Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Find the Best VPN for Your Privacy

Tip of the Week: How to Find the Best VPN for Your Privacy

With all of the talk about the FCC and Net Neutrality in the recent news, a lot of computer users are concerned about the amount of privacy afforded them by their Internet service providers--and rightfully so. Regardless of whether the net neutrality ruling was justified (hint: it wasn’t), users are finding that they have to take their privacy into their own hands. The easiest way to do so is with a Virtual Private Network.

Continue reading
0 Comments

Protecting Your Data Is Easier With A VPN

Protecting Your Data Is Easier With A VPN

Does your business focus enough on security? One of the best solutions that you can consider is a virtual private network, or VPN. By implementing a VPN solution, you can improve the security and privacy on your devices even while out of the office on important business trips or at conferences. What can a VPN do for your business?

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Geography Read Only Black Market High-Speed Internet Comparison eWaste Uninterrupted Power Supply Taxes Distributed Denial of Service 3D Printing Google Wallet Downloads Risk Management Phone System Backup and Disaster Recovery History Save Time Corporate Profile Vendor Management Hard Drive Windows 10 Business Management Operating System Server Management Humor IT solutions Consumers Website Display Software Tips Internet Computers Data Recovery Password Data Warehousing Windows 10 File Sharing Crowdsourcing Cables IT Consulting Redundancy Development Phishing Network Recycling Hiring/Firing Cookies Managed IT services Mail Merge Hacks Facebook Software Gmail Hacking Downtime Private Cloud Presentation Mobility Motherboard Identity Theft Upgrade Tracking LiFi End of Support Networking VoIP Cleaning Settings Office 365 Information Google Workplace Tips Word Applications Chromebook WiFi CCTV Communication Smart Technology Buisness Alt Codes Domains Mobile Office Typing Android Information Technology Operations Touchscreen Entrepreneur Business Continuity Computer Repair Lithium-ion Battery SaaS Instant Messaging Dark Web Documents Experience Business Owner Office Tablet Upgrades Error Permission Apple Compliance Quick Tips Chatbots Shortcut Social Networking Cooperation Printer Superfish Electronic Medical Records Cloud Computing Vulnerabilities Help Desk Office Tips Processors Disaster Licensing Sync Virtual Desktop Business Technology Techology Hosted Solutions Managed IT Services Troubleshooting Spam Automation Files Managed IT Law Enforcement Screen Reader Administrator Dark Data Browser Theft Mobile Device Managed Service Provider Notifications Co-managed IT Botnet Asset Tracking Analyitcs Printing Outsourced IT Windows Server Gadget Company Culture Regulations Emoji Tech Support Remote Monitoring Supercomputer USB Cost Management Bluetooth User Error Access Control Managing Stress Managed IT Service iPhone Net Neutrality Cybercrime Mobile Device Managment Search IT Services 5G Email Artificial Intelligence PDF Procurement Identities Consultation Electronic Health Records Software as a Service IoT Apps Refrigeration GPS Employer-Employee Relationship Budget Microsoft Office Unified Threat Management Social Media Backups Specifications IT Consultant Personal Information Cybersecurity Small Business Wires Going Green Social Windows 8 Star Wars Intranet Tip of the week Unified Communications Infrastructure Bandwidth Statistics Mobile Device Management Save Money Environment Vulnerability Competition Current Events Network Security Public Speaking Cyberattacks Modem Robot Cloud Bookmarks ROI Sports Tip of the Week How To Computer Application Hacker Backup Encryption Chrome MSP Mobile Security IT Budget Proactive IT Mouse Heating/Cooling Saving Time Managed Services Provider Meetings Content Filtering Management Data storage Cryptocurrency Hackers App Analytics Passwords Running Cable User Tips Business Growth Network Management Features Hosted Solution Update Microsoft Malware The Internet of Things Ransomware Data Backup Router Utility Computing Fleet Tracking Favorites Tech Term Black Friday Smart Tech Employees Users RMM Hard Disk Drive Wireless Cabling Wearable Technology Education Websites Retail Mobile Computing Google Maps Writing Training Mobile Devices Break Fix Managed Service Two-factor Authentication Knowledge Technology Tips Google Calendar Halloween Collaboration Data Management Solid State Drive Legal Financial Technology Laws Saving Money IP Address IT service Conferencing Gadgets Hotspot Alerts Remote Worker Virus Data Breach VoIP Web Server Multi-Factor Security Marketing Flexibility Google Docs Address User Productivity Samsung Permissions Telephony Fraud Network Congestion Drones Cyber Monday Enterprise Content Management Technology Virtual Reality Wireless Technology Work/Life Balance Customer Relationship Management Document Management Health Bitcoin Blockchain Innovation Firefox Automobile SharePoint Monitoring Project Management Virtualization Smartphones Servers Best Practices HIPAA Nanotechnology Time Management Authentication Cameras Internet Exlporer Internet of Things Unified Threat Management Patch Management Connectivity Mobile Data Motion Sickness Best Practice Zero-Day Threat Business Computing Security Legislation Spyware IT Management Computer Care PowerPoint Firewall Mobile Scam Safety Remote Workers Human Error IT Support Machine Learning Hard Drives Migration Public Cloud Deep Learning Cortana Tech Terms OneNote Privacy communications Avoiding Downtime Hardware Outlook Language Google Drive IBM Staffing BYOD Physical Security Customer Service WannaCry Miscellaneous Identity Telephone Systems G Suite Holiday Unsupported Software Data loss Alert Paperless Office Politics Enterprise Resource Planning Lenovo Remote Computing Microsoft Excel Authorization Webcam Digital Payment Government Business Intelligence Relocation Laptop Computing E-Commerce Administration Cache Undo Data Productivity Data Security Mirgation Fun Augmented Reality Disaster Resistance Programming Employee-Employer Relationship Staff Point of Sale Business Travel Wi-Fi Big Data WPA3 IT Support CIO Healthcare Virtual Private Network Twitter Test Computing Infrastructure Remote Monitoring and Management Efficiency Smartphone IT Technicians Scary Stories Storage Maintenance How To Digital Money Digital Signature Proactive BDR Assessment Security Cameras Piracy Disaster Recovery Antivirus VPN Social Engineering Finance Bring Your Own Device Monitors YouTube Trending Recovery Consulting

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code