Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

HIPAA and Wearables May Clash in the Near Future

HIPAA and Wearables May Clash in the Near Future

Today, perhaps now more than ever before, technology is making strides toward making its users consider ways to stay healthier. Wearables are one of the primary examples of how technology is aiming to make users both more active and more interested about their own health. At 2018’s Consumer Electronics Show in Las Vegas, Nevada, this technology was front and center, showcasing how far it has come in just a year’s time.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Cache Mobile Data File Sharing Cryptocurrency LiFi Downloads Procurement Unified Threat Management Digital Payment Firewall Laptop BDR IT Consulting Money Notifications Computers Business Owner Display Cyber Monday Authentication Going Green Customer Service Social Virus BYOD Settings Mobile Device Email Computer Care Bring Your Own Device Downtime Update Operations Networking Innovation Proactive Content Filtering Virtual Reality Drones Trending PowerPoint PDF Legal Data storage IoT IP Address Saving Money Documents Software Tips Infrastructure Vulnerability Managing Stress iPhone Electronic Health Records Telephone Systems Redundancy Entrepreneur Deep Learning Recovery Office 365 IT Support Flexibility Financial Dark Data Shortcut Hard Drives Healthcare Screen Reader Hiring/Firing Black Friday Mobility Productivity Mobile Security Security Cameras Competition Alt Codes Security Personal Information IT solutions IT service Collaboration Google Wallet Tracking communications SharePoint How To Cybercrime Big Data Hardware Lenovo Scam Microsoft Excel Electronic Medical Records Staffing Facebook Licensing Analyitcs Document Management Hosted Solution RMM Conferencing Cloud Computing Efficiency Hard Drive WiFi Browser Webcam Bitcoin Star Wars Sports Migration Uninterrupted Power Supply Administrator Emoji OneNote Budget Users Phishing Chatbots Corporate Profile Solid State Drive VPN Google Drive High-Speed Internet Enterprise Content Management Managed IT services Law Enforcement USB Managed Services Provider Operating System Disaster Recovery Patch Management User Website IT Consultant Microsoft Help Desk Network Management Wires Cameras Business Computing Managed IT Service Spam Data Security Computing Infrastructure Business Continuity Physical Security Server Tech Terms Information End of Support Network HIPAA Customer Relationship Management Gadgets How To Point of Sale Google Calendar Net Neutrality GPS Theft Mail Merge Recycling Tech Support Hotspot Touchscreen Software Administration Wearable Technology Outlook Retail Refrigeration Features Data Management Consumers Writing Travel Processors Cybersecurity Test Black Market Computer Firefox Cooperation Artificial Intelligence IT Services Antivirus Chromebook Business Growth Scary Stories Regulations Upgrade Disaster IBM Permissions Marketing Ransomware Smartphones Typing Smart Tech Productivity Two-factor Authentication Staff IT Management Save Time Read Only Word Connectivity The Internet of Things Mobile Computing Techology Company Culture Legislation Consulting Data Recovery Cables Backup and Disaster Recovery Proactive IT Dark Web Enterprise Resource Planning G Suite Router Printing Windows 10 Business App Bandwidth Paperless Office Distributed Denial of Service Employees Backups Intranet Internet of Things Knowledge Privacy Troubleshooting Disaster Resistance User Tips Zero-Day Threat Android Lithium-ion Battery Authorization WannaCry Bookmarks Workplace Tips E-Commerce Smart Technology Virtual Private Network CIO Domains Data loss Network Security Best Practice Telephony Assessment Finance Hackers Files Technology Internet Exlporer Machine Learning IT Support Wireless Technology Human Error ROI Cabling Upgrades Samsung Digital Mobile Device Managment Tip of the Week Time Management Remote Monitoring and Management Mobile Presentation Remote Monitoring Multi-Factor Security Vendor Management Cyberattacks Spyware Technology Tips Windows Public Speaking Server Management Hacking Printer Identity Address Data Backup Twitter Data Breach Asset Tracking Windows 8 Geography Motherboard Managed Service Provider Wireless Nanotechnology Cost Management Office Tips Compliance Virtualization Unsupported Software Augmented Reality History SaaS Consultation Taxes Apps CCTV Permission Data Heating/Cooling Fleet Tracking Holiday Employer-Employee Relationship Mobile Device Management Malware Social Networking Hacks Crowdsourcing Vulnerabilities Mouse Google Docs Mirgation Government Microsoft Office Best Practices Windows 10 Fun Halloween Web Server Storage Piracy Cleaning Superfish Google Digital Signature Cortana Managed IT Information Technology Save Money 3D Printing MSP Botnet Small Business Project Management Experience Identity Theft IT Technicians Data Warehousing Instant Messaging Alerts Computer Repair IT Budget Business Management Software as a Service Monitors VoIP Blockchain Smartphone Undo Remote Worker Specifications Public Cloud Favorites Social Media Social Engineering Work/Life Balance Co-managed IT Chrome Development Maintenance Mobile Office Backup Identities Managed Service Computing Bluetooth Automobile Analytics Communication 5G Servers Passwords Remote Workers Hosted Solutions Cookies Politics Education Break Fix Health Monitoring Buisness Humor Mobile Devices Hard Disk Drive Virtual Desktop Phone System Network Congestion Managed IT Services YouTube Employee-Employer Relationship Running Cable Training eWaste Business Intelligence Management Encryption Miscellaneous Business Technology Error VoIP Unified Communications Tablet Tip of the week Office Comparison Automation Sync Access Control Google Maps Supercomputer Current Events Hacker Cloud Meetings WPA3 Quick Tips Outsourced IT Fraud Modem Unified Threat Management Alert Utility Computing Technology Laws User Error Search Password Private Cloud Applications Robot Apple Websites Remote Computing Saving Time Tech Term Risk Management Wi-Fi Programming Internet Motion Sickness Application Environment Avoiding Downtime Safety Relocation Statistics Gmail Gadget Language

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...