Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

One Of Your Biggest Security Risks: Your Employees

One Of Your Biggest Security Risks: Your Employees

You might be surprised by how many of your organization’s security issues originate from within. A major contributor is user error, which can lead to some pretty severe problems reaching from your data security, to your workflow, all the way to the continuation of your business itself.

Continue reading
0 Comments

The Most Dangerous Threats to Your Business Could Be Internal

b2ap3_thumbnail_insider_mistakes_400.jpgMost of the time, when it comes to cybersecurity, businesses tend to focus primarily on external threats rather than those that might be lurking in the shadows of their internal operations. Believe it or not, the most dangerous entities out there could very well be working for you, right under your nose.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Information Cameras Botnet Mobile Device Managment How To Fun Zero-Day Threat Spam Emoji Proactive Identities WannaCry Search Test Microsoft Excel Marketing Enterprise Resource Planning Augmented Reality Identity Statistics Firewall Language Laptop Business Meetings Best Practices RMM Telephony Enterprise Content Management Remote Monitoring and Management Technology Features Compliance Point of Sale Workplace Tips Social Engineering Disaster Finance Printer Mobile Security Instant Messaging Experience CCTV Smartphone Saving Time Trending Writing Shortcut Google Maps Business Computing Gmail Regulations Presentation Storage Best Practice Hard Drive Miscellaneous Facebook Security Content Filtering Password iPhone Crowdsourcing Data loss Heating/Cooling Monitoring Mobile Office Legislation Geography Data storage Websites Troubleshooting IT Technicians Data Management Computers Wearable Technology Cybercrime Twitter Bandwidth Business Growth Co-managed IT Deep Learning Chromebook Consumers Mobile Device Unsupported Software Mobile Computing Privacy Mobile Device Management Blockchain Operations Business Owner G Suite Encryption Computing Infrastructure Piracy Automobile IBM Star Wars Theft Documents Tip of the Week Black Friday Saving Money Virtualization Legal Samsung Social Networking Malware Wi-Fi Specifications IT Services Wireless IoT Software Patch Management Hardware Firefox Employees Gadget Chrome Humor Internet Exlporer Hacker Virtual Desktop Data Hosted Solution Buisness Refrigeration Computer Repair Remote Workers Sync Managing Stress Server Management Supercomputer Printing Computer Care Electronic Health Records Two-factor Authentication Tip of the week Corporate Profile IT Consultant Politics Internet Smart Tech Apple Smartphones Mobility App Google Drive Tech Support YouTube Big Data Bluetooth Hard Drives History Cyber Monday Competition Data Breach Staff Conferencing CIO Money Vendor Management Domains Current Events High-Speed Internet Knowledge User Running Cable Servers Artificial Intelligence Wireless Technology Technology Laws Vulnerability Application WiFi Hackers Apps Hotspot Avoiding Downtime IT service Project Management Government Entrepreneur Android Nanotechnology Multi-Factor Security Internet of Things Remote Monitoring Computing Permissions VPN Healthcare Software Tips Personal Information Environment E-Commerce Users Migration Save Money Private Cloud Scam Data Security Display Telephone Systems IT Support Undo Windows Network Congestion Mobile Data Communication Health Website Customer Service Paperless Office Administration Read Only Windows 8 Training Cache Managed Service Provider Office 365 IT Management Mobile Windows 10 Comparison Analyitcs Typing Analytics Files IT solutions Business Management Microsoft Remote Computing Backup and Disaster Recovery Recycling communications Google Calendar IT Support Efficiency Hiring/Firing Unified Communications Cyberattacks Social Chatbots Information Technology Bitcoin Budget Work/Life Balance Tech Term Network Management Antivirus Connectivity Solid State Drive Motherboard Dark Data Applications Asset Tracking Time Management Hacks Managed Service Digital Signature Cryptocurrency Touchscreen Net Neutrality Access Control Operating System Bring Your Own Device Infrastructure Risk Management MSP Cables Fraud Digital Collaboration Email Travel Cloud Computing Tracking Authorization eWaste Employee-Employer Relationship Business Intelligence Processors Cybersecurity Google Docs Administrator Phishing Alert Managed IT Services Software as a Service Bookmarks Financial Innovation Tech Terms Smart Technology Education Notifications Downtime Office Tips Employer-Employee Relationship HIPAA Public Cloud Data Backup Black Market Staffing Customer Relationship Management Business Technology Windows 10 LiFi Address VoIP End of Support Productivity Backup Cookies Utility Computing Taxes Data Recovery Hacking Mobile Devices Mail Merge Mouse Security Cameras Cost Management Document Management Modem Network Physical Security Assessment OneNote Holiday Techology Mirgation Programming BYOD Tablet Quick Tips Going Green Automation Productivity Robot Alt Codes WPA3 Phone System Consulting Motion Sickness Wires PDF Upgrade Gadgets Identity Theft Word Outlook ROI Settings Virus File Sharing PowerPoint Redundancy Permission Flexibility How To USB Microsoft Office Unified Threat Management Webcam SaaS Virtual Reality Small Business Machine Learning Lithium-ion Battery Monitors Virtual Private Network Relocation GPS Development Management User Tips Halloween Distributed Denial of Service Help Desk Server Break Fix Google Wallet Ransomware Proactive IT Authentication Company Culture Remote Worker The Internet of Things Disaster Recovery Sports Business Continuity Fleet Tracking Cabling 3D Printing Save Time Hard Disk Drive Scary Stories Cortana Cleaning IP Address Drones Intranet Lenovo Downloads Human Error Procurement SharePoint Error Backups Networking Hosted Solutions Unified Threat Management Spyware Safety Data Warehousing Screen Reader Upgrades Uninterrupted Power Supply Passwords Superfish Favorites BDR Retail Managed Services Provider Dark Web Browser Public Speaking Managed IT Disaster Resistance VoIP Cooperation Outsourced IT Office 5G Network Security Managed IT Service Managed IT services Cloud Technology Tips Consultation Update User Error Social Media Google Computer Router Digital Payment Licensing IT Consulting Vulnerabilities Alerts IT Budget Electronic Medical Records Recovery Law Enforcement Web Server Maintenance

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code