Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Thieves Materialize Most Around the Holidays

Thieves Materialize Most Around the Holidays

In terms of identity theft, data loss and good ol’ fashioned pickpocketing, the holiday season is one of the riskiest times to travel. When it comes to protecting your personal information, thieves and cybercriminals are counting on you to be distracted and make careless mistakes. In 2016, the number of fraud attempts went up by 31% during the holiday season. In addition, credit cards, mobile devices, and open Wi-Fi are common targets throughout the holidays.

Continue reading

Why Some People Can’t Be Productive While Travelling

Why Some People Can’t Be Productive While Travelling

Let’s say that you're on a business trip. As you travel, you decide you may as well get a bit of work done. You pull out your laptop and are pecking away, and that’s when you notice a growing feeling of nausea rising in your stomach. It gets so bad that you finally have to put the laptop away, having accomplished relatively little, before you are sick.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Managed IT Service IT solutions Word Apps Mobile Device Telephony Legal Best Practices Black Friday Modem Managed IT services Government Virtual Reality Remote Monitoring Meetings User Hosted Solutions Remote Computing MSP Black Market Cybersecurity Managed IT Services Experience Enterprise Content Management Statistics ROI Productivity Nanotechnology Compliance Recovery Windows 8 Theft Management Screen Reader Remote Worker Cyber Monday Data Security Proactive Training Cloud Computing Technology Data Upgrades Fraud SharePoint Lenovo Troubleshooting Work/Life Balance Search Halloween Retail Supercomputer Heating/Cooling Content Filtering Buisness IT Technicians Data storage Bluetooth Project Management Best Practice Instant Messaging iPhone Features Employees Business Owner Printing Motion Sickness Touchscreen Backup and Disaster Recovery IBM Techology Computers Unsupported Software Remote Workers Alt Codes Current Events Smartphones Computer Care Chatbots Cache Mail Merge Budget Network Security Licensing Robot Users Business Windows 10 Analyitcs Blockchain Co-managed IT Shortcut Spam Fleet Tracking Microsoft Excel Business Management Business Growth Downtime Internet Exlporer Files PDF Saving Time IT Consultant Unified Threat Management Financial Money Deep Learning Phishing Social Engineering Uninterrupted Power Supply How To Humor Typing Development Superfish Telephone Systems Assessment Gadgets Bandwidth Websites Data Recovery Tablet Flexibility Google Travel Cookies End of Support Documents Antivirus Redundancy App Health Application Time Management Address Tip of the week Marketing Chromebook WPA3 Drones Firefox IP Address Artificial Intelligence PowerPoint Zero-Day Threat Storage Processors Internet Cortana communications CIO Mouse Technology Laws Recycling Comparison Mirgation Vulnerabilities IT Support Relocation Monitors Going Green Outsourced IT Patch Management Servers Customer Relationship Management Computer Cloud IT Support Digital Payment Internet of Things Vulnerability Bitcoin Physical Security Regulations VPN Paperless Office Access Control Scam File Sharing Windows Disaster Resistance Smart Tech Net Neutrality Mobile Computing Mobile Device Management Taxes Mobile Device Managment Holiday Google Maps Social Media Law Enforcement Favorites Trending WiFi Laptop Star Wars YouTube Crowdsourcing 5G Applications Samsung Specifications Wireless Information 3D Printing Employee-Employer Relationship Data Warehousing Data Breach Tracking BDR Scary Stories Office 365 Virtual Desktop Server Operating System Identity Theft Chrome Competition Hardware Mobile Office Quick Tips Data loss Presentation Firewall Data Management Gadget Bookmarks Education Avoiding Downtime Sports WannaCry Managed IT Finance Facebook Refrigeration Cybercrime Wires Consultation Twitter Automation Authorization Server Management Asset Tracking Technology Tips Managed Service E-Commerce Piracy Hosted Solution Consulting Geography Permissions Saving Money Hard Disk Drive Staff Wearable Technology Lithium-ion Battery Authentication IT Management Outlook Vendor Management Maintenance Augmented Reality Backups Electronic Health Records G Suite Windows 10 Mobile Botnet Analytics Undo Corporate Profile OneNote Identity Legislation Digital Signature Google Docs Social Personal Information Small Business Save Time Software as a Service BYOD Two-factor Authentication Error Public Cloud Enterprise Resource Planning Productivity Business Technology LiFi eWaste Tech Term Office Programming Digital Hard Drives Hackers Test IT Services Hacking History Machine Learning Ransomware VoIP Privacy Business Intelligence Cleaning Mobile Devices Hiring/Firing Help Desk Notifications Administrator Data Backup Fun CCTV Mobility Security Hotspot Password IoT Electronic Medical Records Webcam User Tips Point of Sale Cost Management Wireless Technology Cryptocurrency HIPAA Human Error Healthcare Website Break Fix Safety IT Consulting Business Computing Networking Miscellaneous Managed Service Provider Dark Web Conferencing Politics Smart Technology Office Tips Information Technology The Internet of Things Solid State Drive Hacker Gmail Emoji Alert Phone System Managed Services Provider Employer-Employee Relationship Security Cameras Proactive IT Encryption How To Connectivity Google Calendar Consumers Computer Repair Communication Business Continuity USB Email Multi-Factor Security Staffing Google Wallet Administration Mobile Security Cabling Motherboard Customer Service Printer Web Server Efficiency High-Speed Internet Smartphone Network Congestion Entrepreneur Network Read Only Dark Data Writing Cooperation Malware Migration Automobile Bring Your Own Device Passwords Cyberattacks Unified Threat Management Microsoft Microsoft Office Utility Computing VoIP Apple Wi-Fi Tech Terms Network Management Document Management Big Data Save Money Update Procurement Managing Stress Settings Mobile Data Tip of the Week Operations Cameras Innovation SaaS Public Speaking Android Knowledge Distributed Denial of Service GPS Downloads Display Upgrade Remote Monitoring and Management Unified Communications Intranet Permission Virus Virtualization Language Environment Cables Private Cloud Browser IT service Infrastructure Software Tips Social Networking Sync Hard Drive Disaster Recovery Alerts Virtual Private Network Software Hacks Router Workplace Tips Computing Collaboration Computing Infrastructure Google Drive Risk Management Company Culture Tech Support Spyware RMM Domains IT Budget Identities Running Cable Disaster Monitoring User Error Backup

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...