Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection RSS Feed

The Connection Blog

The Connection has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why Aren’t Users Buying More Tablets?

Why Aren’t Users Buying More Tablets?

When tablets first hit the market, the general prediction was that they would eventually replace PCs as the de facto device for computing, However, based on their steadily declining sales, this prediction seems to be a little off base--but, why? A closer examination provides some insight into why tablet sales have dipped.

Continue reading
0 Comments

Your Mouse Can Do More Than You Think

Your Mouse Can Do More Than You Think

You’ve used a mouse for years, but do you know of all the neat little tricks that it’s capable of? We’ll show you just how much you can get done with your mouse.

Continue reading
0 Comments

4 Benefits You Won’t Believe About Managed IT

4 Benefits You Won’t Believe About Managed IT

How does your organization manage its mission-critical technology solutions? We know that most small businesses have some sort of trouble with this topic, either due to budget constraints or a lack of personnel. Either way, we know that there is a better way to manage your business’ technology, and it’s all thanks to an approach called managed IT services.

Continue reading
0 Comments

House of Representatives Makes Moves to Support Small Business

House of Representatives Makes Moves to Support Small Business

Without competition, there would not be businesses. However, this competition needs to be fair in order for small businesses to embrace new opportunities that arise. A U.S. bill that allows for both of these goals has passed in the House of Representatives and will be voted on in the Senate.

Continue reading
0 Comments

Tip of the Week: What Changed With Google Calendar’s Update?

Tip of the Week: What Changed With Google Calendar’s Update?

If you are a dedicated user of Google Calendar, you’ll have realized that it’s recently undergone a significant improvement. Google has pushed out an update that has really polished their calendar in terms of both visual appearance and functionality, which is something that you’ll really appreciate, especially if you are a G Suite user. How can you use this new version of Google Calendar for your business?

Continue reading
0 Comments

Is Your BYOD Strategy Up to Standards?

Is Your BYOD Strategy Up to Standards?

BYOD, or Bring Your Own Device, policies have proven to be a highly effective way for companies to save money. However, these policies need to address some of the shortcomings, potential costs and issues that comes with employees bringing and using their own devices could present to your business--not to mention security concerns.

Continue reading
0 Comments

Two Steps Are Better Than One, Where Security Is Concerned

Two Steps Are Better Than One, Where Security Is Concerned

You’re lucky to go a month without seeing news of some devastating data breach. With more businesses gearing up for the worst, what are you doing to protect your organization’s intellectual property and sensitive data? You can start by implementing a new type of authentication system that’s much more secure than your current security strategy--two-factor authentication.

Continue reading
0 Comments

Tip of the Week: Control Where Your Downloads Are Saved

Tip of the Week: Control Where Your Downloads Are Saved

Whenever you download a file from the Internet, the file will, by default, go to an aptly-titled folder in Windows called Downloads. Unless you change the default settings, your files will always be saved here. But what if you want to make it so that your downloads go somewhere else? You can accomplish this pretty easily. We’ll walk you through how to do it for some of the most popular browsers, including Google Chrome, Microsoft Edge, and Mozilla Firefox.

Continue reading
0 Comments

3 SharePoint Considerations Businesses Should Have

3 SharePoint Considerations Businesses Should Have

Businesses are always looking for a way to make their projects more successful. While many organizations have found success by integrating Microsoft SharePoint project collaboration software, some have found it to be a giant headache to manage, or even completely unnecessary. No matter where your business falls on this spectrum, there are some best practices in utilizing SharePoint to get the most out of the platform. Here are three considerations your team should make when you settle on SharePoint for project collaboration.

Continue reading
0 Comments

Security Comes In Two Parts--Don’t Neglect The Physical Half

Security Comes In Two Parts--Don’t Neglect The Physical Half

Physical security is more or less what it sounds like: security intended to protect the physical infrastructure that houses your business and your critical data. Many of the pieces of physical security will seem very familiar, even if you didn’t know the right terms for them.

Continue reading
0 Comments

Have You Tried Google’s Cloud Printing?

Have You Tried Google’s Cloud Printing?

