Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Facebook Makes Two-Factor Authentication Easier

Facebook Makes Two-Factor Authentication Easier

If you use Facebook, you likely have a lot of personal information stored there. If you use it for your business, then your professional reputation also partially relies on what you put into the social network. If you aren’t protecting your Facebook account, you could be at risk for identity theft or worse. That’s why using two-factor authentication on your social media accounts is becoming more important than ever.

Continue reading
0 Comments

According to Study, Only 28% Utilize Two-Factor Authentication

According to Study, Only 28% Utilize Two-Factor Authentication

2FA, or two-factor authentication, is a simple and effective means of boosting your cybersecurity. Despite this, a study performed by Duo Labs suggests that 2FA has not been adopted as much as one might expect, or as much as it should be.

Continue reading
0 Comments

Two Steps Are Better Than One, Where Security Is Concerned

Two Steps Are Better Than One, Where Security Is Concerned

You’re lucky to go a month without seeing news of some devastating data breach. With more businesses gearing up for the worst, what are you doing to protect your organization’s intellectual property and sensitive data? You can start by implementing a new type of authentication system that’s much more secure than your current security strategy--two-factor authentication.

Continue reading
0 Comments

Tip of the Week: How to Set Up Multi-Factor Authentication for Office 365

b2ap3_thumbnail_office_365_multi_factor_400.jpgHackers are growing bolder by the day, taking on huge organizations like the IRS and Sony Entertainment, and forcing businesses to stay on the defensive at all times. In spite of this, what can the average small business do to keep themselves safe? For starters, you can integrate multi-factor authentication, a solution designed to make it extra difficult for hackers to access online accounts.

Continue reading
0 Comments

Two-Factor Authentication: An Easy Way to Make it Hard for Hackers

b2ap3_thumbnail_two_factor_security_400.jpgHave you heard the news? Passwords are old-school methods of authenticating account logins. If you want to maximize the security of your business, using two-factor authentication is your best bet.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Hard Drive ROI Smartphone Processors Instant Messaging Sync Laptop Mobile Devices Mail Merge Data loss Telephony iPhone PDF Microsoft Network Backup and Disaster Recovery Mobility Private Cloud Remote Workers Recovery 5G Features Security Quick Tips Bluetooth Data Backup Cybercrime IT Consultant Hard Disk Drive Hard Drives Data Mirgation Cameras Dark Web Fraud Writing Tablet Encryption Hotspot Buisness Small Business Antivirus Business Owner Screen Reader Internet Exlporer CIO Operations Robot Storage Communication Cabling Vendor Management Cyber Monday Automation Webcam Mobile Device Managment GPS Redundancy Augmented Reality Technology Tips Google Maps Applications Unified Threat Management Efficiency Asset Tracking Legislation IT Technicians Mobile Office Holiday Digital Signature Emoji Permissions Downtime Smartphones Health Help Desk Development Email Retail Trending High-Speed Internet Gadgets Best Practices Smart Technology Co-managed IT communications Hosted Solution Read Only Computers Staffing Alerts Star Wars Facebook Recycling Social Settings Customer Relationship Management Computer Care Windows 10 Mobile Device Alert Upgrades Office 365 Business Intelligence Save Money Managing Stress IT Support Users Project Management Refrigeration Cache VPN Unified Threat Management Unified Communications Point of Sale Test Data Management Money Computer Domains Public Cloud eWaste IT solutions Safety Workplace Tips Browser Wearable Technology Hosted Solutions IT service Cloud Administrator Bandwidth Search Comparison Business Technology Going Green Security Cameras E-Commerce Enterprise Resource Planning Halloween Disaster Recovery Disaster Data storage Document Management Travel Cortana Network Management Identity Theft HIPAA Google Wallet Managed Services Provider Public Speaking Two-factor Authentication Migration Word IP Address Managed IT Miscellaneous Networking Managed Service Cryptocurrency Patch Management Break Fix Virtualization History Managed IT services Technology Network Security Server LiFi Saving Money Black Market Compliance Smart Tech Work/Life Balance Mobile Security Fleet Tracking Specifications Geography Save Time Website Big Data Hackers Piracy Malware Digital End of Support Virtual Desktop Display Web Server Politics Google Tech Terms Law Enforcement Relocation Theft Firefox Managed IT Service Hacking Router Infrastructure Hiring/Firing Windows 8 Vulnerability Windows 10 Nanotechnology Cybersecurity Collaboration Vulnerabilities Financial Consulting Flexibility Finance Zero-Day Threat Wi-Fi IT Management Machine Learning Chrome Documents Healthcare Data Warehousing Error Computing Running Cable Outsourced IT Supercomputer Experience Alt Codes Saving Time Tip of the week Windows Privacy Uninterrupted Power Supply Mobile Computing Gadget G Suite Android Address App Cables Printing Employee-Employer Relationship Budget WPA3 Electronic Medical Records Monitoring Internet IT Budget Consultation Update Scary Stories Sports SharePoint Employees Social Networking Management Social Media Proactive Environment How To Google Drive Cost Management Digital Payment Proactive IT Data Recovery Meetings Entrepreneur Managed Service Provider Regulations Monitors Virtual Reality Solid State Drive Phone System Data Security Mobile Data Best Practice Google Docs Cooperation Remote Computing Access Control PowerPoint Websites Bookmarks Legal Botnet Data Breach Cloud Computing Avoiding Downtime Business Motherboard Computing Infrastructure Unsupported Software Competition MSP Password Innovation Motion Sickness Lenovo Information Technology Corporate Profile Business Computing Modem Touchscreen Permission Blockchain Tech Support Notifications Content Filtering Fun Wireless Productivity Remote Worker Printer Mobile Licensing Enterprise Content Management WannaCry Artificial Intelligence Application Ransomware Gmail Tip of the Week Taxes Analyitcs Human Error File Sharing Net Neutrality Maintenance Chatbots IoT User Error Connectivity Education Servers Virus Firewall Authentication Technology Laws BYOD Bring Your Own Device Favorites Chromebook Programming Social Engineering Remote Monitoring Government Computer Repair Business Management Current Events Information Presentation Twitter Analytics Microsoft Office Electronic Health Records Office IBM Cyberattacks Hacks Utility Computing Passwords Bitcoin Customer Service Upgrade Microsoft Excel Knowledge IT Services Physical Security Crowdsourcing Remote Monitoring and Management Identities Paperless Office Mouse SaaS WiFi Shortcut Cookies Operating System Administration Wireless Technology Phishing Business Growth Multi-Factor Security VoIP USB Troubleshooting The Internet of Things Identity Procurement Business Continuity Automobile IT Support Black Friday Server Management Mobile Device Management BDR OneNote Company Culture Conferencing Marketing Backup Outlook Time Management Assessment Undo Tracking Telephone Systems Productivity Typing How To Virtual Private Network Hardware Authorization Software as a Service Deep Learning Superfish User Tips Employer-Employee Relationship Tech Term 3D Printing Managed IT Services Internet of Things Intranet CCTV User Humor Consumers Apple Heating/Cooling Statistics Language YouTube Training RMM Risk Management Wires Dark Data Downloads Files Techology Spyware Personal Information Apps VoIP Disaster Resistance IT Consulting Cleaning Google Calendar Software Drones Software Tips Network Congestion Samsung Hacker Lithium-ion Battery Office Tips Spam Staff Backups Distributed Denial of Service Scam

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code