The Connection, Inc Blog

The Connection, Inc has been serving the New Jersey area since 1992, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

Collecting Data is Easy, Using it to Benefit Your Business is the Challenge

Collecting Data is Easy, Using it to Benefit Your Business is the Challenge

Big data is a trend that’s gaining traction in the business environment. By taking a close look at the data that you collect, and identifying trends, you can potentially predict how your business can perform, and how your clients will respond to your products or services. Yet, there are two major questions that you need to ask: how are you going to use this data, and is the data that you’ve collected specifically to achieve that goal?

0 Comments
Continue reading

Forget Micro SD Cards, the Future is Molecular-Level Data Storage

Forget Micro SD Cards, the Future is Molecular-Level Data Storage

As far as leaps in computing go, this one’s pretty tiny: a research team from IBM has managed to store data on a single atom. Despite the microscopic size of the result, the impact is potentially huge when one considers the effects this discovery could have on computing.


The research team was conducting experiments concerning high-density storage, trying to see how small a medium they could record storage on. At the end of their highly complex process, it turned out that a literal bit of data could be stored on a single atom.

For reference, current drives use 100,000 atoms to store each bit.

Even more impressive, the data recorded on two atoms could be read with a mere nanometer in between the host atoms, meaning that many technologies we see today could soon become much, much smaller.

Before you get your hopes up about phones that can hold entire libraries of data, you should know that this experiment was simply that--an experiment. This single-atom tech is so sensitive, it requires the most controlled conditions in order to work. For example, the process has to be kept at a remarkably low temperature. The point was to find the smallest possible reliable memory bank, and they found it.

This is not to say, however, that atomic storage will never be seen. This research will help toward that goal significantly. So who knows, perhaps we'll see this experiment’s influence in the future--ideally sooner than later.

Consider just how drastically data storage has changed over the past few decades, where brick-sized mechanical hard disk drives went from holding a couple megabytes of data (enough for a single MP3 file), to an era where hundreds of thousands of megabytes can be stored on a Micro SD card that’s smaller than a thumbnail. Pretty cool, right?

What can the practical application of this technology present humanity? Do you think that it is the beginning of a whole new age of computing? What kinds of solutions do you expect nanotechnology to produce? Share your thoughts in the comments below.

0 Comments
Continue reading

Data Privacy is Good for Your Business, According to the National Cyber Security Alliance

Data Privacy is Good for Your Business, According to the National Cyber Security Alliance

January 28th marks Data Privacy Day, a day intended to raise awareness of the importance of data privacy and educate users and business owners of its benefits. Spearheaded by the National Cyber Security Alliance, there are plenty of lessons the NCSA has to share with businesses as this day puts their, and their clients’, privacy in the spotlight.


The NCSA, in conjunction with the U.S. Small Business Administration, provides a few guidelines for businesses to follow in order to preserve privacy as far as company data and personal information are concerned.

Protecting Your Business

Nearly every business collects and utilizes personal information from its clients, employees, and vendors. Therefore, it is also the responsibility of the business to make sure that this data remains private and secure. In this digital age, businesses need to be transparent with their data privacy policies, as even the accusation of a data loss event or misusing their information in any way can be catastrophic. There should never be a time that a customer could accuse you of collecting more data than they consented to, without you having proof that they had been notified and provided their consent. A privacy policy should be available for you to provide to your clients.

However, this needs to be more than a policy. It needs to become a tangible part of your organization, and enforced as such. Not only should you frequently remind your employees of the importance of privacy and data security, it should become integral to your company culture. As the NCSA and the SBA say, you should “communicate clearly and often what privacy means to your organization,” as well as being sure to “educate employees about their role in privacy [and] security...”

Your diligence should extend not only to your internal employees but also to any external (or third party) resources you may use. You need to ensure any of your partners or vendors with access to your network and its sensitive data are taking your security as seriously as you are. Many businesses require all external resources to sign a network use agreement that holds them liable in the event their actions result in a breach of privacy.

Privacy in the Home

Data security does not just apply to work done within the walls of your offices, either. You need to cultivate an even greater awareness and respect for privacy at home or while traveling, as well. Any device that is used for work must be treated with the same security-minded processes that you and your employees would subscribe to in the office.

Remind members of your household that they need to be careful with their personal information as well. While they may not have a company to manage, there are still plenty of consequences to deal with if their data is breached. Therefore, the entire family needs to be mindful about what they share online, avoiding sharing too much and keeping personal details close to the chest. This is especially true if you have children and teens under your care and supervision, as they could face a lifetime of ramifications.

