Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Your Business May Be Most Vulnerable from the Inside

Your Business May Be Most Vulnerable from the Inside

It can be easy, with all the threats covered in the news, to assume that the biggest dangers to your business all come from the outside. This is a dangerous mistake, as there are plenty of vulnerabilities that originate from within your organization, making it easier for outside threats to come in, if not being bigger threats in and of themselves. Below, we’ll review some of the biggest, mostly internal dangers that your business may face.

Continue reading

It May Take a While For Windows 10 to Overtake Windows 7

b2ap3_thumbnail_windows_10_now_400.jpgThe hype is still strong for Windows 10, and it’s easy to see why. It’s a great operating system that has the potential to change the way your business performs its daily duties. However, the monthly desktop operating system usage statistics released by NetMarketShare hint that Windows 10 adoption is starting to slow down and that many users are simply opting to keep using Windows 7, Windows 8, and Windows 8.1. What gives?

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Automation Windows CCTV Enterprise Resource Planning How To USB Augmented Reality Education Cortana Personal Information Hosted Solution Relocation File Sharing Presentation Blockchain Twitter IoT Data Warehousing Employer-Employee Relationship Google Docs Cloud Computing Mail Merge Automobile Chromebook Virus Finance Wi-Fi Browser Crowdsourcing Zero-Day Threat Mobile Computing Cloud Network Management Operating System Humor Windows 8 Fleet Tracking Project Management VoIP Going Green Permissions Data loss Chatbots Wearable Technology Office 365 Virtual Private Network Voice over Internet Protocol IT Support Intranet SaaS Net Neutrality Mobile Data WannaCry Analytics Server Management Computers Refrigeration Phone System Information Windows 10 Website Emoji Cybersecurity Chrome Avoiding Downtime Retail Data Google Drive Writing Cabling Internet Exlporer High-Speed Internet Social Networking Solid State Drive Mobile Devices Current Events Hardware Processors IT Management Microsoft eWaste IT Technicians Remote Worker Wireless Public Speaking Shortcut Hackers Bring Your Own Device Business Read Only Business Intelligence Cryptocurrency Analyitcs Buisness GPS Firewall How To Corporate Profile Hosted Solutions Budget Passwords Recycling History Mirgation Google Touchscreen Save Money Tech Terms Technology Uninterrupted Power Supply Professional Services Encryption Money Employees Halloween Telephone Systems Office Tips E-Commerce Features Identity Theft Technology Tips Knowledge Managed Service Router VPN Unsupported Software Unified Threat Management Password Downtime Training Nanotechnology Typing iPhone Licensing Authorization IT Consultant Computer Care Internet of Things Computing Infrastructure 3D Printing IP Address Administration Staff Content Filtering Upgrade Remote Monitoring and Management Hacks Wires Conferencing Test App Dark Data Multi-Factor Security Technology Laws Law Enforcement Gadgets Hacker Customer Service Private Cloud Gmail Tracking Scary Stories Authentication Microsoft Office IT Consulting Wasting Time Business Technology Bitcoin Mobile Security Government Update Telephony Small Business Managed IT Service Email Statistics Virtual Reality Server Specifications Mobile Sync Notifications Data Backup Network Congestion Troubleshooting Procurement Alt Codes Firefox Display Patch Management Remote Computing Physical Security Tablet Cyberattacks Managed IT Backups Users Downloads Google Wallet Cost Management Big Data Sports 5G Drones ROI PowerPoint Proactive Business Continuity BYOD Ransomware Bluetooth Black Market Modem Outsourced IT Vulnerability Hotspot Workplace Tips Monitoring Co-managed IT SharePoint Recovery Social Media Permission Applications Language Techology Piracy Cache Programming Backup Business Computing Cooperation Time Management Windows 7 Printing Cameras Wireless Technology Identities Cyber Monday Office Saving Time Android Star Wars Assessment Tip of the Week Human Error Lithium-ion Battery Fun Help Desk Quick Tips PDF Smart Technology Disaster Resistance Digital Payment Spyware User Tips Compliance Healthcare Company Culture The Internet of Things Saving Money Hard Drives Undo Public Cloud Save Time Migration Networking Unified Threat Management Best Practice Machine Learning Business Owner Favorites Development Vulnerabilities Google Maps Security Cameras Entrepreneur Cookies Mobility Websites Computing Flexibility Botnet Digital Signature Asset Tracking Data storage Instant Messaging Hard Disk Drive VoIP WiFi RMM Phishing Consulting Disaster Recovery Paperless Office Utility Computing Trending Error Document Management Managed IT Services Google Calendar Motion Sickness Innovation Access Control Network Security Customer Relationship Management Heating/Cooling Distributed Denial of Service Administrator CIO Geography Electronic Medical Records Unified Communications Apple Remote Workers Tech Support Connectivity Consumers Business Management Black Friday Files Point of Sale Best Practices Computer Bookmarks Data Breach Alerts Application Meetings Alert Tech Term Operations Printer Legal Managed Service Provider Smartphone Employee-Employer Relationship User Environment Mouse BDR Health Security Risk Management Collaboration Comparison Vendor Management Two-factor Authentication MSP Cybercrime Software Tips Storage Social Webcam Redundancy Cleaning Tip of the week Malware Outlook Motherboard Word Hacking Deep Learning Enterprise Content Management Computer Repair IT solutions Remote Monitoring Holiday Antivirus Data Security Consultation Data Recovery Business Growth Theft IT Services OneNote YouTube Experience Scam Staffing Communication Smart Tech Superfish Samsung Servers Software as a Service Information Technology Taxes Disaster Managed Services Provider Web Server End of Support Settings Regulations Laptop Microsoft Excel IT Support Virtual Desktop Maintenance Spam Mobile Device Management Upgrades Managed IT services Travel User Error WPA3 HIPAA Electronic Health Records Financial Infrastructure Software Competition Work/Life Balance Network Bandwidth Digital Efficiency Robot Gadget Dark Web Lenovo Hiring/Firing Mobile Office G Suite Supercomputer Database Politics Cables Search Screen Reader Data Management Social Engineering Address Notes Identity Break Fix Domains Miscellaneous Hard Drive Facebook Documents Legislation communications Marketing Productivity Managing Stress Apps Windows 10 LiFi Virtualization Internet Productivity Smartphones IT Budget Mobile Device Monitors IBM Safety Backup and Disaster Recovery Mobile Device Managment Proactive IT Running Cable Fraud Privacy Artificial Intelligence Virtual Assistant IT service Management

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...