Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Eliminate Webcam Worry With a Piece of Tape

Eliminate Webcam Worry With a Piece of Tape

Even webcams are susceptible to infestation from RATs, though they may not be the same creatures that haunt subway tunnels or dank basements. Remote Access Tools can be troublesome and, in some cases, invasive. RATs can be used to remotely access a computer and perform any number of functions, including turning on a device’s webcam.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Saving Time Mobile Data Best Practices Unsupported Software Staff Managed Service Provider Best Practice Windows 10 Retail Automobile Tracking Printer Botnet Identity Document Management Employees Patch Management IT Support Business Intelligence Bring Your Own Device Identity Theft Remote Worker User IT Consultant Google Wallet Hacks Specifications Productivity Social Data storage Cybersecurity Maintenance Outlook Deep Learning Password Alert SharePoint Router Quick Tips BYOD Net Neutrality Hard Disk Drive Cloud Cleaning ROI Computing Operating System Cookies Digital Signature Display Documents Virus Collaboration Cost Management iPhone Backups Proactive IT Licensing Spam Security Safety Bluetooth Big Data Administration Digital Network Security Social Media Downtime Hotspot Going Green Data Security Regulations Managing Stress Data loss Server Management Assessment PDF OneNote Printing Smart Tech Statistics Test Electronic Medical Records Nanotechnology How To Gmail Data Backup Alt Codes Technology Tips Windows 10 How To Servers IP Address Writing Flexibility CIO WPA3 Word Hacking Point of Sale Favorites IT Support Gadget Files Notifications Distributed Denial of Service 3D Printing User Tips Robot Chatbots Websites Ransomware Digital Payment Mail Merge Company Culture Managed Service Virtualization Finance Running Cable Uninterrupted Power Supply Passwords Browser Business Technology Chromebook User Error Relocation Microsoft Office Chrome Smartphones Google Emoji Business Computing Customer Relationship Management Software Office Tips Trending Dark Web Compliance Fun Microsoft Infrastructure Mobile Enterprise Resource Planning Cybercrime Analytics Techology Corporate Profile Remote Monitoring and Management Data Management Cryptocurrency E-Commerce Black Friday Scam Vulnerabilities Network Congestion High-Speed Internet Data Warehousing GPS Storage Encryption Customer Service WannaCry Google Docs Entrepreneur Multi-Factor Security Project Management Permissions Upgrades Cyber Monday Intranet Piracy Staffing Cloud Computing Address Twitter Email Hosted Solutions WiFi Authentication SaaS 5G Mouse Webcam Asset Tracking Information Technology Cyberattacks Business Downloads G Suite BDR Proactive IoT Private Cloud Managed IT Recovery Networking Managed IT Services Mobile Device Monitoring Authorization Domains Settings Lenovo Mobile Device Management Employer-Employee Relationship Remote Workers Knowledge Tech Terms Backup Computer Content Filtering Facebook Management Mobile Security Technology Unified Threat Management Fleet Tracking communications Touchscreen Error Information YouTube Halloween Paperless Office Motherboard Monitors Augmented Reality Administrator Refrigeration Computers Consulting Disaster Resistance Consultation Fraud Presentation Physical Security USB Remote Computing Laptop Public Speaking Cables Hosted Solution Office 365 Miscellaneous Office Vulnerability Software Tips Law Enforcement Break Fix Automation Spyware Website Legislation Bookmarks Windows Users Network Management Mobile Office Alerts Disaster Disaster Recovery Business Growth Wireless Technology Avoiding Downtime Marketing Risk Management Malware Network Mobility File Sharing Wires Read Only Cabling Technology Laws Theft VoIP Motion Sickness Programming Employee-Employer Relationship Wireless Data Breach Antivirus App IBM Backup and Disaster Recovery Analyitcs Smartphone Hardware IT service Comparison Government Taxes IT Consulting Personal Information Hacker Samsung Money Healthcare Identities Financial The Internet of Things Hiring/Firing Innovation Supercomputer Data Firewall Save Money Update Buisness IT solutions Scary Stories IT Budget Hard Drive Cameras History Blockchain Applications Development Wearable Technology Meetings Business Owner Wi-Fi Upgrade Troubleshooting Instant Messaging CCTV Features Heating/Cooling Small Business Zero-Day Threat Legal Apple VPN Permission PowerPoint Superfish Remote Monitoring Security Cameras Vendor Management Artificial Intelligence Save Time Virtual Private Network Mobile Computing Unified Threat Management Data Recovery Firefox Mobile Device Managment LiFi Outsourced IT Lithium-ion Battery Co-managed IT Tech Term Phone System Phishing Geography Mobile Devices Processors Social Networking MSP Search Black Market Experience Redundancy Computer Repair Solid State Drive Undo Operations Environment VoIP Competition Managed Services Provider Tech Support Virtual Desktop Politics Application Sync Modem Star Wars Business Continuity Computing Infrastructure Google Maps IT Management Computer Care Internet Exlporer Tip of the week Access Control Server Android HIPAA Internet of Things Managed IT services Shortcut Holiday Sports Help Desk Drones Cooperation Google Calendar Enterprise Content Management Gadgets Utility Computing Tablet Time Management Hackers Bitcoin Internet Unified Communications Mirgation eWaste Consumers Virtual Reality Training Procurement Communication Hard Drives Bandwidth Tip of the Week Microsoft Excel IT Services Managed IT Service Privacy Work/Life Balance Education Machine Learning RMM Travel Migration Productivity Social Engineering Humor Web Server Workplace Tips Current Events Public Cloud Human Error Electronic Health Records Smart Technology Cache Health Apps Telephony Budget Software as a Service Typing Efficiency End of Support Two-factor Authentication Saving Money Dark Data Cortana Google Drive Recycling Conferencing Connectivity Crowdsourcing Windows 8 Screen Reader Telephone Systems Business Management Language IT Technicians

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...