Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.
October, 2014
Switch to calendar view

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Supercomputer Data loss Smartphone IT Technicians Multi-Factor Security Small Business Staffing Microsoft Office Finance Data Warehousing Encryption Mouse Computing Unsupported Software Internet of Things Dark Data Motherboard Notifications Uninterrupted Power Supply Cloud Computing Android Efficiency Patch Management Data Recovery Remote Worker Workplace Tips Gadgets Social Media Hotspot Paperless Office Cryptocurrency Holiday Techology Internet Google Docs Firewall Health Processors Voice over Internet Protocol Project Management Tip of the week Hosted Solutions SharePoint Hacks Humor Public Cloud Social Networking Cleaning Networking Browser Notes Customer Service Remote Workers Monitoring Heating/Cooling Troubleshooting Money Virtual Reality Cooperation Website Blockchain Consumers Star Wars Tech Term Authentication Distributed Denial of Service Hackers Crowdsourcing Computer Customer Relationship Management Saving Time Google Maps Avoiding Downtime Authorization Ransomware Digital Payment Malware Presentation Data Search Hacking Data storage Computer Repair Remote Monitoring Point of Sale Regulations Windows 10 IP Address Going Green ROI Piracy Government Information Mirgation Virtual Desktop Address Administration How To Two-factor Authentication Virtual Private Network Phone System Maintenance Programming Machine Learning Management Web Server IT Services Technology Tips Applications Error Electronic Health Records Wires Employees Company Culture Disaster Recovery Test Mobile Artificial Intelligence File Sharing Best Practices Remote Monitoring and Management IT Support User Tips IT solutions Facebook Fun Monitors Data Management Utility Computing History Mobile Device OneNote Business Continuity Computing Infrastructure Taxes SaaS Save Time Fraud IT Budget Document Management Firefox Electronic Medical Records App Backups Physical Security Running Cable Intranet Vulnerability Settings Tip of the Week Servers Bandwidth Enterprise Resource Planning IoT Permissions Cables Motion Sickness Telephony Automobile Windows 8 Google Drive Mobile Device Management Data Security communications Security Cameras WPA3 Managing Stress Managed IT Permission Entrepreneur Google Wallet Redundancy 3D Printing Quick Tips Mobile Computing Alerts Network Security WiFi Competition Telephone Systems IT Consulting Staff IT Consultant Information Technology PowerPoint Trending LiFi Touchscreen Politics Theft Cameras IT service Display Consulting Buisness Work/Life Balance Bluetooth Wasting Time Managed IT services Outlook Data Backup Spam Update Smart Technology Scam WannaCry Lithium-ion Battery iPhone Passwords Virtual Assistant Webcam Smartphones Chrome Managed Service Provider Hard Disk Drive Development Screen Reader Operations Twitter Smart Tech Windows 10 Dark Web Laptop Managed IT Service Productivity Knowledge Employee-Employer Relationship Hiring/Firing Corporate Profile Application Data Breach Marketing Hard Drives High-Speed Internet VPN Big Data Flexibility Administrator Wireless Outsourced IT G Suite Samsung Network Congestion Language Vendor Management Features 5G Comparison Tracking Deep Learning Wireless Technology Upgrade Digital Signature Bookmarks Tech Support Analyitcs Downloads Cost Management Computers Net Neutrality Legal Storage VoIP Migration Wi-Fi Bitcoin Mail Merge Budget Read Only Business Technology Save Money Password Word Asset Tracking BDR Tech Terms Upgrades Virus Chatbots Black Friday Scary Stories Best Practice Windows 7 Business Growth Mobile Office Nanotechnology Miscellaneous Collaboration Cloud Proactive IT Public Speaking Licensing Shortcut Technology Spyware Drones Botnet Mobile Device Managment Remote Computing Business Computing Software Assessment Conferencing Co-managed IT Software Tips Private Cloud Relocation Wearable Technology User Error Education Solid State Drive Tablet Files Employer-Employee Relationship Technology Laws Meetings Hacker Recovery Computer Care Retail Cortana E-Commerce Current Events Printer Modem BYOD Consultation CIO Human Error Help Desk Hardware Time Management Emoji Hosted Solution Mobile Security Cybersecurity PDF Router Access Control Office 365 Instant Messaging IT Management Analytics eWaste Gadget Managed Services Provider IT Support Business Social Engineering How To Enterprise Content Management Bring Your Own Device Managed IT Services Digital CCTV Printing Financial Lenovo Internet Exlporer MSP Infrastructure YouTube Software as a Service Domains Environment Unified Threat Management USB Mobility Specifications Content Filtering Proactive Mobile Data Travel Antivirus Cyber Monday Break Fix Apple User Chromebook Office Tips Office Business Intelligence Robot Personal Information Alt Codes Experience Identity Server Cookies Hard Drive Compliance Downtime Virtualization Managed Service Halloween Vulnerabilities Statistics Alert Connectivity Cybercrime HIPAA Server Management End of Support Superfish Geography Disaster Resistance Communication Innovation Augmented Reality Business Management Privacy Unified Communications Business Owner Healthcare Documents Sync Social Microsoft Excel Typing Phishing Database Refrigeration Windows Operating System VoIP Google The Internet of Things Automation Black Market Favorites Unified Threat Management RMM Professional Services Google Calendar Procurement Law Enforcement Sports Writing Mobile Devices Productivity Websites Identities Network Management Cache Security Gmail Recycling Apps Microsoft Cyberattacks Backup IBM Training Email GPS Disaster Identity Theft Network Users Undo Cabling Risk Management Fleet Tracking Legislation Saving Money Backup and Disaster Recovery Zero-Day Threat Safety

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...