Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Secure Wireless Network Allows for Better Business

A Secure Wireless Network Allows for Better Business

Wireless Internet access for a user’s devices isn’t just a luxury these days--it’s expected. If the Wi-Fi drops out for any reason at all, chaos strikes, rendering any ability to stream content or access the Internet a moot point. This is particularly the case for businesses that have technology solutions reliant on wireless access. How can you make sure your wireless network is as strong and reliable as possible?

Continue reading
0 Comments

WPA3 is Boosting Network Security

WPA3 is Boosting Network Security

Did you know that prior to this past January, the last big update to Wi-Fi occurred in 2004, when WPA2 was released? The Wi-Fi alliance has introduced a new type of wireless connection called WPA3--one that can dramatically improve security. In reality, it was created with the intention of shoring up weaknesses found as a result of the KRACK vulnerability, which exposed serious issues with WPA2 that needed to be addressed.

Tags:
Continue reading
0 Comments

Tip of the Week: How to Adjust Your Router to Improve Your Connections

Tip of the Week: How to Adjust Your Router to Improve Your Connections

Wi-Fi has been one of the single most useful innovations for the modern office. Connecting to your Internet without having to be physically connected to it via an ethernet wire has been an incredibly freeing process--one that opens up all sorts of possibilities of where (and how) you can get work done. How can you make sure that your Wi-Fi signals are as clear and reliable as possible?

Continue reading
0 Comments

Mobile Security Showdown: Cellular Network vs. Wi-Fi

Mobile Security Showdown: Cellular Network vs. Wi-Fi

Today’s business relies on mobile devices, like smartphones, to guide them to productivity and efficiency. In fact, the vast majority of people in today’s society own a smartphone. A report shows that 90 percent of people younger than 30 own a smartphone, which means that the forward-thinking business hiring talented millennials may want to start thinking about how to secure any mobile devices that they use to access company data.

Continue reading
0 Comments

Tip of the Week: Forgot Your Wi-Fi Password? Here’s How to Find It

Tip of the Week: Forgot Your Wi-Fi Password? Here’s How to Find It

You might know your Wi-Fi password, but can you tell your new staff members, guests, and clients, what it is off the top of your head? If you don’t write your password down, or store it somewhere that’s easily accessible, it can be difficult to remember; especially if it’s long and complex like it should be. Thankfully, if you already have a computer connected to the network, you can easily find out what your Wi-Fi password is.

Continue reading
0 Comments

Will We See 5G Soon? Probably Not, But Let’s Talk About It Anyway

b2ap3_thumbnail_wireless_future_400.jpgIt seems like just yesterday that the world adopted 4G as the accepted model of wireless technology communication, but it’s still important to look toward the future and push for greater heights. Wireless technology has permeated society to the point where it’s steeped with smartphones and other mobile devices. So, what’s next in the wireless game?

