Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

One Of Your Biggest Security Risks: Your Employees

One Of Your Biggest Security Risks: Your Employees

You might be surprised by how many of your organization’s security issues originate from within. A major contributor is user error, which can lead to some pretty severe problems reaching from your data security, to your workflow, all the way to the continuation of your business itself.

Continue reading
0 Comments

The Most Dangerous Threats to Your Business Could Be Internal

b2ap3_thumbnail_insider_mistakes_400.jpgMost of the time, when it comes to cybersecurity, businesses tend to focus primarily on external threats rather than those that might be lurking in the shadows of their internal operations. Believe it or not, the most dangerous entities out there could very well be working for you, right under your nose.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Google Drive Multi-Factor Security Public Speaking Travel Heating/Cooling Mobile Data Motion Sickness Printer Google Smart Tech Search Wires Managed Services Provider PowerPoint VoIP Alert Geography Computing File Sharing Piracy Social Deep Learning Upgrades Managed IT Service Comparison Disaster Recovery Touchscreen Monitoring Distributed Denial of Service Emoji Twitter Digital Signature Identity Tip of the week Websites Data Data storage Artificial Intelligence Shortcut Identity Theft Net Neutrality Phishing Mobile Devices Recovery Documents Technology Microsoft CCTV Motherboard Cryptocurrency Digital Payment Modem Data Backup Redundancy Infrastructure Tip of the Week Permissions Writing Procurement Outlook WPA3 Google Maps Permission Electronic Health Records Vulnerabilities Techology Downloads Database Application Specifications Superfish Read Only Server Management Remote Computing Applications Printing Hacking Storage Asset Tracking Virus Help Desk Enterprise Content Management 3D Printing Computer Care Cortana Browser Company Culture MSP Managed IT services Collaboration Managed Service Provider Office 365 Workplace Tips Personal Information Financial Wearable Technology Domains Save Money Healthcare Business Technology Remote Monitoring Trending Managed IT Migration Lithium-ion Battery Privacy Windows 8 Mobile Website Antivirus Budget Solid State Drive Nanotechnology IT Support Upgrade Co-managed IT Cooperation User Samsung Paperless Office Patch Management Cables Mouse Star Wars Backup Compliance Malware Sync Internet IT Support Licensing Telephony Test Legal Black Friday Smartphone IT Consulting Outsourced IT Business Continuity How To Backups Google Docs IT Management Managing Stress Health Finance Virtualization Two-factor Authentication 5G Going Green Tech Terms Microsoft Excel Risk Management BYOD Current Events Files Analytics Consumers SharePoint Proactive IT Document Management WannaCry Gmail Meetings Time Management Bookmarks IT Services Technology Tips Identities Hacks Computing Infrastructure Dark Web Webcam Servers Favorites Cloud Corporate Profile RMM Business Owner Flexibility Ransomware Phone System Bluetooth Hiring/Firing How To Physical Security Government Holiday Security Language Employee-Employer Relationship Maintenance Internet Exlporer Administration Content Filtering Authentication Word Users Mobile Device Uninterrupted Power Supply Development Email Chromebook Employees Undo Halloween Automation Digital Wireless Technology Intranet Augmented Reality Chatbots Staffing Vendor Management Server Password App Hosted Solutions Encryption Virtual Private Network Wasting Time Unified Threat Management Wi-Fi SaaS USB Project Management Statistics LiFi Cloud Computing Assessment IT Technicians Bandwidth Customer Service Money Fraud Troubleshooting Cabling Bitcoin The Internet of Things Tech Term Hard Drives CIO Technology Laws Telephone Systems Business Botnet User Tips Google Wallet IBM Humor Computers Operating System Business Growth YouTube Big Data IT service Buisness Remote Monitoring and Management High-Speed Internet Presentation Business Computing Vulnerability Networking Gadgets Downtime Tracking Marketing Software as a Service Taxes Fun Virtual Assistant Small Business Regulations IoT Robot iPhone Consulting Typing Address Data loss Passwords Notifications Dark Data Network Backup and Disaster Recovery Education Android Alt Codes User Error Cookies Administrator Drones G Suite IT solutions Refrigeration Security Cameras Gadget Consultation Sports Access Control Office Computer Cleaning Mobile Security Supercomputer Innovation Features Private Cloud Productivity Data Warehousing Alerts Data Recovery Social Engineering Disaster Mail Merge Proactive Machine Learning Information Best Practice Notes Social Networking Network Management BDR GPS Internet of Things Running Cable Bring Your Own Device Unified Communications HIPAA Recycling Instant Messaging Retail Google Calendar Cache Web Server Smartphones Experience Customer Relationship Management Windows 10 Scary Stories Saving Time Software Tips Windows Mobile Computing Network Security OneNote Scam IT Budget Virtual Reality Computer Repair Management Best Practices Knowledge Mobile Office Virtual Desktop Analyitcs Processors Disaster Resistance Save Time Cybersecurity Hosted Solution Training Business Intelligence Social Media Point of Sale Chrome Unsupported Software Miscellaneous Laptop Windows 10 IP Address Blockchain Public Cloud Safety Unified Threat Management Legislation Fleet Tracking Windows 7 Lenovo Settings Zero-Day Threat Operations Politics VoIP Mobile Device Managment Relocation Efficiency Smart Technology Managed Service Display IT Consultant Spam Staff History Software Hacker Utility Computing Hard Drive Data Security Business Management Environment Saving Money Remote Worker Tech Support Tablet Avoiding Downtime Professional Services Entrepreneur Productivity Screen Reader Communication ROI Theft Remote Workers Law Enforcement Apple Monitors Cameras Apps Microsoft Office Cybercrime Authorization Managed IT Services Router Conferencing WiFi Mirgation Cost Management Work/Life Balance Human Error End of Support Facebook Black Market communications eWaste Cyber Monday VPN PDF Break Fix Programming Mobile Device Management Error Spyware Mobility E-Commerce Firefox Employer-Employee Relationship Electronic Medical Records Network Congestion Office Tips Cyberattacks Hackers Firewall Connectivity Automobile Data Management Voice over Internet Protocol Enterprise Resource Planning Hardware Wireless Competition Information Technology Data Breach Hotspot Update Crowdsourcing Quick Tips Hard Disk Drive

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...
QR-Code