Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Your Business May Be Most Vulnerable from the Inside

Your Business May Be Most Vulnerable from the Inside

It can be easy, with all the threats covered in the news, to assume that the biggest dangers to your business all come from the outside. This is a dangerous mistake, as there are plenty of vulnerabilities that originate from within your organization, making it easier for outside threats to come in, if not being bigger threats in and of themselves. Below, we’ll review some of the biggest, mostly internal dangers that your business may face.

Continue reading

It May Take a While For Windows 10 to Overtake Windows 7

b2ap3_thumbnail_windows_10_now_400.jpgThe hype is still strong for Windows 10, and it’s easy to see why. It’s a great operating system that has the potential to change the way your business performs its daily duties. However, the monthly desktop operating system usage statistics released by NetMarketShare hint that Windows 10 adoption is starting to slow down and that many users are simply opting to keep using Windows 7, Windows 8, and Windows 8.1. What gives?

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Managed IT services PowerPoint Computers Phone System Solid State Drive Password Theft Office Tips Disaster Resistance Encryption Going Green Settings Utility Computing Risk Management Business Technology Physical Security Apple Efficiency Mobile Data Remote Monitoring Storage Finance Ransomware Android Virtual Private Network Recovery Relocation Dark Web User Tip of the week Tracking BYOD Hosted Solutions Internet of Things VoIP Facebook Corporate Profile Information Technology Mobility Break Fix Software as a Service Windows 8 communications Server Management Gadgets Wireless Migration Analytics Programming Mobile Office Black Market Licensing Windows 10 Virtual Desktop Router Gadget Enterprise Content Management Budget Distributed Denial of Service Cameras 5G Technology Remote Monitoring and Management Saving Money Buisness Business Computing Computer Undo Innovation Redundancy Webcam Electronic Health Records Time Management Mobile Device Operations Mobile Security Content Filtering IBM Instant Messaging Proactive IT Business Owner Printing Statistics Chrome Fleet Tracking Virtualization Unsupported Software Quick Tips Running Cable Marketing Cost Management Outlook Smart Tech Cloud Computing Remote Workers Servers Technology Laws Financial Firewall Small Business Heating/Cooling Web Server Hotspot Motion Sickness Tablet Botnet Business Continuity Screen Reader Google Google Wallet History VPN Bandwidth Augmented Reality Intranet Network Security Hiring/Firing Hacking HIPAA Data Warehousing Communication Privacy Laptop Backup and Disaster Recovery Website Permission Data Backup IT solutions Flexibility Lithium-ion Battery Sports G Suite Technology Tips Outsourced IT WannaCry Features Presentation Domains Co-managed IT Employer-Employee Relationship Law Enforcement Automobile Workplace Tips Robot Users Cache Motherboard Best Practices Save Money Staffing Shortcut Telephone Systems Comparison Bitcoin Halloween Identity Theft Bluetooth Mobile Device Management Patch Management Computer Care User Tips Update Wearable Technology Consultation Wireless Technology CCTV Productivity Techology YouTube Superfish 3D Printing Security Touchscreen Disaster Recovery Computing Infrastructure Enterprise Resource Planning Customer Relationship Management Notifications Net Neutrality Bring Your Own Device Procurement Artificial Intelligence Social Networking Computer Repair Networking Personal Information iPhone Management Spyware Fun Hacks Writing Star Wars Access Control Identity OneNote Smartphone Mirgation Training IT Technicians Error Google Docs Administration Hackers Bookmarks Downtime Data Management Hardware Cookies Electronic Medical Records Disaster Mobile Computing Managed IT Email Managing Stress Social Engineering Fraud IT Management Mouse Smartphones Meetings Business Intelligence Document Management Competition Customer Service BDR Test Development Cooperation Multi-Factor Security Managed IT Services Humor Alert Data loss Employees Business Growth IT Support Windows Scam Apps Backups Language Read Only Wires Cleaning Files Entrepreneur Retail Regulations IT Support Administrator Internet Upgrades Mobile Network Management Chatbots Hard Disk Drive Asset Tracking Malware Managed Service Mobile Devices Private Cloud Managed Services Provider Microsoft Excel Permissions Alerts Virus Unified Communications Saving Time Lenovo GPS Identities SharePoint Compliance Chromebook Tech Terms IT Services Internet Exlporer Specifications Data Security Government RMM Black Friday Display Best Practice Mobile Device Managment Business Cyber Monday Applications Social Google Calendar IT Budget Telephony Conferencing Geography VoIP Monitoring E-Commerce Avoiding Downtime Money Sync End of Support Unified Threat Management Nanotechnology Data storage WPA3 Social Media Hacker Supercomputer Analyitcs The Internet of Things Drones Dark Data Public Speaking Safety Vulnerabilities Consumers Google Drive Monitors Phishing Antivirus IP Address Miscellaneous Tip of the Week Browser Recycling Application MSP Upgrade Point of Sale Server Infrastructure Authorization Vulnerability CIO Employee-Employer Relationship Smart Technology Consulting Piracy How To Search Maintenance Deep Learning Cabling Refrigeration Business Management Office Taxes Data Recovery Holiday Productivity Computing Work/Life Balance Gmail Health Twitter Emoji Human Error IT Consulting Cryptocurrency Hosted Solution Unified Threat Management App File Sharing Google Maps Digital Signature Public Cloud Troubleshooting Trending Uninterrupted Power Supply Processors Cybercrime Staff Network Congestion Backup Cybersecurity Microsoft Data Assessment Legal Company Culture High-Speed Internet Documents Digital Firefox Samsung Tech Term Managed Service Provider Save Time Security Cameras Cortana Managed IT Service Connectivity Passwords Crowdsourcing Cables Legislation Remote Computing Software Big Data Collaboration Operating System Word Wi-Fi IoT PDF USB Healthcare Virtual Reality Mail Merge Zero-Day Threat Remote Worker SaaS Help Desk Downloads Hard Drives Proactive IT Consultant eWaste Hard Drive Cyberattacks Information Machine Learning Microsoft Office Authentication Tech Support Alt Codes Paperless Office Network Favorites Typing Knowledge Current Events Politics Printer Two-factor Authentication User Error Modem ROI Software Tips Websites IT service Address Data Breach Travel Blockchain Experience Project Management Environment Windows 10 Automation LiFi Digital Payment Office 365 Education Scary Stories Vendor Management Cloud How To Spam WiFi

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...