Additionally, The Connection, Inc understands how important your privacy truly is. When you have built up and maintained a business, you want to protect it, and maintaining data privacy can help keep both it and you safe. We appreciate how big of a commitment it is to be entrusted with that responsibility, and we’d embrace the chance to live up to it with your data.

Please, lean on The Connection, Inc for more assistance and advice. Call us today at (732) 291-5938.

0 Comments
Continue reading

Tech Term: Bits and Bytes

Tech Term: Bits and Bytes

Running a business sometimes requires attention to very minute details, and some things must be measured in order to achieve optimal efficiency. You’ve likely heard the terms bits and bytes used regarding data storage or transfer, but do you know what the difference is between them? Today’s tech term is dedicated to this explanation.


One of the first things you’ll notice when you go to buy a new computer is how much data the hard drive can store and how much random access memory (RAM) it contains. You might see numbers like 500GB or 2TB. The easiest way to explain this is by looking at the basics of data measurement. You can think of a bit as the smallest form of data measurement on a computer. Computers use binary math to showcase each potential digit as a bit. Each bit has a value of a 0 or 1. These bits are generated by the computer’s electrical current that activates the various internal components. These changes in voltage are used to transmit the bits, process calculations, and relay data across the network.

Here are some of the methods used during network message encoding:

  • Wi-Fi carries bits using radio signals
  • Ethernet connections carry bits using electric signals of varying voltages
  • Fiber connections use pulses of light to carry bits

Ideally, the bits are encrypted so that they can’t be interpreted without permission.

On the other hand, the byte is a fixed sequence of bits. Technology today relies on organizing data into bytes to increase the speed and efficiency of data processing. Bits are often too small to measure data, which is why a byte is easier to use as the standard measurement.

The rate at which a computer network connection is measured is through time (bits per second), and today’s technology has advanced so far that it can transmit millions, or even billions, of bits per second (called megabits (Mbps) or gigabits (Gbps). The speed at which this data is transferred depends on the size of the file sizes or components transferring the data.

This is one of the reasons why gigabit network switches and other devices exist. If a device can support 1 Gbps, it transfers a single gigabit per second. Depending on your infrastructure, you might need to transfer more than this amount of data so that the network can operate smoothly. Other devices on your network will also play a major role in determining what your overall maximum speed is.

Breaking Down the Numbers
Since every byte is eight bits, you could safely assume that a kilobyte is 1,000 bytes, but you would be mistaken. Computers use binary systems, so your hard drives, memory, and bandwidth are all measured in powers of two. Thus, 2 ^ 10 equals 1,024, not 1,000. This makes looking at the specific numbers somewhat confusing for the average user.

If you look at everyday examples of this in practice, it becomes a little easier to understand and work with. Take a look at your IP address. This contains a string of 32 bits (or four bytes). An IP address with a value of 192.168.1.1 has values of 192, 168, 1, and 1 for each of its bytes. If you look at the encoding of this IP address, it would look like this:

11000000 10101000 00000001 000000001

This means that:

  • 192 = 1100000
  • 168 = 1010100
  • 1 = 00000001

How to Convert Bits to Bytes (and Beyond)
If you ever need to convert bits to bytes or otherwise, here are the numbers.

  • 8 bits = 1 byte
  • 1,024 bytes = kilobyte
  • 1,024 kilobytes = megabyte
  • 1,024 megabytes = gigabyte
  • 1,024 gigabytes = terabyte

If you want to convert four kilobytes into bits, you need to first convert the kilobytes to bytes (4 x 1,024) and then use that total (4,096) to convert to bits (8 x 4,096 = 32,768).

From a consumer standpoint, if you purchase a hard drive that has a terabyte of data, it’s real value is about 8 trillion bits. Hard drive manufacturers measure content by rounding down to 1,000 megabytes per gigabyte, even though most computers will use the 1,024 number. This is why when you purchase a new terabyte hard drive, you’ll notice that about 35 gigabytes aren’t immediately available. In the case of a workstation, the operating system will also consume a certain amount of data on the drive.

Did we answer some of your questions about computing and the specifics of bits vs bytes? Let us know in the comments what you would like to see covered in our tech term articles.

0 Comments
Continue reading

Don’t Get Your Hopes Up about 5G Yet

Don’t Get Your Hopes Up about 5G Yet

There’s no getting around it: technology has spoiled us. We have had access to 4G mobile data speeds since 2009, and we’re already clamoring for the next thing. While 5G has been in development for some time now, it will likely be quite a while before it is available for common use. Here, we examine why 5G is likely going to take at least a few more years to arrive.

