Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

HIPAA and Wearables May Clash in the Near Future

HIPAA and Wearables May Clash in the Near Future

Today, perhaps now more than ever before, technology is making strides toward making its users consider ways to stay healthier. Wearables are one of the primary examples of how technology is aiming to make users both more active and more interested about their own health. At 2018’s Consumer Electronics Show in Las Vegas, Nevada, this technology was front and center, showcasing how far it has come in just a year’s time.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Running Cable Antivirus Specifications eWaste Hacks Administration Outsourced IT Internet of Things Unified Communications Management Corporate Profile Android G Suite Bitcoin Password Managed IT Utility Computing Taxes Lithium-ion Battery CCTV Bluetooth Digital Data loss Robot Politics Upgrades Analytics User Tips Internet Exlporer Windows 8 Update Chromebook Apps Relocation Facebook Office 365 Security Cameras Customer Relationship Management Solid State Drive Star Wars Virtual Desktop Internet Scary Stories Mobile Office Security Business Computing Network Security Co-managed IT Smart Technology Operations Favorites Monitors Cloud Computing Computer Repair Mobile Security SaaS Screen Reader Meetings Multi-Factor Security Google Maps Tech Support Marketing Authentication Augmented Reality Travel Bring Your Own Device WiFi Remote Worker Backup and Disaster Recovery Training Office Writing Customer Service Disaster Resistance Access Control Network Management Quick Tips Computer High-Speed Internet Backup Microsoft Error Education Electronic Health Records communications Connectivity Staff Wearable Technology Development Virtual Reality Best Practice Business Address Techology Collaboration Proactive Disaster Recovery Unified Threat Management Sync Tech Term Hacker Cryptocurrency Work/Life Balance Productivity Ransomware Financial Applications Chatbots Printer Employer-Employee Relationship Cyberattacks Domains Physical Security Dark Data Content Filtering Tracking Document Management Permission Uninterrupted Power Supply Fraud Cybercrime Virtual Assistant Features Router Identity Social Networking Modem Hosted Solution Data Security Data Warehousing Machine Learning Cache Productivity Typing Emoji Twitter Programming Consulting Healthcare Bandwidth Migration Distributed Denial of Service Data Management Laptop Employees IT Support Environment Operating System Technology Tips Artificial Intelligence SharePoint Information Presentation Cookies Experience Enterprise Content Management YouTube Hard Drive Proactive IT Budget Safety Managed IT Service USB Word Superfish Net Neutrality IP Address Regulations Wi-Fi Office Tips Phishing User Break Fix VoIP Undo Firefox Vulnerability Email Blockchain Windows 10 Law Enforcement Comparison Samsung Business Growth Alt Codes Workplace Tips Database Technology Read Only Alerts Public Speaking Tablet Virus Patch Management IT Budget Data Recovery Storage Social History Unified Threat Management Humor Data Unsupported Software Identities Gadget Human Error Network Congestion End of Support PowerPoint Digital Payment Save Time Mobile Device Disaster Encryption BDR Gmail Chrome Test Hard Drives Cyber Monday Google Computer Care Infrastructure Consultation The Internet of Things Language Cables Motherboard Paperless Office Asset Tracking Miscellaneous Public Cloud Software Tips Display Two-factor Authentication Notifications Legislation Heating/Cooling Save Money Enterprise Resource Planning Microsoft Excel Settings Hotspot IT Management Finance Mouse Spyware Virtual Private Network Compliance Statistics Hard Disk Drive Remote Monitoring and Management Remote Computing OneNote Private Cloud Social Engineering Mobile Computing Communication Malware Sports Competition Nanotechnology Conferencing Wireless Intranet Backups Permissions Printing Recovery Motion Sickness Dark Web Managed Service Provider Employee-Employer Relationship Server Management Flexibility Identity Theft Tip of the week Application VoIP Information Technology Telephone Systems Voice over Internet Protocol Big Data E-Commerce Search Money Efficiency Maintenance IT Technicians Microsoft Office Automobile Troubleshooting Recycling Managed Service MSP Tech Terms Saving Money VPN Remote Monitoring Passwords Avoiding Downtime Saving Time 3D Printing Consumers Processors BYOD GPS Hackers Small Business Business Continuity Google Wallet Risk Management Holiday Downloads Business Management Smartphones Virtualization Business Intelligence Assessment Windows 7 Professional Services Spam Fun Government IT Support Software Legal Refrigeration Web Server IT Consulting Data Backup Buisness Cloud RMM How To File Sharing ROI Mail Merge Technology Laws Wires Cameras Retail Black Market Vulnerabilities Geography Automation IT solutions Licensing Privacy Downtime Documents Health Managed IT services Instant Messaging Managed Services Provider Procurement Innovation Hosted Solutions Wasting Time Google Calendar Cost Management Windows 5G Point of Sale Current Events Botnet Analyitcs Mobile Data Personal Information Going Green Smart Tech Administrator WannaCry Halloween Cortana Network Firewall Shortcut Redundancy Business Owner Computing Black Friday iPhone Drones Monitoring Trending Zero-Day Threat Apple Data Breach Entrepreneur Cleaning Smartphone Computing Infrastructure Managed IT Services Best Practices Google Drive Cabling Vendor Management IT Consultant Time Management Mobility CIO Computers Lenovo Hiring/Firing PDF Crowdsourcing Staffing Help Desk Gadgets User Error Phone System Tip of the Week Scam LiFi Users IT service Company Culture IBM Cybersecurity HIPAA Google Docs Social Media IoT Wireless Technology Touchscreen Website Browser How To Remote Workers Deep Learning Knowledge Notes Digital Signature Data storage Mirgation Hacking Bookmarks App Authorization Theft Cooperation Supercomputer Websites Hardware Windows 10 WPA3 Mobile Devices IT Services Fleet Tracking Upgrade Mobile Device Managment Files Alert Outlook Mobile Device Management Business Technology Managing Stress Webcam Telephony Server Networking Software as a Service Servers Project Management Piracy Mobile Electronic Medical Records

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...