Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

5 Best Practices to Protect Your Business From Ransomware

5 Best Practices to Protect Your Business From Ransomware

Ransomware is an online threat that continues to develop and evolve to accommodate the motives of cyber criminals around the world. Ransomware locks down your business’s files and demands a decryption key for their safe return, which makes it difficult (or impossible) to move forward with operations. How can you prevent ransomware from destroying your business’s chances of survival?

Continue reading
0 Comments

Getting a Computer Virus is Like Catching the Flu

b2ap3_thumbnail_under_the_weather_virus_400.jpgGrab your tissues, it’s flu season! Just like biological viruses such as the flu can cripple an entire office, digital viruses can cause a lot of trouble for businesses too. Both downtime-causing virus scenarios can be prevented if proper safety measures are followed, like sanitation and cybersecurity.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Technology Laws Tracking Holiday Saving Time Employee-Employer Relationship Cleaning Alt Codes Recycling Data Spam Smart Technology Security Mobile Security Gmail RMM Tip of the week User Tips IT Budget File Sharing Business Growth Administrator Mobile Data Going Green Supercomputer Remote Monitoring and Management Firefox Two-factor Authentication Theft Cost Management Computing Phone System Cache Miscellaneous Operating System Augmented Reality Sports Public Cloud Test Web Server Emoji Storage Conferencing Legal Specifications USB Development Distributed Denial of Service Identity Backup and Disaster Recovery Customer Service Techology App Time Management Law Enforcement Browser Automation Wireless Technology Bring Your Own Device Encryption Phishing WPA3 Chrome Solid State Drive Cyberattacks VoIP Marketing CCTV Apple Geography Managing Stress Data Recovery Cameras Virtualization IT service Humor Safety Identity Theft Corporate Profile Networking Tech Term Permissions Upgrades Best Practices Government Relocation Dark Web Customer Relationship Management Paperless Office Windows 10 Legislation Windows 8 Website Windows Social Networking Uninterrupted Power Supply Consumers Hacks Virus Technology Tips Business Continuity Management Documents Mobile Devices Upgrade SaaS Mail Merge Data storage Writing Programming Servers Mobile Device Management Black Market Data Breach Cooperation Twitter Office Tips 5G Identities IT solutions Politics Trending Microsoft Excel Statistics Update Tip of the Week Antivirus Regulations Hotspot Environment Collaboration Nanotechnology Running Cable Data Management Digital Signature Managed Service Router Internet Exlporer Unified Threat Management OneNote Consulting Human Error Hackers Motion Sickness Productivity Content Filtering Patch Management Fun Voice over Internet Protocol User Error Chatbots Work/Life Balance Black Friday Unified Communications Cabling Project Management Hosted Solutions Backup Hardware Quick Tips Cyber Monday Health Remote Monitoring Tech Terms 3D Printing Proactive IT Vulnerabilities VPN Saving Money Meetings Authorization Troubleshooting Risk Management IT Support Bitcoin Tablet Digital Current Events Favorites User Hard Drive IP Address Software Tips Hosted Solution Cortana Cloud Spyware Backups Chromebook Efficiency The Internet of Things Apps Analytics Halloween Instant Messaging Hacker Comparison Gadgets Healthcare Typing Address Budget Enterprise Content Management Wireless Compliance Mobility Remote Worker Presentation Employer-Employee Relationship Proactive Taxes PDF Finance Zero-Day Threat Mouse Managed IT Services Physical Security Applications Wearable Technology Best Practice Error Refrigeration Facebook Virtual Reality Files Net Neutrality History Managed IT services Public Speaking Assessment Technology Managed Service Provider Google Break Fix Remote Computing Help Desk IT Management Business Intelligence Operations ROI Computer Repair Productivity Flexibility Monitors Malware Staff Blockchain Workplace Tips Botnet Tech Support Document Management Mirgation Permission Read Only Mobile Office Printing Social Media Downloads Ransomware Language Redundancy Infrastructure PowerPoint Retail Cryptocurrency Windows 7 Domains Fleet Tracking Deep Learning Employees SharePoint Android Software Robot Small Business Disaster IT Consultant Notes Application Piracy Dark Data Touchscreen Mobile Device Business Owner Wi-Fi Telephone Systems Licensing Settings BDR Outlook Network Congestion Consultation Heating/Cooling Network Scary Stories Automobile Maintenance Lenovo iPhone eWaste Competition Mobile Computing CIO Alerts Virtual Private Network Shortcut Fraud G Suite Smartphones Bluetooth Cybercrime Word Star Wars Mobile Entrepreneur IBM Internet Privacy Financial Communication Save Time Remote Workers Private Cloud Knowledge High-Speed Internet Samsung Data Security Point of Sale VoIP Business Computing Administration Software as a Service Security Cameras Outsourced IT Unsupported Software Internet of Things Disaster Resistance Machine Learning Server Monitoring Artificial Intelligence Analyitcs Staffing Bookmarks Database Disaster Recovery Computer Data Warehousing Big Data IT Consulting IoT Modem WiFi Electronic Medical Records Processors Google Calendar HIPAA How To Cookies Webcam Co-managed IT Telephony Mobile Device Managment Recovery Google Wallet Information Technology IT Services E-Commerce Password Lithium-ion Battery Laptop Education MSP Vendor Management Personal Information Procurement Drones BYOD Asset Tracking Social Network Management Authentication Server Management Hard Drives Network Security Wires Hard Disk Drive Save Money Electronic Health Records Multi-Factor Security Notifications Vulnerability Training Downtime Buisness Migration Sync Digital Payment Information Features Undo Avoiding Downtime Search IT Technicians Business Technology Travel Google Drive Company Culture LiFi Virtual Desktop Utility Computing Passwords Intranet Experience Wasting Time Superfish Motherboard YouTube End of Support Hiring/Firing Google Maps Alert Office Google Docs Scam Connectivity Innovation Cybersecurity Smart Tech IT Support communications Social Engineering Professional Services Smartphone Hacking Unified Threat Management Enterprise Resource Planning Microsoft Computing Infrastructure Computers Crowdsourcing Data Backup Computer Care WannaCry GPS Business Management Websites Bandwidth Display Managed IT Data loss Screen Reader Cables Users Printer Cloud Computing Gadget Managed IT Service Virtual Assistant Email Business Microsoft Office Access Control Firewall Windows 10 Money Office 365 Managed Services Provider How To

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code