Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Be Like These 14 Million US Businesses and Ignore Data Security

Don’t Be Like These 14 Million US Businesses and Ignore Data Security

If you run a small business, you might consider yourself a small target of hacking attacks. It might make sense to think of it in this way, but this actually is not advisable to think of it in this way. According to a recent survey by CNBC and SurveyMonkey, only two percent of small businesses see cyber attacks as anything worth worrying about. This leads us to the next question… are you one of them?

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

WiFi VoIP IT Support Quick Tips IT Technicians Windows 8 Sports Shortcut Robot Employee-Employer Relationship Consumers Efficiency Tracking Website Drones Malware Data Printer Smart Tech Best Practice Conferencing Competition Microsoft Office Network Security Cameras Blockchain Crowdsourcing IT Support Chrome Paperless Office Information Safety Favorites IT service Data Management Tech Terms Smartphones Data Backup Screen Reader SharePoint Internet of Things Instant Messaging Enterprise Resource Planning Customer Service Server Environment Relocation Data Warehousing Best Practices Healthcare How To Digital Upgrades Legislation Networking Internet Exlporer Assessment Wearable Technology Smart Technology Software Tips Law Enforcement Spyware Break Fix Cortana Statistics Computer Meetings Humor Operating System Google Docs Co-managed IT Data Breach Cooperation Voice over Internet Protocol Intranet Address Notifications Apps Router Managed IT Services Augmented Reality Android Tip of the Week Workplace Tips Net Neutrality Password Hacking Deep Learning Consulting Managed IT IBM Uninterrupted Power Supply Project Management Google Social Migration Zero-Day Threat Administration Regulations Emoji Automobile YouTube Laptop Error Social Networking Comparison Professional Services IT Management SaaS Outlook Files Recovery Maintenance 3D Printing Server Management Backups Software Cyber Monday Cache Windows Programming Cookies Gadget Network Congestion Save Time Remote Monitoring and Management Trending Business Owner Mirgation Mobile Data Firefox Big Data WannaCry Domains The Internet of Things Windows 7 Wi-Fi Cryptocurrency Staffing Network Security Monitors Health Mobile Devices Superfish Marketing Wireless Employer-Employee Relationship Work/Life Balance Backup and Disaster Recovery Alert Bandwidth BDR Budget Browser Encryption Supercomputer Search Touchscreen Retail Solid State Drive PDF Patch Management Phone System Mobile Device Managment Point of Sale Specifications ROI History G Suite Hard Disk Drive Wires Database Social Media Public Cloud Buisness Users IT Services Troubleshooting Modem E-Commerce Tip of the week Consultation Managed IT Service Communication Compliance Storage Techology Help Desk Virus Data Recovery Digital Signature Cybersecurity communications Alt Codes Black Friday Theft Writing Cleaning Hosted Solution Customer Relationship Management Document Management Access Control Money Information Technology High-Speed Internet Computer Repair Applications Managing Stress Company Culture Antivirus Wireless Technology Undo Running Cable Unified Threat Management Mobile Device Management VoIP Google Maps Going Green iPhone Productivity Virtual Private Network Identities Computing Entrepreneur Data storage LiFi Cloud IT Consultant Telephony Language OneNote Identity Technology Laws eWaste Outsourced IT Small Business Microsoft Mouse Private Cloud Saving Money Computer Care Wasting Time Electronic Health Records Utility Computing Business Intelligence Managed Services Provider Downloads Finance Public Speaking Computers Gmail Virtual Desktop Lithium-ion Battery Internet Scary Stories Google Wallet Web Server Proactive Websites Virtual Reality Mobile Security Webcam Tablet USB Printing Mail Merge Vulnerability Electronic Medical Records Monitoring PowerPoint Cabling Downtime Employees Samsung Computing Infrastructure Documents Hacks Enterprise Content Management Motherboard Business Management Redundancy Windows 10 User How To Taxes Disaster Digital Payment Business Growth Managed IT services Mobility Cables IoT Telephone Systems Unified Communications Halloween Flexibility Multi-Factor Security Fleet Tracking Development Hacker Connectivity IT Budget Cyberattacks Permissions Automation Bluetooth CIO Tech Support Facebook Hard Drives Disaster Resistance Email IT solutions Business Computing Read Only Word Botnet Innovation Distributed Denial of Service Office 365 Remote Computing Two-factor Authentication Scam Heating/Cooling Star Wars Application Hackers File Sharing Holiday Chatbots MSP Hiring/Firing Microsoft Excel Financial Processors Fun Mobile Infrastructure Business Continuity Phishing Remote Monitoring Risk Management Update Refrigeration Passwords Motion Sickness Operations Remote Workers Bookmarks WPA3 Technology Tips Management User Error Test End of Support Bring Your Own Device Education Procurement Artificial Intelligence Apple Time Management Smartphone Google Drive GPS Windows 10 IP Address Hard Drive Corporate Profile Mobile Device Vulnerabilities Ransomware Tech Term Privacy Spam Vendor Management Legal Hardware Cost Management Personal Information Current Events Machine Learning Features Technology Data loss Licensing Business Technology Display Security Google Calendar User Tips Software as a Service Cameras Business Asset Tracking Productivity Government Office Tips Experience Permission Collaboration Dark Data Saving Time Sync Avoiding Downtime Office Twitter Unsupported Software Authorization Mobile Computing RMM Cloud Computing Backup Servers Mobile Office Data Security Cybercrime Geography Hotspot VPN Alerts Disaster Recovery Social Engineering CCTV Virtual Assistant Authentication Hosted Solutions Physical Security IT Consulting Dark Web Administrator Firewall HIPAA Lenovo Remote Worker Chromebook Content Filtering Managed Service Notes 5G Miscellaneous Analytics Travel Staff Save Money Nanotechnology Identity Theft Human Error Presentation Knowledge Recycling Analyitcs Politics Unified Threat Management Gadgets Upgrade Fraud Bitcoin Black Market Proactive IT Piracy Virtualization Typing Managed Service Provider Network Management App Training Settings BYOD

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code