0 Comments
Continue reading

A Short History of Data Backup and Storage

A Short History of Data Backup and Storage

Data backup has become an essential piece of the modern business’ computing infrastructure but the act of protecting data from being lost is centuries old. Before there was recorded civilization, there were humans writing on the cave walls and carving notches into bone to aid counting and other primitive mathematics. Today, we take a look at the history of backing up data, and how it has brought us to where we are now.

0 Comments
Continue reading

Tech Term: Encryption Key

Tech Term: Encryption Key

It is no secret that security is an absolutely crucial part of computing in the modern era. Data can very fairly be called the most valuable currency today, which means it needs to be protected. One way to do this is through the use of encryption keys. In this Tech Term, we’ll go over how these keys can protect your data, and how they do so.

0 Comments
Continue reading

Tech Term: Network

Tech Term: Network

It sure does seem that the term “network” is tossed around an awful lot. Network security, network maintenance, social networking, network switch… but what is a network, really? That is precisely what we shall dive into here.

0 Comments
Continue reading

How is Blockchain Going to Work with the GDPR?

How is Blockchain Going to Work with the GDPR?

The European Union’s General Data Protection Regulation (GDPR) has gone into effect, and with this new law comes a lot of information your organization needs to consider regarding individual data protection. In particular, the technology of blockchain is difficult to talk about in regard to GDPR, as it’s basically an encrypted and distributed digital ledger. How can blockchain work properly in tandem with the new GDPR regulations?

0 Comments
Continue reading

How to Intelligently Approach Business Analytics

How to Intelligently Approach Business Analytics

A solid business decision needs to be based on more than just a gut feeling. It takes quantifiable data to choose the right path for your company, leveraged in a process known as business analytics. Today, we’ll explore this process, as well as discuss a few ways you can use it to your advantage.

0 Comments
Continue reading

Uber Demonstrates the Importance of Disclosing a Data Breach

Uber Demonstrates the Importance of Disclosing a Data Breach

If your business was breached, would it be better to keep it a secret, or should you disclose it to your clients? Uber has proven that trying to hide it is a mistake, and a costly one at that.

0 Comments
Continue reading

Tip of the Week: Improving Some Cybersecurity Basics

Tip of the Week: Improving Some Cybersecurity Basics

What are your chances of being hacked, or targeted by some kind of cyberattack? I hate to tell you this, but they’re probably a lot higher than you might think.


For instance, despite almost 90 percent of small business owners believing they’re safe, about half of all small businesses will suffer from a catastrophic cyber-attack.

Are you at risk of being part of the unfortunate half?

Fortunately, there is a lot that you can do to help reduce the chances that a cyberattack will successfully target you. This is a really good thing - not only will a hack damage your relationships with everyone involved with your business, half of the businesses that are attacked close up shop within six months.

I’ve seen it happen far too often to businesses that just weren’t prepared.

Here, I’ve compiled a few tips to help you improve the basics of your cybersecurity, reducing your risk of a successful attack:

  • Updates - We know how annoying those update notifications can be, but it is important to remember that the vast majority of them are meant to improve security in one way, shape, or form. Therefore, you should prioritize these updates whenever possible. It may prevent an attack from victimizing you.
  • Involve Your Employees - The unfortunate reality is that your employees can be the biggest vulnerability your business has. Properly educating them in cybersecurity best practices and holding them to these standards will help reduce the chances that one of them will inadvertently let in a threat. Training them in various security best practices and explaining why certain requirements are in place will help to motivate them to participate for the company’s benefit.
  • Limit Access - On the other side of the coin, the less an employee has access to, the fewer chances there are that one of them leaves you vulnerable in some way. The same can be said of your clients - regardless of how much someone is trusted, you shouldn’t allow them privileges beyond their role. Whether its role-specific resources, data, or other information, employees should be given individual login credentials to make assigning privileges easier. Your business Wi-Fi should also remain separate from the Wi-Fi made available to clients.
  • Backup, Backup, and Backup Again - If, despite all your preparations, you are still infiltrated, you want to have an extra copy of all of your important data somewhere else, safe and sound. This backup copy would ideally be stored offsite and securely encrypted.

As it happens, The Connection, Inc is able to help you out with all of these measures, and many more.

