Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

5 Best Practices to Protect Your Business From Ransomware

5 Best Practices to Protect Your Business From Ransomware

Ransomware is an online threat that continues to develop and evolve to accommodate the motives of cyber criminals around the world. Ransomware locks down your business’s files and demands a decryption key for their safe return, which makes it difficult (or impossible) to move forward with operations. How can you prevent ransomware from destroying your business’s chances of survival?

Continue reading
0 Comments

Getting a Computer Virus is Like Catching the Flu

b2ap3_thumbnail_under_the_weather_virus_400.jpgGrab your tissues, it’s flu season! Just like biological viruses such as the flu can cripple an entire office, digital viruses can cause a lot of trouble for businesses too. Both downtime-causing virus scenarios can be prevented if proper safety measures are followed, like sanitation and cybersecurity.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Remote Monitoring and Management Procurement File Sharing Business Growth Geography Access Control Black Market Cyber Monday Business Owner G Suite Alt Codes Cookies Hacks LiFi Firewall How To Cybercrime Mobility Environment Search Bluetooth Word Motion Sickness Theft Malware Vulnerabilities Business Technology Outsourced IT Virus Settings HIPAA PDF Facebook Notifications Mirgation Server Management Meetings Hotspot Managed IT Efficiency Productivity Travel Safety Specifications Enterprise Resource Planning Lithium-ion Battery E-Commerce Government Website Relocation Undo RMM Unified Threat Management Communication Drones IT Support Going Green Proactive IT Uninterrupted Power Supply Document Management Windows 10 Lenovo Troubleshooting Computers Intranet Marketing Comparison Smartphone Office Tips Workplace Tips Robot Backups Mobile Computing VoIP Telephone Systems Cameras Laptop Google Maps Cloud Computing Tablet Programming Saving Money Business Management Test Data Security Consulting VoIP Taxes Superfish Scam Language Distributed Denial of Service Current Events Monitors Migration Vendor Management Mobile Device Management Compliance Trending CCTV Tech Term Social Networking Android Outlook Artificial Intelligence Machine Learning Cyberattacks Printing Wires Buisness Users Motherboard GPS Experience Wi-Fi Error Money Cooperation Statistics Chatbots Hard Drives Scary Stories Software as a Service Save Time Virtual Desktop Sync Privacy Tech Terms Managed Service Provider How To Two-factor Authentication Windows 8 Humor Digital Signature Disaster Network Data Recovery Alerts Operating System Mobile Security Content Filtering IT service Hackers Holiday Operations Microsoft Office SaaS Nanotechnology Phone System Data Management Electronic Medical Records Modem Financial Black Friday Cortana Information Technology 3D Printing Chromebook Information Software Technology Laws Big Data Remote Computing Business Continuity Permission Browser Point of Sale Phishing Web Server IT Technicians WPA3 Social Engineering Technology Tips Touchscreen Wearable Technology Virtualization Gmail User Error Staff Quick Tips 5G Automation Wireless Consultation Techology Health Internet Exlporer IBM USB Display Telephony Star Wars Alert ROI Remote Worker Administration Digital Payment Webcam Analytics Documents Computer Care Zero-Day Threat Work/Life Balance Asset Tracking Instant Messaging Proactive Windows 10 YouTube Physical Security Break Fix Upgrade Augmented Reality Save Money Security Cameras Fraud Heating/Cooling Collaboration Chrome IT Budget SharePoint Apps Tracking Small Business Multi-Factor Security Digital Unified Communications History Social Dark Data Bring Your Own Device Paperless Office Automobile Network Management Business Conferencing Mobile Device Managment Redundancy Halloween Backup and Disaster Recovery Domains Email Bandwidth Computer Consumers Healthcare Unsupported Software Saving Time Human Error Internet Upgrades Infrastructure Connectivity Mouse Processors Fun User Features Recycling Password Administrator Mobile Miscellaneous Read Only Recovery Management Flexibility BDR High-Speed Internet Shortcut Network Congestion Wireless Technology Address Samsung End of Support Permissions Authorization Corporate Profile Twitter Managed Services Provider Fleet Tracking Gadgets Ransomware iPhone Mobile Devices Router Managed Service Hacker Budget Electronic Health Records Hardware Security Spyware Sports Help Desk Piracy Employees Update Virtual Reality Tip of the week Running Cable Screen Reader Assessment Regulations Computer Repair Maintenance Internet of Things Hosted Solutions Application Favorites PowerPoint Politics Servers Hard Disk Drive Data loss Cost Management Cables Storage Tech Support Vulnerability Data Backup Hard Drive Retail User Tips Unified Threat Management Co-managed IT IT solutions Managed IT Services Passwords Net Neutrality Data Breach Managed IT services Technology Google Deep Learning Public Cloud Printer Cybersecurity Encryption Managed IT Service Business Computing Cache Cabling Employer-Employee Relationship Legislation IT Support Customer Relationship Management Identity Theft Hacking IP Address Mobile Office Networking VPN Software Tips Company Culture Entrepreneur Botnet eWaste Apple Time Management Computing Infrastructure IoT Employee-Employer Relationship Server Remote Monitoring Backup Analyitcs OneNote Applications MSP Mail Merge IT Consulting Gadget Public Speaking WannaCry Firefox Virtual Private Network Training Identities IT Consultant Finance Hosted Solution Spam Data Warehousing Office Cloud Blockchain Computing Social Media Remote Workers Data storage Hiring/Firing Smart Technology Authentication Disaster Resistance BYOD Law Enforcement Monitoring Smart Tech Solid State Drive Data Disaster Recovery Knowledge Smartphones The Internet of Things Legal Tip of the Week Dark Web Bookmarks Best Practice Mobile Device Microsoft Excel Windows WiFi Antivirus Typing Development Emoji Best Practices Websites Productivity Utility Computing Network Security Google Docs Writing Personal Information Customer Service Project Management Cleaning Mobile Data Managing Stress Downloads CIO communications App Innovation Refrigeration Competition Google Calendar Risk Management Supercomputer IT Services Files Presentation Education Patch Management Business Intelligence IT Management Cryptocurrency Avoiding Downtime Google Drive Crowdsourcing Staffing Private Cloud Office 365 Enterprise Content Management Identity Licensing Google Wallet Bitcoin Microsoft Downtime

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code