Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.
November, 2017
Switch to calendar view

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Gmail Save Time Hosted Solution Customer Service Cables Wireless Technology Specifications Virtual Assistant Fun Wasting Time Backup and Disaster Recovery Work/Life Balance Buisness Authorization Encryption ROI Access Control Meetings Business Intelligence Cookies Webcam Bring Your Own Device Budget Tech Support Mobile Devices Identity Superfish Telephone Systems Google Maps Cloud Computing 5G Mobility Help Desk Fleet Tracking Going Green Database Twitter Sync Social Cybersecurity Virtual Reality Application Holiday USB Automation Notifications Project Management Health Spyware Read Only Unified Threat Management Modem Hackers Environment Private Cloud Hard Drive Nanotechnology Facebook Infrastructure Comparison Computer Star Wars Vulnerabilities Mail Merge Communication Business Continuity iPhone Spam The Internet of Things Best Practice Office 365 Server Travel Document Management Social Media Management Supercomputer Break Fix Mobile Asset Tracking Computer Repair Redundancy Managed Service Computers IoT Monitors Touchscreen Government Computing Taxes Quick Tips IT Budget Shortcut Google Calendar Saving Time WannaCry Lithium-ion Battery Permission Disaster Recovery Data Management Bandwidth Chrome Dark Web Administration Outlook Employees Network Retail Processors Remote Workers Hacker Digital Signature Black Friday Conferencing IT Support Domains Assessment Compliance Antivirus Law Enforcement Save Money Disaster Resistance IT Consulting Tech Term Analytics Cyberattacks Collaboration Google Drive Ransomware App Hotspot Backup Net Neutrality Business Management Fraud Office Tips Printing Mirgation Proactive IT Physical Security Word Smartphones Remote Monitoring File Sharing Vendor Management Computer Care Software as a Service Computing Infrastructure Router Bitcoin Security Cameras Efficiency Android Cleaning Downloads Hardware Wireless Politics Flexibility eWaste Wi-Fi Finance Business Computing OneNote Employee-Employer Relationship Business Growth Competition Screen Reader Downtime Alt Codes Recovery Wearable Technology Storage Training Permissions 3D Printing Internet of Things Financial Identities Innovation Malware Windows 10 Browser Business Owner Bookmarks End of Support Deep Learning PDF BYOD Managed Service Provider Statistics Vulnerability Backups Outsourced IT Mobile Office Network Management Refrigeration Human Error Entrepreneur Connectivity Address Identity Theft Geography Managed Services Provider Apps Applications Display Data Backup Unified Threat Management Network Congestion Web Server Sports Crowdsourcing Test Data Hacking Intranet Disaster Alert Bluetooth Heating/Cooling Gadget Internet Exlporer Smart Technology Big Data Professional Services CIO VoIP Operations Machine Learning Google Wallet Two-factor Authentication Employer-Employee Relationship Legislation Cache Office Motherboard SharePoint Phishing Scam IT Support IT service Time Management Corporate Profile Humor Managing Stress Upgrade Solid State Drive Tech Terms Education Typing Running Cable History Small Business Cost Management HIPAA Tip of the Week Social Engineering Windows 8 Managed IT Services Authentication Mobile Data Data loss IT Technicians Customer Relationship Management Samsung Privacy Multi-Factor Security Error Laptop Personal Information Company Culture Drones Blockchain Cooperation Technology Digital Payment Data Breach Hosted Solutions Windows 7 Staff Troubleshooting Mouse Marketing Data Recovery Current Events Artificial Intelligence Automobile Server Management Motion Sickness Users IT solutions Proactive Uninterrupted Power Supply Security Safety YouTube Managed IT Google Docs Tracking Printer Technology Tips Electronic Health Records IBM Theft Cabling Gadgets Password Analyitcs How To Remote Monitoring and Management Network Security SaaS Mobile Computing Smart Tech Information How To Money Workplace Tips Data storage Licensing High-Speed Internet Tip of the week Data Security Cyber Monday G Suite Consultation Staffing Google Monitoring Paperless Office Presentation Windows 10 Patch Management Virus Zero-Day Threat IT Management Microsoft Excel PowerPoint Procurement Dark Data Tablet Hard Disk Drive Hacks Settings Data Warehousing Piracy BDR Black Market Virtualization Techology Writing Mobile Device Managment Servers Upgrades Productivity Websites Firefox Cortana Chatbots Botnet User Notes Software Tips Microsoft Office Smartphone Digital Virtual Desktop Virtual Private Network Halloween Remote Computing MSP Unsupported Software Information Technology Hiring/Firing Miscellaneous Technology Laws Windows CCTV Enterprise Resource Planning WiFi Content Filtering Healthcare Language Software Co-managed IT Files Email Enterprise Content Management Business Networking Emoji WPA3 Scary Stories Cameras Maintenance Mobile Security Relocation Unified Communications Chromebook Experience Managed IT Service Operating System Distributed Denial of Service Saving Money Trending Favorites Website Documents VoIP Point of Sale Apple Risk Management Public Cloud Programming Best Practices Avoiding Downtime IT Consultant Robot Cybercrime User Error Microsoft Consumers Social Networking Firewall Update Productivity Cryptocurrency Voice over Internet Protocol Legal Business Technology Remote Worker Telephony Development Cloud Public Speaking GPS Recycling Migration LiFi Alerts IP Address Undo communications Regulations Managed IT services Wires E-Commerce Knowledge Mobile Device Search Phone System Consulting Lenovo Features VPN Internet Augmented Reality Electronic Medical Records RMM Utility Computing Administrator Passwords Instant Messaging IT Services Hard Drives Mobile Device Management User Tips

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...