Contact us today!
(732) 291-5938
facebooktwitterlinkedinThe Connection RSS Feed

The Connection Blog

The Connection has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Touch Keyboard Capabilities in All Windows 10 Devices

Tip of the Week: Touch Keyboard Capabilities in All Windows 10 Devices

Special text characters are an integral part of typing. For the most part, however, they are not something that your normal, run-of-the-mill keyboard or laptop keypad is able to access easily. Luckily, for Windows 10 users, there is a shortcut that allows you to access all sorts of special characters.

Continue reading
0 Comments

Have You Lost Control Of Your Network?

Have You Lost Control Of Your Network?

There are some tasks that are essential to the health of your business’ network. For example, you need to make sure that you are engaging in regular network management activities. Do you know what this task entails?

Continue reading
0 Comments

Are You Prepared For Incoming Threats To Your Systems?

Are You Prepared For Incoming Threats To Your Systems?

It doesn’t matter if you’re a small business, a large enterprise, or if you're in a rural town, or a larger city. You still have to worry about the security of your data and the integrity of your infrastructure. Thankfully, there are services out there that allow even small businesses to leverage powerful, enterprise-level tools for maximum network security. The most valuable of all is perhaps the Unified Threat Management (UTM) tool.

Continue reading
0 Comments

Tip of the Week: Practices to Improve Time Management

Tip of the Week: Practices to Improve Time Management

If there’s any experience that’s universally shared by the modern worker, it’s the sensation that there aren’t enough hours in the day. Fortunately, there are some habits that can be developed that can help to mitigate these feelings by enhancing productivity. For this week’s tip, we’ll discuss some of these practices to help boost your office’s time management capabilities.

Continue reading
0 Comments

On A Scale of "Um...?" To "Safe," How Well Managed Is Your Data?

On A Scale of "Um...?" To "Safe," How Well Managed Is Your Data?

Putting together your workforce is something that requires painstaking attention to detail. You found workers who are willing to work as hard as possible to further your organization’s goals. Yet, you have to remember that even the most perfect employees are still human, and that they can make mistakes and can put the organization’s data at risk. User error is a common problem, and it is one of the most important things to keep in mind while you set up your information systems.

Continue reading
0 Comments

Tip of the Week: 3 Google Drive Tips You May Not Have Heard Of

Tip of the Week: 3 Google Drive Tips You May Not Have Heard Of

If you use Google Drive as your preferred cloud provider, you know that it’s a dynamic service that offers everything from word processing to spreadsheets to file storage. However, there are many other ways to use Google Drive that you may not even be aware of. Here are three secret tips that can help you get a little more value out of Google Drive.

Continue reading
0 Comments

3 Ways Remote Monitoring Helps Businesses

3 Ways Remote Monitoring Helps Businesses

It’s time to face the fact that those times when your technology acts up, you don’t have the time to spare waiting around for the issue to just go away...you need to react. Many small businesses just don’t have the means to maintain an in-house IT resource to solve their problems. What if we can offer you a different solution.

Continue reading
0 Comments

Solid Vendor Management Leads To Solid Successes

Solid Vendor Management Leads To Solid Successes

In order to function properly, any business will need to procure certain pieces of equipment. Some of this equipment will be specialized to the business’ purpose, while some will be the sort that may be more commonly found in offices everywhere. This equipment must be procured from somewhere, and this is where vendors come in--but who in your organization is responsible for your vendor management?

Continue reading
0 Comments

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Tip of the Week: How to Foil A Phishing Attack By ID’ing a Bad URL

Phishing attacks have been around for decades, first being recorded in 1995 where scammers would pose as AOL employees and request a user’s billing information through instant messages. Nowadays, email phishing attempts have tricked users into handing over personal information of all kinds. There are many methods of identifying a phishing attempt, but today we’ll focus on one.

Continue reading
0 Comments

What's It Mean When Online Traffic is Concentrated to a Handful of Apps?

What's It Mean When Online Traffic is Concentrated to a Handful of Apps?