Most people don’t think to try and print something out from their smartphone--particularly because it’s such a new concept. With smartphones quickly becoming just as fast as desktops from just ten years ago, it shouldn’t be such a stretch to suggest printing from them. Thanks to the cloud, you can use your Android smartphone to print something directly from the device.

Continue reading
0 Comments

Remote Monitoring and Maintenance Creates Less Stress for You

Remote Monitoring and Maintenance Creates Less Stress for You

Today’s businesses still require a lot of hardwork and dedication, but technology assists with day-to-day tasks, and gives more opportunities than we could otherwise imagine. As such, it needs to be in optimal shape, but what business has the time to see to that? Well, with the help of remote monitoring and management, yours does.

Continue reading
0 Comments

One Of Your Biggest Security Risks: Your Employees

One Of Your Biggest Security Risks: Your Employees

You might be surprised by how many of your organization’s security issues originate from within. A major contributor is user error, which can lead to some pretty severe problems reaching from your data security, to your workflow, all the way to the continuation of your business itself.

Continue reading
0 Comments

Tip of the Week: Closed a Tab Accidentally? Here’s How to Restore It

Tip of the Week: Closed a Tab Accidentally? Here’s How to Restore It

Everyone has accidentally closed an important web browser tab before they were finished with it. What can you really do about it, though? You might expect that you have to search for the page again, but there’s a much easier way to do it. In your Google Chrome browser on a PC or smartphone, you can reopen closed tabs relatively easily.

Continue reading
0 Comments

30 Schools Shut Down In Montana After Cyber Attack

30 Schools Shut Down In Montana After Cyber Attack

Students generally love it when classes are cancelled for whatever reason, but thanks to a cybercriminal group called TheDarkOverlord Solutions, a school in Flathead Valley, Montana was disrupted for an extended period of time. This downtime resulted in a disruption of operations for over 30 schools, as well as the threat to the personal information of countless teachers, students, and administrators due to a ransomware attack.

Continue reading
0 Comments

Data Security Has to Be A Priority For Your Organization

Data Security Has to Be A Priority For Your Organization

Considering that since January 1st of this year, there has been upwards of 10 million personal information records lost or stolen each day, odds are that you, or someone you know, has had their records compromised by a data breach. With such a high incident rate, individuals and businesses that have never received any kind of notification that their records were included in a breach, generally consider themselves lucky and assume that they are not at risk of identity theft or unauthorized account usage. Unfortunately for them, that is not always the case.

Continue reading
0 Comments

Tip of the Week: 3 More Useful Microsoft Word Features

Tip of the Week: 3 More Useful Microsoft Word Features

Microsoft Word has long since established itself as the primary word processing software in the business world, but even some power users don’t necessarily know about all of the hidden features that exist in it. Here are three of the best Word capabilities that you’ll be sure to use next time you’re in a pinch.

Continue reading
0 Comments

Don’t Be Like These 14 Million US Businesses and Ignore Data Security

Don’t Be Like These 14 Million US Businesses and Ignore Data Security

If you run a small business, you might consider yourself a small target of hacking attacks. It might make sense to think of it in this way, but this actually is not advisable to think of it in this way. According to a recent survey by CNBC and SurveyMonkey, only two percent of small businesses see cyber attacks as anything worth worrying about. This leads us to the next question… are you one of them?

Continue reading
0 Comments

What Effect Could Artificial Intelligence Have On Your Business?

What Effect Could Artificial Intelligence Have On Your Business?

Artificial intelligence is becoming more and more accessible to businesses of all sizes. In fact, it is swiftly becoming apparent that businesses that aren’t actively considering how to leverage AI in their processes are doing themselves a disservice.

Continue reading
0 Comments

Tip of the Week: The Only Feature Android Oreo Is Missing Is the Cream Filling

Tip of the Week: The Only Feature Android Oreo Is Missing Is the Cream Filling

The latest version of Android, Oreo (version 8.0), was released earlier this year. Has your phone received the update to it yet? Either way, you’ll want to know what features it has, including how it can help you get more done. Here are five of the many new additions offered by this update to Android Oreo operating system.

