Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Motherboard Notifications Network Virtualization Scary Stories Printer Screen Reader Database Virtual Assistant Browser Identities Business Management E-Commerce Star Wars Computer Repair Staff Computing Infrastructure Competition Finance Mail Merge Digital Innovation Black Market Managed IT services Consumers Computer Care Conferencing Public Cloud WannaCry Botnet Taxes Halloween Tech Terms Downtime Social Voice over Internet Protocol Help Desk Chromebook Government Apps Encryption Lithium-ion Battery Cameras Going Green Alerts Chatbots Downloads OneNote Mobile Devices Applications Google Calendar Vendor Management Networking Google Wallet Password Android Shortcut Data Address Travel Robot Features Network Security Tip of the Week Cost Management Windows 8 Documents Customer Service Redundancy Blockchain Cryptocurrency Hiring/Firing Disaster Resistance Windows 7 BDR Zero-Day Threat Smart Technology Safety Scam Data Warehousing Google Budget Troubleshooting Internet Exlporer Website Phishing Dark Web Running Cable Experience Workplace Tips Virtual Reality Proactive Healthcare Servers Cyber Monday Efficiency Remote Monitoring and Management Internet Bookmarks Ransomware Cloud Computing Computing Statistics Fleet Tracking Relocation Recovery Motion Sickness Authorization Mouse WiFi Notes IT Support Administrator Uninterrupted Power Supply Hosted Solution Google Drive Microsoft Crowdsourcing BYOD Remote Worker Co-managed IT Collaboration SharePoint Monitors Monitoring Office Artificial Intelligence Environment Network Management Printing Hosted Solutions Sync Content Filtering Remote Monitoring Personal Information IT Budget Presentation Productivity Holiday Tip of the week Websites Mobile Computing Data Backup The Internet of Things User Tips IT Consulting Vulnerability Unsupported Software Phone System Development Utility Computing Domains Favorites Hacks Virus Bitcoin SaaS File Sharing Two-factor Authentication Business Techology Network Congestion Spyware Server Management Wireless Technology Money ROI Microsoft Excel Supercomputer Solid State Drive Management Project Management Operations Search CCTV Webcam How To Apple 3D Printing Technology Laws Mobile Data Router Smartphone Business Computing Office Tips Cortana Dark Data Cabling Software as a Service Managed IT Service Identity Theft Outsourced IT Sports Business Intelligence IoT Human Error Mobile Device Management Typing Hard Drives Business Growth Managed IT Automation Writing Humor Disaster Small Business Employees Internet of Things Mobile Miscellaneous Backups Retail Backup and Disaster Recovery Employee-Employer Relationship Managed IT Services Drones Business Owner Storage Spam How To Mobility RMM Twitter Social Networking Fun Geography Cloud Processors Data Management Nanotechnology Entrepreneur USB Managed Services Provider Data loss Software Gmail VoIP Time Management Cyberattacks Passwords Best Practice Data Security Patch Management Procurement Proactive IT IT Management Unified Threat Management Chrome PowerPoint Multi-Factor Security Cache VoIP Hardware Google Maps Technology IT Services Gadget Error Identity Public Speaking Files Data Recovery User Error Cooperation Training 5G Facebook G Suite IP Address Bandwidth YouTube Hard Disk Drive Windows 10 Permission Wireless Communication Social Engineering Augmented Reality Analytics Fraud Unified Communications Refrigeration HIPAA Backup Users Instant Messaging IT service Tech Support IBM Education Legislation Business Continuity Migration Smart Tech Save Money Work/Life Balance Authentication Test IT Technicians Information Windows 10 Google Docs Outlook Distributed Denial of Service Recycling Financial Mobile Device Managment Firefox Computer Security Meetings Consultation Information Technology Theft Upgrades Data Breach Cybercrime Enterprise Resource Planning Wires Analyitcs Assessment Politics Professional Services Server Upgrade Customer Relationship Management User Big Data Virtual Private Network CIO Language Operating System Law Enforcement Digital Signature communications Tracking Programming WPA3 Paperless Office Settings Staffing Word Touchscreen Wasting Time Superfish Hard Drive Cleaning Software Tips Smartphones Wearable Technology Hotspot End of Support Avoiding Downtime PDF Maintenance Electronic Health Records Digital Payment Web Server Risk Management IT solutions Net Neutrality Document Management Vulnerabilities Update Managed Service Provider Save Time Managing Stress Windows Saving Money Read Only Virtual Desktop Corporate Profile Quick Tips Microsoft Office Hacking Social Media History Employer-Employee Relationship Knowledge Administration Gadgets Wi-Fi Tech Term Samsung Mobile Office Emoji Company Culture High-Speed Internet IT Consultant Productivity VPN Privacy Firewall Health Alt Codes Consulting Cookies Modem Mobile Security Specifications Compliance Electronic Medical Records App Regulations Intranet Office 365 Black Friday Best Practices Remote Computing Access Control Private Cloud Application Antivirus Remote Workers Permissions Flexibility Deep Learning Comparison Technology Tips Machine Learning Connectivity iPhone Mobile Device Managed Service Hackers Enterprise Content Management Tablet Buisness Laptop Asset Tracking Trending Saving Time Bluetooth Lenovo Bring Your Own Device Physical Security Security Cameras Legal LiFi Display Infrastructure Current Events Point of Sale Break Fix Hacker Business Technology eWaste MSP GPS Email Cybersecurity Marketing Unified Threat Management Telephone Systems Piracy Computers Licensing Automobile Alert Cables Disaster Recovery Heating/Cooling Undo Data storage Telephony Mirgation Malware IT Support

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...