The Internet is always changing, and anyone who has been using it for a while has experienced this change for themselves. While it might be strange to think about, the latest statistics have proven that the current changes to the Internet are some of the most significant--especially for businesses. “Online business as usual” will be significantly different moving forward.

Continue reading
0 Comments

When Employees Argue, Quality Suffers. Here’s What You Can Do About It

When Employees Argue, Quality Suffers. Here’s What You Can Do About It

When you talk about your employees, you hopefully often refer to them as a department, or a “team.” These terms often come with predetermined assumptions, with one of them being that the employees work together to accomplish something specific. However, it’s often not so simple. If your employees aren’t working together as a team, how can you fix this dilemma?

Continue reading
0 Comments

Digital Transformation: What Does it Look Like for Businesses?

Digital Transformation: What Does it Look Like for Businesses?

Smart organizations are always looking for ways to improve how they do business. Digital transformation is a way for businesses to get the most out of their technology by improving workflows and overall efficiency. What does digital transformation look like and how can you implement it in your business?

Continue reading
0 Comments

Software Patches Take on New Importance After the WannaCry Ransomware Fiasco

Software Patches Take on New Importance After the WannaCry Ransomware Fiasco

On May 11th, 2017, the world was introduced to the WannaCry ransomware. The ransomware spread around the globe like wildfire, infecting hundreds of thousands of devices and catching many major organizations and businesses by surprise. The full extent of the ransomware’s damage is still being assessed, yet, one thing we do know: this whole fiasco was preventable.

Continue reading
0 Comments

You Need More Than a Power Strip to Protect Your Company’s Equipment

You Need More Than a Power Strip to Protect Your Company’s Equipment

What would happen if you were in the middle of typing a report or performing some task, and the office suddenly lost power? Too many would find themselves staring blankly at an equally blank screen as their infrastructure suddenly ceased operations. However, there is a device that can help save you from the worst effects of sudden power loss.

Continue reading
0 Comments

Tip of the Week: How to Plan Your Network’s Cabling Like an IT Pro

Tip of the Week: How to Plan Your Network’s Cabling Like an IT Pro

A crucial step of setting up your business is the implementation of a physical infrastructure, including cabling and electrical lines. Unfortunately, the same setup won’t work for two very different businesses, so you’ll need to put considerable time and effort into the cabling process as a whole. Here are a few ways that you can make the process easier.

Continue reading
0 Comments

3 Ways Managed IT Keeps Your Business in Business

3 Ways Managed IT Keeps Your Business in Business

In the natural course of doing business, an owner/operator will have to face many difficult situations, but none of these situations are as difficult as asking them to determine whether or not to close the doors of the business for good. Many problems could cause a business to fail, but it has to hurt the failing owner a little more when the solution for the problem was not only within his/her reach, it was affordable.

Continue reading
0 Comments

Tip of the Week: 12 Security Rules Every PC User Should Follow

Tip of the Week: 12 Security Rules Every PC User Should Follow

While you are probably spending a fair amount of time thinking about your business’ security, can you confidently say the same about those that you’ve employed? Unfortunately, your workers may not put much thought into network security. This could very possibly lead to some severe issues potentially harming your business operations.

Continue reading
0 Comments

Next Job on the Automation Chopping Block: Pizza Delivery

Next Job on the Automation Chopping Block: Pizza Delivery

Did you know that over 2,000 Domino’s Pizza franchises in Australia, New Zealand, France, Belgium, The Netherlands, Japan, and Germany feature delivery by robot? Starship Technologies, a self-driving robotics company, announced on March 29th that they would be partnering with Domino’s to revolutionize the way the delivery process works.

Tags:
Continue reading
0 Comments

How Rogue Software Makes PC Problems Worse

How Rogue Software Makes PC Problems Worse

It’s difficult to know what you can and can’t trust in the realm of cybersecurity. However, you’re likely to trust your own security solution. Yet, even this could be a devastating oversight, as some malware masquerades as your security software.

