Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Social Managing Stress Remote Monitoring and Management Android IT Consulting Workplace Tips Remote Computing Applications Wireless Physical Security Net Neutrality Content Filtering Cleaning Drones Cache Time Management Programming Email Mobility Hiring/Firing Office Health Save Money Cloud Travel Spyware Nanotechnology Apps Money GPS Hotspot Black Market Virtualization Consultation Licensing Unsupported Software Notifications Wearable Technology WiFi Upgrade Cloud Computing Best Practices Botnet ROI Presentation Tech Terms Password Apple Analytics Tracking Disaster Resistance Specifications Social Media Bandwidth Tip of the Week Gadgets Privacy Mobile Security CCTV Update Managed Service Provider Virtual Private Network Paperless Office Backup and Disaster Recovery Mobile Device Intranet Virtual Reality communications Network Chrome Server Maintenance Permissions Word Tech Support Fun Data Recovery Administration Redundancy Proactive IT Disaster Recovery The Internet of Things Sync Wires Two-factor Authentication Favorites Employee-Employer Relationship Voice over Internet Protocol Knowledge Relocation Ransomware IT Support Employer-Employee Relationship Comparison Smartphone CIO Saving Money Undo Computer Care WannaCry Computers Staff Infrastructure 3D Printing Cameras Microsoft Office Electronic Health Records Document Management Dark Data Save Time Windows 8 Router BYOD MSP Flexibility Web Server Server Management Buisness Instant Messaging Communication Training Work/Life Balance Mobile Devices Alerts Data Warehousing Efficiency Telephony Data loss Going Green Emoji User Error Cables Holiday Computing RMM Storage Firefox IP Address Zero-Day Threat Technology Tips Management Fleet Tracking Smart Technology Motherboard Internet of Things Firewall Backups Development Bitcoin eWaste Business Managed IT services Mobile Marketing WPA3 Healthcare Bluetooth Identities iPhone Operating System Windows 10 Utility Computing Webcam Hard Drives Remote Worker Display Business Owner LiFi Authentication Alt Codes Risk Management Outsourced IT Data Data Management Private Cloud Business Intelligence How To Alert VoIP Saving Time User IT Services Humor Wasting Time Google Maps Chromebook Features Wireless Technology IT service Read Only Multi-Factor Security Education Lenovo Solid State Drive Cybercrime Backup Supercomputer Star Wars Consulting Test Virus Operations Microsoft Excel Conferencing Dark Web Cyberattacks Database Business Continuity How To Managed IT Chatbots Outlook Cortana Monitors Downtime Computer Help Desk Virtual Assistant Connectivity Running Cable Scary Stories Recovery YouTube Shortcut G Suite Employees Heating/Cooling PDF Artificial Intelligence 5G Tip of the week Mobile Computing Antivirus Security Current Events Customer Service Processors Trending Budget Encryption Software History Electronic Medical Records Troubleshooting Company Culture Point of Sale Scam Remote Workers Network Management Cooperation Public Cloud Data storage Screen Reader Experience Users Network Congestion Law Enforcement Writing Hard Drive Entrepreneur Information Technology Environment Mirgation Tech Term Google Docs E-Commerce Sports Procurement Software Tips Politics Big Data Upgrades Data Backup Office Tips Cookies Disaster Quick Tips Robot Motion Sickness Administrator Analyitcs Break Fix Digital Signature Hacker Government Language Business Growth Superfish Digital Documents Customer Relationship Management Managed IT Service Corporate Profile Black Friday Unified Threat Management Google Drive Digital Payment Mobile Device Management Taxes Small Business Mobile Data Legal Managed IT Services Automation Computing Infrastructure App Mouse Enterprise Resource Planning Software as a Service Distributed Denial of Service Meetings Google Wallet Unified Communications USB Geography Search Gadget Best Practice Modem Network Security User Tips Cryptocurrency Authorization SharePoint Professional Services VoIP Public Speaking Uninterrupted Power Supply Consumers Safety Recycling Cybersecurity Financial Hackers Information Proactive Blockchain Notes Gmail Lithium-ion Battery Staffing Hosted Solutions Touchscreen Identity Smart Tech Co-managed IT Managed Service Permission Business Technology Google Calendar Innovation Technology Laws Human Error Legislation Phishing Data Security Files Cyber Monday Migration Typing Halloween Personal Information Finance IT Support IT Consultant Access Control Cost Management Fraud Hacking Bring Your Own Device Project Management Printer Windows 7 Augmented Reality File Sharing HIPAA Miscellaneous Internet Exlporer Regulations Settings SaaS Wi-Fi Deep Learning Computer Repair Hosted Solution Downloads Data Breach Vendor Management Telephone Systems Mobile Office IoT Managed Services Provider Vulnerability Smartphones PowerPoint Servers Avoiding Downtime Tablet Samsung Theft IT Management Hard Disk Drive Facebook Windows 10 Printing Domains Spam Crowdsourcing Website Passwords Identity Theft Assessment High-Speed Internet IT Budget Microsoft Piracy Mobile Device Managment Internet Social Engineering IBM Application VPN Machine Learning Asset Tracking Security Cameras IT Technicians Unified Threat Management Patch Management Google OneNote Twitter Remote Monitoring Retail Virtual Desktop Business Computing Address Phone System Productivity Business Management Social Networking BDR Error Competition Refrigeration Hardware Technology Statistics Office 365 Monitoring IT solutions Collaboration Laptop Hacks Websites Productivity Compliance Networking Bookmarks Malware Techology Automobile Browser Windows Enterprise Content Management Cabling Mail Merge End of Support Vulnerabilities

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...