Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Find the Best VPN for Your Privacy

Tip of the Week: How to Find the Best VPN for Your Privacy

With all of the talk about the FCC and Net Neutrality in the recent news, a lot of computer users are concerned about the amount of privacy afforded them by their Internet service providers--and rightfully so. Regardless of whether the net neutrality ruling was justified (hint: it wasn’t), users are finding that they have to take their privacy into their own hands. The easiest way to do so is with a Virtual Private Network.

Continue reading
0 Comments

Protecting Your Data Is Easier With A VPN

Protecting Your Data Is Easier With A VPN

Does your business focus enough on security? One of the best solutions that you can consider is a virtual private network, or VPN. By implementing a VPN solution, you can improve the security and privacy on your devices even while out of the office on important business trips or at conferences. What can a VPN do for your business?

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Conferencing Disaster Recovery Shortcut Data Recovery Asset Tracking Facebook IT Consulting Quick Tips Productivity Deep Learning Google Docs Legislation Operations Small Business Social Media Machine Learning Server Management Software Telephone Systems Data Breach Downtime Fleet Tracking Microsoft Office Hosted Solutions Computers Personal Information Solid State Drive Email Documents IBM Apple History Recovery Servers Customer Service Blockchain Big Data Running Cable Mobile Office Procurement Domains Spam Education Electronic Medical Records Scam Cameras Maintenance High-Speed Internet Users Comparison Antivirus RMM Notifications App Alerts Meetings Data Patch Management Lenovo Identity Theft Chatbots Avoiding Downtime Google Maps YouTube VoIP Microsoft E-Commerce Mobile Data Intranet Windows Digital Signature Wearable Technology Customer Relationship Management Google Google Wallet Ransomware IT Support Tech Terms Employees Unsupported Software Laptop Permission Techology Remote Computing Supercomputer Firefox Geography Risk Management Bandwidth Nanotechnology Botnet Corporate Profile Current Events Webcam Time Management Cyber Monday Automobile Paperless Office Public Speaking Access Control Wires Saving Time Holiday Bookmarks Backups Connectivity Enterprise Resource Planning Politics Smartphone Uninterrupted Power Supply File Sharing 3D Printing Remote Worker Drones Data Management Tip of the Week iPhone Analyitcs Managed Service Modem Update Zero-Day Threat ROI Business Technology PDF Digital Payment Tip of the week Monitors Programming Hosted Solution Digital Proactive Money Budget MSP Database Web Server Experience Cortana eWaste Cyberattacks Google Calendar Content Filtering Cloud Networking Operating System Virtual Reality Chrome Upgrades Scary Stories OneNote Business Continuity Cryptocurrency Multi-Factor Security Cybersecurity How To Office 365 Bluetooth Internet of Things Files Training The Internet of Things Taxes IT Support VoIP Dark Data Authorization Cost Management Artificial Intelligence LiFi Staffing Virtual Assistant Business Growth Business Computing Cooperation Language Screen Reader Human Error Error Hacker Humor Two-factor Authentication Financial Identity Address Managed IT Business Intelligence USB Remote Monitoring Employee-Employer Relationship Gmail Sports Health How To Utility Computing Hacking Save Money Mouse Wireless Technology Mail Merge Display Automation Tracking Public Cloud Distributed Denial of Service Relocation Flexibility Best Practice Administrator Hard Disk Drive Upgrade Apps Retail Cabling Star Wars Virtualization Managed IT services Application Server Heating/Cooling Tablet Company Culture Assessment Collaboration Mobile Device Management Security Data Backup Office Tips Internet Identities Motion Sickness Healthcare Touchscreen Mirgation IT Consultant IT solutions Computer Cloud Computing Hotspot Data Security Authentication Malware Black Friday Windows 7 Business Wi-Fi Communication Mobile Device Outsourced IT Black Market Redundancy Favorites Typing Security Cameras Spyware Business Owner Twitter Processors Help Desk Troubleshooting GPS Disaster Resistance Undo IT service Recycling Robot IT Services Firewall Chromebook Managed IT Service Hard Drives Professional Services Monitoring Marketing Innovation Knowledge Piracy Motherboard Unified Communications SharePoint Data loss Smart Tech Unified Threat Management Virtual Private Network Fun Network Android Dark Web Software Tips Alert Sync Mobility Lithium-ion Battery VPN Wireless Saving Money Buisness Outlook IT Technicians Virtual Desktop Features Mobile Privacy Document Management Project Management Bitcoin Managed Service Provider Remote Monitoring and Management Smartphones Competition WPA3 Physical Security Staff Phishing Network Management Computing Vendor Management Computer Care Gadgets WiFi Point of Sale Browser Analytics Printer Search Instant Messaging Trending CIO Social Engineering Internet Exlporer Google Drive Encryption Cybercrime Save Time communications Smart Technology Notes Backup and Disaster Recovery Social Work/Life Balance Managed Services Provider Hacks Crowdsourcing Bring Your Own Device Technology Laws Network Security Emoji Social Networking Data Warehousing Statistics Unified Threat Management Infrastructure Superfish Test Wasting Time Managing Stress Theft Environment Employer-Employee Relationship Mobile Device Managment Mobile Computing Microsoft Excel Windows 8 Break Fix Augmented Reality Technology Tips Word Phone System Vulnerability SaaS IoT Management Entrepreneur IT Budget End of Support Backup Business Management IP Address Permissions Net Neutrality Website Virus Remote Workers Cables Software as a Service 5G Downloads Efficiency Hiring/Firing Applications Law Enforcement Printing Migration Hard Drive Private Cloud Workplace Tips Travel Fraud Hardware Proactive IT BDR Administration Managed IT Services Hackers Consulting Alt Codes Productivity Samsung Development Presentation Writing Consultation Cookies CCTV Voice over Internet Protocol Safety IT Management Settings Passwords BYOD Technology WannaCry Best Practices Windows 10 Licensing Websites Refrigeration Gadget Finance Router Specifications Government Telephony Consumers Computer Repair Windows 10 Computing Infrastructure User Electronic Health Records Read Only G Suite User Tips Tech Term Legal Regulations Information Information Technology Office Storage Tech Support Miscellaneous Vulnerabilities Disaster Mobile Security Password HIPAA Enterprise Content Management Network Congestion Data storage User Error Co-managed IT Halloween Going Green Cache Mobile Devices PowerPoint Compliance Cleaning

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code