Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Software Patches Take on New Importance After the WannaCry Ransomware Fiasco

Software Patches Take on New Importance After the WannaCry Ransomware Fiasco

On May 11th, 2017, the world was introduced to the WannaCry ransomware. The ransomware spread around the globe like wildfire, infecting hundreds of thousands of devices and catching many major organizations and businesses by surprise. The full extent of the ransomware’s damage is still being assessed, yet, one thing we do know: this whole fiasco was preventable.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Intranet Display Computer Repair IT Support Settings Budget Retail Wires Consultation Virtual Reality Multi-Factor Security HIPAA Smartphone Tip of the Week Cache Tip of the week Cloud Technology Tips Star Wars Risk Management The Internet of Things Virus Uninterrupted Power Supply Comparison Microsoft communications Remote Monitoring USB Wireless Technology Software Tips Telephone Systems Cabling App Travel Business Growth Proactive IT Business Management Presentation Entrepreneur Avoiding Downtime IT Management Private Cloud Tech Term Miscellaneous Apps Management Business Computing Troubleshooting Users Mouse Information Password Virtual Desktop Microsoft Office Remote Workers Firewall Backups Disaster Resistance Save Time Spyware Cookies Co-managed IT Alerts Notifications Data Warehousing IoT PDF Tech Terms Asset Tracking Computing Infrastructure Websites Gmail Employees Vendor Management IT Support Competition ROI Applications Supercomputer Unsupported Software Cortana Enterprise Content Management Managed IT services Smart Tech Assessment Spam Files Wi-Fi Proactive G Suite Techology Typing Fleet Tracking File Sharing Backup and Disaster Recovery Disaster Recovery Hard Drives Identity IT solutions Virtual Private Network Hosted Solutions Business Owner Recycling Phishing Social Media Computer Fun Data PowerPoint Web Server Consumers Analyitcs Computing OneNote Flexibility Time Management Law Enforcement Word Mobile Security Technology Laws Running Cable Current Events Authorization Hackers Business End of Support Training Disaster Dark Data Hacking Customer Relationship Management E-Commerce Bookmarks Best Practice User Error Microsoft Excel Smart Technology Windows Cyber Monday How To Chrome 3D Printing Security Cameras WiFi Sports Health Legal Licensing Modem Chatbots Cryptocurrency Twitter Scam Digital Payment Encryption Business Technology Domains Meetings Security Mobile Device Management Geography Saving Time MSP Access Control Telephony Phone System Google Maps Physical Security Windows 10 Customer Service Going Green Server Favorites Bring Your Own Device Downtime Corporate Profile Cables Specifications Google Drive Efficiency Mobile Device Managment Data storage Refrigeration Alert Monitoring Authentication Managed IT Services Undo Address Business Intelligence Regulations Analytics Remote Worker Healthcare Mobile Computing Sync IT Consulting Saving Money Machine Learning Solid State Drive Features Mirgation Paperless Office Managed IT Service Browser Employee-Employer Relationship IT Services Zero-Day Threat Ransomware Small Business Human Error Dark Web Samsung Software Mobile Data BDR Wearable Technology Scary Stories Tech Support Instant Messaging Content Filtering Google Calendar Business Continuity WPA3 Staffing Hard Drive Apple Safety Servers Language Humor Google Docs Patch Management Trending Productivity User Recovery Tracking Cleaning Firefox Remote Computing Emoji Money Artificial Intelligence Environment Cooperation Internet Best Practices Internet of Things Upgrade BYOD Data loss CIO Android Webcam Help Desk Hiring/Firing Google Managed Services Provider Data Security Website Financial Electronic Health Records GPS Hacks VoIP Computer Care Update SaaS Staff Piracy Network Security Enterprise Resource Planning Deep Learning Office Cyberattacks Unified Threat Management Motion Sickness Relocation Information Technology Compliance Error Printing Network Operations Procurement Administration Processors Theft IBM Infrastructure Quick Tips Marketing 5G Gadgets Computers Botnet Collaboration Hotspot Automation Company Culture Experience Network Management Office Tips History Project Management Mail Merge Automobile Vulnerabilities Programming IP Address Permissions Cameras Laptop Managed Service Mobile Social Networking Electronic Medical Records Conferencing Windows 10 Shortcut Hosted Solution Redundancy Smartphones Education Public Speaking Unified Communications Robot Politics Managed Service Provider Net Neutrality Document Management Bandwidth Social Blockchain SharePoint Innovation Virtualization Hard Disk Drive Crowdsourcing Development Employer-Employee Relationship Mobile Office High-Speed Internet Hacker Digital Hardware Administrator Chromebook Lithium-ion Battery Cybercrime Utility Computing Managing Stress Consulting Nanotechnology Workplace Tips Office 365 Work/Life Balance Unified Threat Management Gadget Drones Cloud Computing IT Technicians Monitors Touchscreen Operating System CCTV Data Management Storage Identities Productivity Test Printer Managed IT Bluetooth Wireless Technology Taxes Augmented Reality Public Cloud LiFi YouTube Government Data Breach eWaste Mobile Device Outlook Malware Documents Tablet IT Consultant User Tips Windows 8 Remote Monitoring and Management Break Fix Save Money Networking Data Recovery Data Backup Read Only Superfish iPhone Software as a Service Mobility Big Data Google Wallet Identity Theft Antivirus Black Friday Backup VPN Digital Signature WannaCry Downloads Heating/Cooling Screen Reader Network Congestion Finance Point of Sale Search Legislation Social Engineering Application Knowledge Buisness Cost Management Communication Mobile Devices Black Market Cybersecurity Permission Migration Connectivity Server Management Lenovo Distributed Denial of Service Router Upgrades Personal Information IT service Outsourced IT Vulnerability Passwords Maintenance Statistics Motherboard VoIP Halloween Privacy Alt Codes Two-factor Authentication Email Holiday Writing RMM Bitcoin How To Fraud Facebook IT Budget Internet Exlporer

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...