscreen Procurement Gmail Favorites Hiring/Firing Robot Backup and Disaster Recovery Downtime Computing Hacker Administration OneNote Security Cameras Hardware Troubleshooting History Notifications Computing Infrastructure WannaCry Google Docs Webcam Regulations Hard Drives Password Microsoft Excel Taxes Information Unified Threat Management Black Market Zero-Day Threat Cloud Computing Heating/Cooling BYOD Relocation Update Motherboard CIO Storage Mobile Device Managment Printer Electronic Medical Records Scary Stories Data Breach Operations Fun Personal Information Co-managed IT Corporate Profile Money How To Website Break Fix Document Management Comparison Managed Service Provider Mobile Office Authorization Consulting YouTube Google Wallet Alert IoT IP Address PowerPoint Blockchain The Internet of Things Best Practices Innovation Chatbots Content Filtering ROI Servers Politics Current Events Gadget Bookmarks Smartphone Social Media Lenovo Permission Permissions Assessment Privacy Professional Services Recycling Digital Payment Monitors Dark Data How To Language Hard Disk Drive Application Twitter Knowledge Shortcut Efficiency Supercomputer Identities Sports Time Management Identity High-Speed Internet Cache Miscellaneous Legal VPN User Tips Managed Services Provider Asset Tracking Administrator Domains Superfish Intranet E-Commerce Server Management Software Tips Connectivity Spam Budget Remote Monitoring Computer Staffing Paperless Office User Error Remote Monitoring and Management Physical Security iPhone Human Error Printing Enterprise Resource Planning Automobile Business Instant Messaging Analytics Communication Wireless Documents Cooperation Cyber Monday Public Cloud USB Google Calendar Antivirus App Emoji Outlook Telephone Systems Wasting Time Office 365 IT Technicians Remote Workers Facebook Internet Exlporer Managed IT Smart Technology Virtual Assistant Managed IT services Vulnerabilities Customer Relationship Management IT Consultant Mobile Device Management Augmented Reality Travel Samsung Websites CCTV Virtual Private Network Risk Management Modem Nanotechnology Geography Hacks Education Network Management Monitoring Hard Drive Customer Service Managed IT Service Phishing Drones Managing Stress SaaS Cybersecurity Data Security Conferencing Recovery Backup Automation Display Business Technology Cryptocurrency Cortana Unsupported Software Word Tip of the Week Management IT Support Fraud Android Mobile Security Specifications Passwords Cameras Files Apple Social Engineering Spyware Compliance Managed Service Virtual Reality Lithium-ion Battery Saving Money Undo Malware Unified Threat Management Safety Firefox 3D Printing Government Cybercrime Save Time Mobile Device Employees Software as a Service Scam IT Services Identity Theft Technology Laws IT Support Flexibility Upgrade Test End of Support Chromebook Development Finance Help Desk Workplace Tips Saving Time Managed IT Services Cabling Laptop Phone System Health Tech Term Business Continuity IT solutions Two-factor Authentication Remote Worker Data Cost Management Holiday Crowdsourcing Networking Piracy Database Authentication Alt Codes Staff Writing Outsourced IT Machine Learning Windows User Data Backup Deep Learning Data storage Mirgation Consultation Google eWaste Patch Management Multi-Factor Security Data loss Data Recovery 5G Information Technology Going Green Business Owner Work/Life Balance Office WPA3 Voice over Internet Protocol Gadgets Wearable Technology Hosted Solutions Mail Merge Marketing Data Warehousing Features MSP Tip of the week Computers Chrome Buisness LiFi Cloud Operating System Public Speaking Web Server Access Control Disaster Recovery Computer Care Humor Ransomware Notes Server Technology Tips Address Motion Sickness IT Management Disaster Utility Computing PDF Vendor Management Quick Tips Windows 8 Environment Digital Signature Tablet Small Business G Suite Microsoft Office Botnet Wireless Technology Security Typing RMM Virtual Desktop Network Congestion Mouse VoIP Business Intelligence Social Networking Trending Big Data Uninterrupted Power Supply Social Search Redundancy Sync Encryption Users Disaster Resistance Windows 7 Backups Analyitcs Error Cyberattacks Technology Tech Support Unified Communications Private Cloud Smartphones Entrepreneur Net Neutrality Vulnerability Business Growth Bandwidth Bluetooth Halloween Processors Infrastructure Refrigeration Employer-Employee Relationship IT service Star Wars Browser Healthcare Running Cable Electronic Health Records Upgrades Mobile Computing Business Management Proactive Apps Alerts Law Enforcement Statistics BDR Legislation Internet of Things Computer Repair Fleet Tracking Tracking Google Drive Artificial Intelligence Dark Web Read Only IBM Router Experience Cables Windows 10 Network Network Security Smart Tech Training Data Management Cookies Firewall

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...