Continue reading
0 Comments

Tip of the Week: Use Windows Start Menu to Search Your PC and the Web

Tip of the Week: Use Windows Start Menu to Search Your PC and the Web

It’s no secret that finding a particular program or file on your computer can be a pain, especially when you don’t have the time to hunt it down by clicking through folders. However, there is a much easier way to locate your desired data. All you need to do is use the search option found in the Start menu, which is the subject of this week’s tip.

Continue reading
0 Comments
 

 

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Business Computing Hackers Productivity Privacy Business Malware IT Services Internet Hosted Solutions IT Support Microsoft Backup Email Managed Service Provider Windows 10 Workplace Tips Computer Communication Software Disaster Recovery Hardware Managed IT services Network Efficiency Mobile Devices Business Continuity Mobile Device Management Social Media Google Network Security Data Smartphone Windows Ransomware Innovation Miscellaneous User Tips Server App Android Microsoft Office Remote Monitoring Virtualization Upgrade Office Outsourced IT Holiday Internet of Things Small Business Facebook Save Money Recovery Browser Data Management Big Data WiFi Vendor Management VoIP Saving Money Content Filtering Password Firewall Phishing Spam Mobile Computing Apps Smartphones Collaboration BYOD Robot Bring Your Own Device Hosted Solution Operating System Passwords Customer Service Office Tips Remote Computing Alert Gmail Unified Threat Management Risk Management Wireless Technology IT service Training Information Technology Business Growth Office 365 Avoiding Downtime Automation Telephone Systems Employer-Employee Relationship Education Budget Mobile Device Apple Hacker Computers Going Green Analytics Tech Support Data storage Customer Relationship Management IT solutions How To Retail Wireless Hacking Business Management Money Cybercrime File Sharing Social Cybersecurity SaaS Hard Drives Lithium-ion Battery Encryption Chrome Work/Life Balance Health Productivity Artificial Intelligence Settings Presentation Outlook Application The Internet of Things Paperless Office IT Consultant Running Cable Cloud Computing Best Practice Managed IT Analyitcs Administration Cortana Data Backup Automobile Help Desk Phone System End of Support Competition Virtual Reality communications Hiring/Firing IBM Monitors Two-factor Authentication Uninterrupted Power Supply History Legal Save Time LiFi USB Disaster Taxes Downtime Programming Botnet Network Congestion User IT Support Physical Security BDR Google Drive YouTube Document Management Laptop Managed IT Services Business Owner Word Licensing Printing Marketing Computer Care IT Management Private Cloud Virus Computing Safety Sports Politics Solid State Drive Twitter Humor Virtual Desktop Website Co-managed IT Upgrades Wi-Fi PowerPoint Network Management Tracking Heating/Cooling Typing Domains Servers 3D Printing Point of Sale Black Market 5G Trending VoIP Touchscreen Identity Theft Statistics Cryptocurrency Public Speaking Knowledge Cabling Administrator Unsupported Software Web Server Samsung Mouse CIO Digital Windows 10 Specifications Files Display Bitcoin Experience eWaste Infrastructure Sync Mobile Data Cameras Notifications Backups User Error Entrepreneur Spyware Tip of the week Mobility Websites Unified Communications Windows 8 Net Neutrality Environment Mobile Device Managment Flexibility CCTV Update How To Refrigeration Supercomputer Writing Hacks Troubleshooting Hard Disk Drive Crowdsourcing Firefox Cost Management IT Budget Social Engineering Gadgets Current Events G Suite Government Assessment Digital Payment Machine Learning Deep Learning IP Address Halloween Cleaning Law Enforcement Google Docs Users Consultation Undo Documents Tablet Digital Signature Relocation Compliance Chromebook Mobile Office Scary Stories Business Intelligence Maintenance Travel Personal Information Gadget Augmented Reality Piracy PDF Google Maps Regulations Identities Computer Repair Emoji Intranet Corporate Profile Motion Sickness Consumers Staffing Storage VPN Quick Tips Fun Error Electronic Medical Records Google Wallet WannaCry Meetings GPS Telephony Dark Data Bandwidth Time Management Alt Codes Search Software Tips Saving Time Public Cloud Processors Drones Buisness iPhone Data loss Webcam

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, a disaster is anything that involves a major loss of data or major downt...
QR-Code