Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

WPA3 is Boosting Network Security

WPA3 is Boosting Network Security

Did you know that prior to this past January, the last big update to Wi-Fi occurred in 2004, when WPA2 was released? The Wi-Fi alliance has introduced a new type of wireless connection called WPA3--one that can dramatically improve security. In reality, it was created with the intention of shoring up weaknesses found as a result of the KRACK vulnerability, which exposed serious issues with WPA2 that needed to be addressed.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Humor Mobile Employee-Employer Relationship Applications Authorization Regulations Security Cameras Break Fix Supercomputer Notes Zero-Day Threat Virtual Private Network Printer Going Green Data Management Paperless Office Favorites Internet of Things Patch Management Mobile Device Management Data Recovery USB Gmail Settings Display Halloween Managed Service Provider Mouse Encryption VPN Public Speaking Hosted Solutions Heating/Cooling Robot Digital Signature Tech Support Data Warehousing Passwords Alerts Technology Laws Tablet Emoji Travel Voice over Internet Protocol IoT Cabling Cryptocurrency Comparison Notifications Downtime Disaster Recovery Mobile Data Computer Read Only Motherboard Compliance Corporate Profile Content Filtering Flexibility Public Cloud Productivity Cloud Cookies Google MSP WPA3 Automation Point of Sale Proactive IT Fun 5G Professional Services Budget IT Technicians Wires Best Practice OneNote Business Owner Twitter Hacking Digital Licensing Chromebook Fleet Tracking Dark Web Motion Sickness Managed IT Services Entrepreneur Vulnerabilities Cables Technology Tips Network Management Refrigeration Backup and Disaster Recovery Saving Time Google Wallet Phone System Nanotechnology Cyberattacks Administrator Identities Communication Tracking IBM Hard Disk Drive Downloads PowerPoint Big Data BDR Enterprise Resource Planning Drones PDF IT solutions Internet Exlporer Wireless Technology Workplace Tips Identity Theft WannaCry IT Services Remote Computing Social Media Windows Politics Alt Codes Mobile Device Managment Best Practices Windows 7 Permission Disaster Marketing Money Augmented Reality BYOD IT Consultant History Shortcut IT Consulting Network Congestion Undo Wi-Fi Mobility Sync YouTube SharePoint Hiring/Firing Modem Web Server Experience Chrome Intranet CIO Hotspot Hacks Error Company Culture How To Browser Writing Fraud Data Security Cybercrime Mobile Device Security Bring Your Own Device Screen Reader Router Productivity Analytics Office Tips Social Upgrade Connectivity Private Cloud Password Smart Technology Recovery Webcam Virtualization Network Address Trending Enterprise Content Management Google Maps Finance Project Management Information Technology IT service Time Management Managed Services Provider Vulnerability Scam Machine Learning Update Technology Vendor Management Language Troubleshooting Telephony Operations Presentation Holiday Telephone Systems Data Breach Utility Computing Remote Worker Access Control Digital Payment Staffing Backup eWaste Remote Workers Physical Security Website Safety Techology Android Processors Hard Drives HIPAA Application Data SaaS Piracy Artificial Intelligence Legal Wasting Time How To Unified Threat Management Geography Data storage Assessment Outsourced IT Analyitcs Servers E-Commerce Computers Storage Bandwidth Bookmarks Software as a Service Human Error Computing Infrastructure Network Security Cleaning Unified Communications Co-managed IT User Error User Tips Buisness Scary Stories Software Tips IT Budget Documents Instant Messaging Risk Management Managed IT Business Continuity Google Docs Unsupported Software Search Consumers Spam Saving Money Hard Drive Mail Merge Operating System iPhone Tip of the week Unified Threat Management Files Current Events Specifications Training Ransomware Innovation Printing Proactive High-Speed Internet Employees Lenovo Social Networking IP Address Smart Tech Maintenance Conferencing RMM Networking Office Server Staff Managed IT Service Business Technology VoIP Microsoft Excel Wearable Technology Work/Life Balance Collaboration Domains Asset Tracking IT Support Crowdsourcing Social Engineering Law Enforcement Monitors Theft Tech Terms Samsung Smartphones Sports Tech Term Bluetooth Financial Information Mobile Office Recycling Efficiency Remote Monitoring and Management Microsoft Users Botnet Laptop Websites communications Gadgets Star Wars Business Computing Remote Monitoring VoIP Permissions Cameras Quick Tips Mobile Computing Email Business Intelligence App Relocation Gadget Virtual Reality Spyware Internet Cortana IT Support Malware 3D Printing Server Management User Blockchain Privacy Document Management Test Outlook Miscellaneous Cyber Monday Two-factor Authentication Business Growth Computer Care Hardware End of Support Solid State Drive Programming Disaster Resistance Typing Managed IT services Consulting Hosted Solution Taxes Windows 10 Word Legislation Management Hackers File Sharing Alert Computing Personal Information Knowledge Wireless Backups Migration Data Backup Tip of the Week Cloud Computing Development Facebook Cybersecurity ROI Authentication Health Customer Relationship Management Dark Data Uninterrupted Power Supply Features Retail Net Neutrality Apps Database Black Market Automobile Infrastructure Running Cable Electronic Health Records Save Time Cost Management Virtual Desktop Phishing Avoiding Downtime Business Management Firewall Statistics LiFi Antivirus Touchscreen Distributed Denial of Service Software Mobile Devices Identity Google Drive Employer-Employee Relationship Windows 8 Save Money Environment Microsoft Office CCTV IT Management Virus Bitcoin Competition Education WiFi Virtual Assistant Procurement Superfish Help Desk Small Business Meetings Google Calendar Multi-Factor Security GPS Managing Stress Deep Learning G Suite The Internet of Things Cache Smartphone Redundancy Firefox Consultation Managed Service Cooperation Black Friday Government Healthcare Upgrades Office 365 Computer Repair Apple Administration Mirgation Data loss Electronic Medical Records Lithium-ion Battery Chatbots Hacker Mobile Security Customer Service Monitoring Business Windows 10

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...