Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Hosted Solution Gadgets Remote Monitoring and Management User E-Commerce Digital Payment Smart Technology Bring Your Own Device Telephony Bookmarks Distributed Denial of Service Break Fix Bandwidth Cables Drones GPS Network Congestion Business Technology Cloud Computing Downloads Phone System IT Consulting Downtime Motherboard Quick Tips Network Presentation Sync Fleet Tracking Alerts Government 5G Firefox Hacks Data Software as a Service Tracking Law Enforcement VPN Nanotechnology Company Culture Error Applications Social Networking Mobile Devices Managed IT Hosted Solutions Office 365 Email Encryption Read Only Electronic Medical Records Employees High-Speed Internet Ransomware Analyitcs Hard Drives Mobile Device Management Botnet Business Growth Content Filtering Superfish Sports Wi-Fi Technology Laws Environment Personal Information Phishing WannaCry Remote Monitoring Cabling Mobile Office Paperless Office Website Small Business VoIP Data Breach Passwords Business Websites Samsung Supercomputer Hiring/Firing Business Owner Twitter Alt Codes Public Cloud Analytics Apple IT Services Data storage Cryptocurrency Disaster Recovery Google Docs Favorites Procurement Tip of the Week Data Backup Google Calendar Security Cameras Saving Time Microsoft Office Scam Identity Theft Computing Infrastructure Mobile Computing Financial Disaster Corporate Profile Technology Tips Fraud Security Enterprise Resource Planning Software CCTV Database Point of Sale MSP HIPAA Managing Stress How To Lithium-ion Battery Cookies Data Management Access Control Business Computing Lenovo Data Security Smartphone Software Tips Two-factor Authentication Hotspot Computers Maintenance Risk Management Notes Mobile Security Mouse Assessment Social Users Mobile Device Update Innovation Scary Stories Data Warehousing G Suite Unified Communications Social Engineering Office Internet Zero-Day Threat Mail Merge PDF Politics Marketing Language Consulting Office Tips User Error Project Management Upgrade Malware Permissions Technology Automation Motion Sickness Cache Upgrades Windows 10 Meetings Antivirus Display Virtualization Data Recovery Hard Disk Drive PowerPoint Cybersecurity Windows 10 Cybercrime Storage Troubleshooting OneNote Conferencing Current Events IBM Money Vulnerabilities IT Management Apps Network Management App Collaboration Time Management Human Error File Sharing Tech Terms Administration Internet Exlporer WiFi Gmail Identity Refrigeration Emoji Customer Relationship Management Printing Dark Web Best Practices BDR Settings Communication Disaster Resistance Help Desk Consumers Fun VoIP Managed IT services Shortcut Business Intelligence Cleaning Crowdsourcing Privacy Outsourced IT Infrastructure Workplace Tips Servers Managed Services Provider Search Vulnerability Finance Cooperation Humor Budget IT Technicians Hacker Alert Virtual Private Network Notifications Augmented Reality Wires Microsoft LiFi Retail Business Continuity Work/Life Balance How To Typing Wasting Time Mirgation Deep Learning Remote Computing Printer Virus Bitcoin Licensing Backups YouTube Gadget Hackers Private Cloud Travel Business Management BYOD Windows Outlook Server Management IT Consultant Hacking Administrator Tip of the week Computer Legal Blockchain Virtual Reality Managed Service Provider Backup Solid State Drive Dark Data Legislation Modem Tablet Word Unified Threat Management Virtual Desktop Entrepreneur Networking Google Managed IT Service Recovery Features Managed Service Trending SharePoint Regulations Files Undo Flexibility Efficiency Healthcare Microsoft Excel Chatbots IT solutions Comparison Computing Piracy Black Friday Specifications Network Security Redundancy Statistics Physical Security Authorization Computer Repair Development Consultation Digital Techology Customer Service Chrome Theft Proactive IT Digital Signature Facebook Cyberattacks Cortana Remote Worker Machine Learning Virtual Assistant Wearable Technology Unsupported Software Productivity Going Green Health Relocation Voice over Internet Protocol Star Wars Public Speaking Recycling Knowledge Mobile IoT Training Document Management Running Cable Telephone Systems Wireless Smartphones History IT Support Smart Tech communications Avoiding Downtime Managed IT Services Writing Internet of Things Staffing Wireless Technology USB Operations Cameras Data loss Connectivity Employee-Employer Relationship Multi-Factor Security Competition Windows 7 Co-managed IT Cost Management Save Money Identities Screen Reader Unified Threat Management Buisness iPhone Electronic Health Records WPA3 Holiday Computer Care Compliance Bluetooth Tech Support Safety Operating System Geography Experience Uninterrupted Power Supply Instant Messaging Remote Workers Mobile Data Backup and Disaster Recovery Employer-Employee Relationship Permission IT Support Monitoring Browser Cyber Monday eWaste Utility Computing Cloud Spyware Proactive Asset Tracking ROI Social Media Touchscreen Chromebook End of Support Information Technology Application Processors Automobile Web Server User Tips Halloween Google Maps Enterprise Content Management Programming Google Drive Education Router Vendor Management Net Neutrality Management Server Firewall Best Practice CIO Test Authentication IT service Address Google Wallet IT Budget Information Patch Management Save Time Password 3D Printing Intranet Monitors Professional Services Domains The Internet of Things Miscellaneous Spam Windows 8 Documents Android Laptop Migration Mobile Device Managment Productivity Artificial Intelligence Saving Money Big Data Mobility Taxes Webcam Hard Drive Tech Term SaaS RMM Robot Heating/Cooling Hardware Black Market IP Address Staff

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...