Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Thieves Materialize Most Around the Holidays

Thieves Materialize Most Around the Holidays

In terms of identity theft, data loss and good ol’ fashioned pickpocketing, the holiday season is one of the riskiest times to travel. When it comes to protecting your personal information, thieves and cybercriminals are counting on you to be distracted and make careless mistakes. In 2016, the number of fraud attempts went up by 31% during the holiday season. In addition, credit cards, mobile devices, and open Wi-Fi are common targets throughout the holidays.

Continue reading

Why Some People Can’t Be Productive While Travelling

Why Some People Can’t Be Productive While Travelling

Let’s say that you're on a business trip. As you travel, you decide you may as well get a bit of work done. You pull out your laptop and are pecking away, and that’s when you notice a growing feeling of nausea rising in your stomach. It gets so bad that you finally have to put the laptop away, having accomplished relatively little, before you are sick.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security History Outsourced IT PDF Productivity Wires Buisness Software Customer Relationship Management USB Experience Finance Tech Terms Redundancy IBM Mail Merge Mouse Managed IT services Firefox Emoji Tech Support Safety Managing Stress Data Warehousing Avoiding Downtime Application Business Growth Websites Windows 10 Electronic Health Records Uninterrupted Power Supply Healthcare Multi-Factor Security Tech Term Environment Hackers Money Tip of the Week Deep Learning Windows 7 VoIP Going Green Mobile Smart Tech iPhone Intranet Computer Care Identities Domains End of Support SaaS Customer Service CIO Cloud Computing Budget Comparison Data Backup Computers communications Website Employer-Employee Relationship Net Neutrality Crowdsourcing Mobile Device Managment Mobile Security Access Control Favorites Business Owner Users Google Maps Point of Sale Cache Collaboration Malware Mobile Computing Miscellaneous Professional Services IP Address Cooperation Compliance Distributed Denial of Service Paperless Office Drones Software Tips Financial Virtual Reality Public Speaking Alerts Undo Information Technology Unified Threat Management Downtime CCTV Solid State Drive Mobile Devices Running Cable Retail Analytics Upgrade Conferencing IT Services Cortana Refrigeration Cameras Analyitcs Privacy Consulting Botnet Time Management Ransomware Hiring/Firing Business Management Piracy Remote Worker Apps Law Enforcement Instant Messaging Programming Star Wars Storage Utility Computing Administration Efficiency Licensing Operating System Android Office Tips Microsoft Data loss Chromebook Windows Communication Hardware Geography Business Computing Trending Email Competition Bitcoin Settings The Internet of Things Mirgation Webcam Motherboard Fleet Tracking Superfish Unsupported Software Productivity Identity Theft Backup Phone System Document Management Internet Business Technology Travel Enterprise Content Management Human Error Managed Service Provider Employees Automation IT Consultant Laptop Remote Monitoring and Management Politics Artificial Intelligence Upgrades 3D Printing Fun How To Samsung Regulations Robot Project Management WiFi BDR BYOD Hosted Solutions IT Consulting Two-factor Authentication Notes Alt Codes Gmail Hacking Spam Cybersecurity Shortcut Files Cybercrime Hotspot Nanotechnology Hacks Save Time Vendor Management Specifications Procurement Halloween Outlook Proactive IT Dark Data 5G Mobile Office Cabling Display Bring Your Own Device Recovery Lenovo Development Consumers Technology Laws Data Recovery Health LiFi Writing Permissions Apple Virtual Assistant Humor RMM Hacker Electronic Medical Records Information Personal Information Vulnerabilities IT service Backups Authorization Servers Software as a Service PowerPoint Telephone Systems Sports Asset Tracking Network Management Education Best Practice Processors Heating/Cooling Spyware Hard Drives Computing Holiday Data storage IT Technicians Vulnerability Co-managed IT Sync Flexibility Data Management Network Congestion Statistics Break Fix Network Security Management File Sharing Current Events Cookies Internet Exlporer Features Infrastructure Google Docs Typing Managed Service Backup and Disaster Recovery Legal Computer Repair Enterprise Resource Planning User Tips Cleaning Connectivity Computing Infrastructure Server Management Dark Web Managed IT Service Virtualization Data Security User Remote Computing Voice over Internet Protocol Company Culture Encryption Staffing Consultation MSP Address Big Data Google Search Machine Learning Tablet Technology Smartphones Disaster Resistance Physical Security High-Speed Internet IoT Migration Cables Telephony Applications Maintenance VPN Work/Life Balance Hard Drive Downloads Legislation Quick Tips Test Smartphone Google Drive Meetings Virus Cyberattacks Cost Management Corporate Profile Social Engineering Notifications Unified Communications Taxes Training User Error Internet of Things Business Mobile Device Management Government Office 365 Virtual Desktop Disaster Recovery WPA3 Private Cloud Social Networking Mobile Data Cryptocurrency E-Commerce Staff Motion Sickness ROI Patch Management Windows 10 Presentation Browser Office Facebook Gadget Error Language Server Wireless Technology Screen Reader Printing GPS Smart Technology Touchscreen Google Wallet Scam Firewall Proactive Phishing Content Filtering OneNote Cloud App Scary Stories Networking Bluetooth Bookmarks Security Cameras Bandwidth Monitors Business Intelligence Risk Management Word Relocation Alert YouTube Saving Time Innovation G Suite Operations Hosted Solution Tracking How To Social Media Mobility Database Unified Threat Management Update Modem IT Support Small Business WannaCry Router Wireless Recycling Fraud Public Cloud VoIP Microsoft Excel Cyber Monday Wi-Fi eWaste IT Budget Black Market HIPAA Mobile Device Computer Twitter Wasting Time Managed Services Provider Help Desk Saving Money Save Money Troubleshooting Supercomputer Black Friday Authentication Network Hard Disk Drive Workplace Tips Web Server Entrepreneur Documents Read Only Administrator Data Digital Assessment Data Breach Tip of the week Remote Monitoring SharePoint Printer Techology Permission Best Practices Remote Workers Managed IT Chrome Augmented Reality Monitoring Chatbots Antivirus Disaster Identity Knowledge Google Calendar Windows 8 Blockchain IT Support IT solutions Zero-Day Threat Microsoft Office Digital Signature Business Continuity Managed IT Services Passwords Lithium-ion Battery Automobile IT Management Social Employee-Employer Relationship Wearable Technology Gadgets Password Marketing Theft Technology Tips Virtual Private Network Digital Payment

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...