If you want some added help with these cybersecurity basics, or want to do more to protect your operations, you can always lean on us. The Connection, Inc is committed to ensuring that your technology allows your business to operate better, improved security being a major part of that goal. Reach out by calling us at (732) 291-5938.

0 Comments
Continue reading

Small and Medium-Sized Businesses Need to Prioritize Data Management

Small and Medium-Sized Businesses Need to Prioritize Data Management

For the small business, being more efficient with resources can make a massive difference. In fact, it can be the difference between organizational sustainability and organizational failure. The bottom line is that, no matter how big or small they are, today’s businesses need to be smarter to compete. As a result, some businesses have begun to utilize data management platforms (DMP) in order to put themselves in a better position to understand their business, their market, and their customers. Let’s take a look at the DMP, and how it works to help businesses like yours be more effective.

0 Comments
Continue reading

Tip of the Week: Making a Functional Database in Excel

Tip of the Week: Making a Functional Database in Excel

A database is an incredibly useful tool for organizing a lot of information in a relatively concise and accessible way. Did you know that you can use a relatively common program, Microsoft Excel, to generate a database for your business to use? For this week’s tip, we’ll walk you through this process to help you keep your data organized.


Step One: Enter Your Data
Opening Excel, your first step should be to enter the data that is to be included in your database - however, it is important that you do this correctly. If you are using a title, the only space between any of your inputs should be a row between the title and the data you are organizing. This includes empty cells, so you’ll want to make sure you determine a standardized placeholder to avoid any of your cells being unpopulated. This “no space” rule applies to the labels on your records and fields in relation to your data as well.

Records and Fields
In your new database, each row should represent an individual record, with each column serving as its own field.

  • Each record should pertain to a single item in the database. Depending on what your database is organizing, this could be a specific piece of equipment in the office, or a particular employee… essentially, any single unit out of the contents of the database.
  • Each field, on the other hand, dictates what information about the item is to be placed in the cell. This might be the price a certain item had, the date it was brought into the company, an employee’s middle initial… again, whatever piece of data should be the one in that particular column.
  • Make sure you are consistent in how you input your data. For instance, don’t start by entering numbers as digits and suddenly transition to writing them out.

This will require you to set particular standards for data collection, as you will want to be sure that your records are as complete as possible. You will also need to stick to this organizational pattern, so you will want to make sure that you figure out what works for you early on.

Step Two: Convert Your Data into a Table
Now, you will want to create a table out of your data. To begin, highlight your data, with exception to your optional title and the placeholder space that separated it from the data. In the Home tab, open the Format as Table menu to select your choice of table.

This will add drop-down boxes to the field titles, allowing you to sort your data by the criteria you wish, without the concern that your data will be lost.

Step Three: Expanding Your Database and Putting It to Use
Of course, chances are that you will need to change the contents of the table, adding more records as your business continues. Excel makes it relatively simple to do so, with a simple click-and-drag interface.

To expand your table, simply hover over the bottom-right corner of your table, as indicated by a small dot. Your cursor should convert into the double-headed arrow icon. Click and drag downward to add the number of rows - or records - you have to incorporate into your table. Then all you have to do is add the new data in the proper fields, and your table has expanded.

Of course, as your database grows, it’ll become harder and harder to interpret due to information overload. At least, it would if Microsoft hadn’t incorporated a means to rectify this shortcoming as well. You can filter the data that your table displays, hiding the records that don’t apply to the criteria you set your filters to. Mind you, this doesn’t delete the data - you can easily display it again by clearing your filters.

To use your filters, click the drop-down arrow on the field category that you wish to filter through. You will see a few options, with a search bar and some checkbox options below it that specify each entry in that column. You want to uncheck the (Select All) option, and instead check the checkbox option that correlates with the data you want to view specifically. Once you’re ready to see your complete data, you can go back in and select the Clear Filter from option.

This is a very basic version of a database, but it can help serve you well in many ways. Are there any other uses you’d like to know about, let us know! Leave your questions in the comments, and for help with any of your bigger IT concerns, give us a call at (732) 291-5938!

0 Comments
Continue reading

Ransomware Shuts Down Doctors’ Office - Is Your Business Protected?

Ransomware Shuts Down Doctors’ Office - Is Your Business Protected?

Let me ask you a question… let’s say that you’re about one year from your projected retirement, when a ransomware attack encrypts all of your files. What do you do? Pack it in and retire early? This is precisely the situation that the practitioners of Brookside ENT & Hearing Services of Battle Creek, Michigan, have found themselves in - and it may not be over yet.