Continue reading
0 Comments
 

 

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Business Computing Privacy Hackers Productivity Malware Business IT Services Hosted Solutions Microsoft Backup Internet IT Support Email Managed Service Provider Windows 10 Software Workplace Tips Managed IT services Disaster Recovery Business Continuity Communication Network Security Computer Hardware Efficiency Mobile Devices Network User Tips Ransomware Smartphone Windows Google Mobile Device Management Android Data Social Media Remote Monitoring Innovation Outsourced IT Microsoft Office Small Business App Miscellaneous Data Management Server Browser Internet of Things Virtualization Office Upgrade Holiday BYOD Save Money Phishing WiFi Big Data Smartphones Vendor Management VoIP Facebook Recovery Password Saving Money Managed IT Content Filtering Spam Apps Firewall Mobile Computing Risk Management Office 365 Collaboration Data Backup Customer Service Employer-Employee Relationship Bring Your Own Device Data Recovery Robot Operating System Hosted Solution Passwords Gmail Alert Remote Computing Office Tips Unified Threat Management Wireless Technology IT service IT solutions How To Information Technology Cybersecurity Budget Tip of the week Apple Hacker Computers Telephone Systems Automation Productivity Word Tech Support Education SaaS Encryption Mobile Device Outlook Wireless Analytics Artificial Intelligence Cloud Computing Hacking Going Green Customer Relationship Management Business Growth Retail Data storage Avoiding Downtime Training Hard Drives File Sharing Two-factor Authentication Chrome Health Money Presentation Work/Life Balance Lithium-ion Battery IT Support IT Consultant Managed IT Services Application Best Practice The Internet of Things Settings Paperless Office Business Management Cybercrime Running Cable Social Computing Solid State Drive PowerPoint Antivirus Samsung Servers Windows 10 Files Upgrades Search Statistics Administration Cortana Mobility Websites Hiring/Firing Trending Uninterrupted Power Supply Help Desk User End of Support Document Management Mouse Virtual Reality Taxes History Business Owner communications Botnet Save Time User Error BDR Disaster Government Monitors Marketing USB Legal Virtual Private Network Programming Safety VPN Network Congestion LiFi Tablet Downtime Maintenance Computer Care Virtual Desktop Laptop Humor IT Management Website Private Cloud Physical Security Co-managed IT Google Drive YouTube Licensing Wi-Fi Heating/Cooling Politics Analyitcs Virus Twitter Phone System Competition Printing Project Management Data loss Sports IBM Automobile Entrepreneur Black Market Storage Business Technology VoIP Point of Sale Touchscreen Identity Theft Technology Laws Fun Cabling Administrator Electronic Medical Records Environment Google Wallet Web Server Dark Data Bandwidth Lenovo Digital Refrigeration Alt Codes Unified Threat Management Drones Buisness Infrastructure Sync Troubleshooting Cameras Notifications Superfish Spyware Cost Management 3D Printing Typing Printer Shortcut Mobile Device Managment CCTV Scam How To Knowledge Supercomputer Unsupported Software Cryptocurrency Access Control CIO Patch Management Hard Disk Drive IP Address Crowdsourcing Display Net Neutrality Networking Firefox Experience IT Budget Undo Mobile Data Documents Bitcoin SharePoint Digital Signature Backups Vulnerability Mobile Office G Suite Business Intelligence Unified Communications Data Security Assessment Digital Payment Machine Learning Flexibility PDF Windows 8 Downloads Update Cleaning Gadgets Law Enforcement Writing Consumers Techology Consultation Relocation Hacks Multi-Factor Security Chromebook Mail Merge Travel Gadget Social Engineering Disaster Resistance Google Maps Current Events Google Calendar Saving Time Emoji Address Corporate Profile Motion Sickness iPhone Staffing Deep Learning Proactive IT Quick Tips Halloween Domains Error Legislation Google Docs Users Redundancy Piracy WannaCry 5G Meetings GPS Telephony Compliance Intranet IT Consulting Time Management Scary Stories Server Management Software Tips Public Speaking Public Cloud Personal Information Processors Webcam Tracking Regulations Specifications Identities Data Breach Augmented Reality Network Management Bluetooth Computer Repair eWaste

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, a disaster is anything that involves a major loss of data or major downt...
QR-Code