Tags:
Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Mouse CCTV Innovation Statistics Business Continuity Mobile Data Outlook Notes Productivity Modem Facebook Theft Mobile Devices Managing Stress File Sharing Distributed Denial of Service Processors Network Security Remote Monitoring SharePoint Document Management Virtual Desktop Tip of the week Data storage Black Friday PDF Disaster Recovery Lenovo Motherboard WiFi Assessment Chatbots Privacy Technology Tips Current Events Management Communication Co-managed IT Vulnerabilities Microsoft Office Managed IT Service Permissions Big Data GPS Gmail Crowdsourcing Information Flexibility Knowledge Break Fix Employee-Employer Relationship Sync BYOD Telephone Systems communications Twitter IT Consulting LiFi Bandwidth Uninterrupted Power Supply Business Technology Time Management PowerPoint Tracking Vendor Management Saving Time Productivity Remote Computing Redundancy Internet of Things Unified Threat Management Mobile Device Managment Operations Managed IT services Superfish Website Business Writing Webcam Virtual Assistant Legal Hard Drives Read Only Printing Electronic Health Records Business Growth Hardware Identities Save Time Language Office 365 Cleaning Word Avoiding Downtime Address History G Suite Cloud Computing YouTube Business Intelligence Net Neutrality Public Cloud Alt Codes Network Private Cloud Gadgets Education Experience Data loss App Motion Sickness Refrigeration Spam Social Tablet Software Tips IP Address Training Spyware Remote Worker Encryption Database Personal Information Infrastructure Wasting Time Internet Browser Star Wars Network Congestion Instant Messaging Wireless Technology Vulnerability Windows Windows 10 Dark Web IT Services Retail Drones Test Regulations Techology Mobile Device Unsupported Software eWaste VoIP Recovery Data Recovery IT Consultant CIO Passwords Automation Analyitcs Computing Staff Remote Workers Managed Service Provider Business Owner Employer-Employee Relationship Router Authorization Mobility Migration Access Control Smart Tech Small Business Content Filtering Tech Term Gadget Halloween Remote Monitoring and Management Public Speaking IT Management USB OneNote Mail Merge Information Technology IBM Travel E-Commerce Specifications Scam Government Google Drive Fraud iPhone Android Help Desk Downtime Cybercrime Hacking VoIP Troubleshooting Touchscreen Digital Payment Business Computing Enterprise Content Management Best Practice Bitcoin Recycling Programming Development Undo Financial The Internet of Things Unified Threat Management MSP Computer Care Computers Law Enforcement Social Media Cloud Google End of Support Hosted Solution Wearable Technology Politics Social Networking Fun Healthcare Servers Smart Technology Work/Life Balance Display Tech Support Utility Computing Botnet Monitoring Disaster Security Cameras Managed IT Presentation Shortcut Update Miscellaneous VPN Maintenance Data Breach Firefox Settings Google Maps Phishing Black Market Risk Management Administrator Corporate Profile Application Holiday Notifications Storage Heating/Cooling Artificial Intelligence Identity Theft Cabling Environment Software Virus Staffing Intranet Hacks Augmented Reality Cortana Project Management ROI Downloads Two-factor Authentication Company Culture Best Practices Hackers Antivirus Business Management Office Tips Server Wi-Fi Laptop Entrepreneur Compliance Hotspot Windows 10 Money Fleet Tracking Mobile Security Buisness Mobile WPA3 Windows 7 Documents Meetings Taxes Voice over Internet Protocol Hacker Paperless Office Web Server IT Support RMM Automobile Managed Service Proactive Permission Telephony Password Cost Management Marketing Virtualization Disaster Resistance IT Technicians Administration Backups Mirgation Chrome Files Computing Infrastructure Internet Exlporer Customer Relationship Management WannaCry Cybersecurity Google Calendar User Error Robot Licensing Emoji Features Firewall Hard Disk Drive IoT Cache Backup Upgrades Error Finance Legislation Geography Domains Search Monitors Supercomputer Comparison Favorites 5G User Tips Microsoft Excel Bluetooth Ransomware Data Security SaaS Office Deep Learning Going Green Managed IT Services Proactive IT Bring Your Own Device Unified Communications Cameras Safety Google Wallet Mobile Office Point of Sale Data Backup Networking Consulting Social Engineering Mobile Device Management Virtual Reality Security High-Speed Internet How To Digital Users Chromebook Operating System Professional Services Data Cryptocurrency Backup and Disaster Recovery Employees Consultation Technology Dark Data Data Management Cables Printer User Websites Tip of the Week Alerts Cookies Relocation Cooperation Workplace Tips Typing Running Cable Malware Smartphone Scary Stories Server Management IT solutions Tech Terms Saving Money Hiring/Firing Competition Health Upgrade Quick Tips Windows 8 Technology Laws Software as a Service IT Budget IT service Computer Repair Trending Mobile Computing Email Piracy Conferencing Cyber Monday Cyberattacks Managed Services Provider Customer Service Lithium-ion Battery Microsoft Solid State Drive Machine Learning How To Identity Analytics Budget Human Error Apps Multi-Factor Security Humor Smartphones Electronic Medical Records Alert Zero-Day Threat Hosted Solutions Virtual Private Network Phone System Apple Wires Nanotechnology Digital Signature HIPAA Bookmarks Asset Tracking Hard Drive Procurement Physical Security Data Warehousing 3D Printing Computer Sports Google Docs Collaboration Save Money Screen Reader Efficiency Enterprise Resource Planning Wireless Outsourced IT IT Support BDR Applications Samsung Connectivity Blockchain Consumers Network Management Patch Management Authentication

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...
QR-Code