0 Comments
Continue reading

3 Ways You Can Protect Your Data

3 Ways You Can Protect Your Data

Businesses have a lot of data to protect and it’s not so simple as implementing a catch-all solution that can keep your data secure. In fact, it takes several solutions working in tandem to maximize data security. We recommend a combination of a unified threat management tool, a Bring Your Own Device policy, and a virtual private network solution. Let’s take a longer look at them:

0 Comments
Continue reading

Four Ways Cloud Storage Can Benefit Your Business

Four Ways Cloud Storage Can Benefit Your Business

Cloud solutions have proven their value in many different business applications, a major one being the ability to use a cloud service as a storage solution. By doing so, a business can enjoy a few additional advantages as compared to one that relies on more traditional storage solutions.

0 Comments
Continue reading

The Endless Line of Costs from a Data Breach

The Endless Line of Costs from a Data Breach

Picture this… In your office you have a bag filled with thousands of envelopes. In each envelope there is $242 in cash. Unbeknownst to you, a thief has gained access to your office, but you don’t realize this until 279 days later. How much is this going to cost your business?


Data breaches on average in the US cost $242 per breached record. With the average breach compromising 25,575 records, the average cost per data breach is $8.19 million. Of course, the financial cost per breach is determined by a number of factors, but regardless of how much each breached file is actually worth, the entire situation has a chance to be the end of everything that you’ve been doing. Today we discuss these factors and determine how your business can avoid experiencing the effects companies feel in the aftermath. 

Talking Numbers… Very Large Numbers

Let’s take a brief look at the 2019 Cost of a Data Breach Report.

It’s no secret that anything associated with the healthcare industry costs a pretty penny. Healthcare data breaches are no different. The average cost of a data breach in the healthcare industry costs approximately 6.45 million dollars. This number is a staggering $15 million in the United States, where healthcare costs outpace the rest of the world. The cost-per-record increased over five percent within just a year, increasing from 408 dollars to 429 dollars. This 21-dollar increase might seem insignificant, as well as non-healthcare records increasing 2 dollars over a year, but remember that the average breach compromises 25,575 records. That means comparing 2018 to 2019, even non-healthcare data breach costs increased by over half a million dollars per incident. 

Clients Will Forget About Our Breach … Right?

Word travels fast in the digital age. If your business suffers a data breach, statistically these are the long- and short-term hurdles you will face.

Once customers hear their personal data has been breached, some begin to look for alternative companies in which to do business. It’s not uncommon for customers to feel that their data cannot be trusted following a data breach, and it's hard to blame them. In fact, on average 3.9 percent (even higher in the healthcare industry) of customers leave service following a data breach. For businesses with fewer than 500 employees, a data breach could ultimately lead to problems attracting new revenue, and ultimately, failure.

Mitigation

What your business needs to know following a data breach, is time is of the essence. The faster you solve the issue at hand, the less it is going to cost. Solving the problem within 200 days reduces the total cost by $1.2 million on average. What’s better than saving $1.2 million? Not suffering from a data breach in the first place. The Connection, Inc offers services that can help prevent breaches. Call (732) 291-5938 to learn more about our security services.

0 Comments
Continue reading

Why Managed Services: Data Management

Why Managed Services: Data Management

Managed services offer businesses an improved means of obtaining and managing the technology they rely on. With data being so important to the modern business, much of this technology is devoted to storing, securing, and leveraging this data. Working with a managed service provider can help a business get the most value out of their data management practices. Let’s go over how.

0 Comments
Continue reading

File Sharing Tips from the Pros

File Sharing Tips from the Pros

The more time that passes the more files your business accumulates. These files need to be stored in a place where your staff has access to them. Since a lot of today’s work is collaborative, finding the right file sharing and collaboration solution is extremely important for the growing SMB. Today, we will tell you some things you need to do to maintain efficient file management systems.

0 Comments
Continue reading

Blog Archive

2025
May
June
July
August
September
October
November
December

Mobile? Grab this Article

QR Code

Free Consultation

team work

Interested in seeing what we can do for your business? Contact us to see how we can help you!

Sign Up Today!

News & Updates

The Connection, Inc. Celebrates 32 Years as a Trusted Technology Provider!   Since our founding in 1992, technology and the way we operate and do business has changed a lot. Companies that have adapted and aligned themselves with ...

Contact us

Learn more about what The Connection, Inc can do for your business.

The Connection, Inc
51 Village CT
Hazlet, New Jersey 07730