Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.
October, 2018
Switch to calendar view

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Access Control Users Black Market Saving Time Finance Disaster Resistance Document Management Law Enforcement SharePoint Tip of the Week Virtualization Augmented Reality Financial Digital Signature Managed Service Provider Supercomputer Small Business User Error Software Tips Gadgets Mobility Mouse Statistics Google Docs User Smartphone Saving Money Hosted Solution Microsoft Windows 7 Security OneNote Unified Threat Management LiFi Regulations Apple Disaster Recovery MSP Managed Service Two-factor Authentication Hiring/Firing Remote Worker Internet Trending Virtual Assistant Upgrade Star Wars Samsung BDR Spam Voice over Internet Protocol Shortcut Backup Lithium-ion Battery Downtime Avoiding Downtime Microsoft Excel Upgrades Data loss Cables Environment Connectivity Cyberattacks Business Growth Data Backup Scary Stories Mobile Virtual Reality Business Management Information Computer Motherboard Digital Migration Intranet Windows 10 Browser G Suite Chromebook SaaS Experience IT Technicians Google Calendar Digital Payment Personal Information Computer Repair Authorization VoIP Social Data Security Phone System Hotspot Printing Automation Tablet Google Drive Health Mobile Data Botnet Cabling Heating/Cooling Windows Lenovo Facebook Proactive IT Typing Cryptocurrency Computing Infrastructure YouTube Artificial Intelligence iPhone Time Management Web Server Remote Computing Customer Service Server Zero-Day Threat Gmail Google Maps Electronic Health Records Crowdsourcing Internet of Things Proactive Enterprise Resource Planning RMM Multi-Factor Security Application File Sharing PDF Licensing Storage Cookies Staffing Content Filtering Conferencing Search Alerts Meetings Managed Services Provider E-Commerce Legislation Social Networking Domains Compliance Superfish Hard Disk Drive Managed IT services Server Management USB Blockchain Comparison Windows 8 Safety Social Engineering Wireless Technology Privacy Software as a Service Display End of Support Mirgation Computers Read Only IT Management IT Budget Business Technology Documents Deep Learning Business Computing Network Congestion Favorites Dark Web Features Tip of the week Business Intelligence Staff Cost Management Cybersecurity Recovery Techology Employer-Employee Relationship App Bookmarks Wasting Time Smartphones High-Speed Internet Fraud Malware User Tips Travel Wires Nanotechnology Paperless Office GPS Office Tips Infrastructure IP Address Router Office Microsoft Office Drones Cache Unified Threat Management Uninterrupted Power Supply Hosted Solutions Fleet Tracking Best Practices Outlook Procurement Administration IT service Humor Hackers Cloud Computing IT Consulting Data Management Software Running Cable Notes Tech Terms Money Efficiency Corporate Profile How To Professional Services Cameras Bring Your Own Device Address Asset Tracking Private Cloud Project Management Business Continuity Language Management Update Managed IT Services Hacking HIPAA Cleaning IT Support Google Wallet Taxes Managing Stress Machine Learning ROI How To Mobile Security Refrigeration Communication Save Time Undo Business Managed IT Maintenance Modem Human Error Utility Computing Hard Drives Remote Workers Collaboration Consumers CCTV Knowledge Mobile Computing Relocation Chrome Data Training Virtual Desktop Legal Patch Management Monitoring Android Operating System Servers Firewall Analyitcs Laptop Printer Hardware Emoji Firefox Mail Merge Employees BYOD Touchscreen Business Owner Data Recovery Telephony Productivity Government Public Cloud Apps Wireless Vendor Management Physical Security Virus Tech Term Automobile Dark Data Virtual Private Network IT solutions Hacker Troubleshooting Cybercrime Social Media Robot Cooperation Specifications Notifications Big Data Network Security Technology Unsupported Software Writing Innovation Development Presentation Competition Programming Redundancy Email Smart Tech Sync Smart Technology Outsourced IT Mobile Device Management WiFi Word Analytics Error Identity 5G Enterprise Content Management Consultation Identities Antivirus Identity Theft VoIP IBM Consulting Instant Messaging Operations Hard Drive Retail Co-managed IT Healthcare Mobile Devices Permission eWaste Break Fix Vulnerability Administrator Computing Risk Management Going Green History Wearable Technology Applications Telephone Systems Downloads Sports Settings Theft 3D Printing Technology Tips Hacks Monitors Recycling Politics Public Speaking Distributed Denial of Service Entrepreneur Vulnerabilities Twitter Alert Bluetooth Assessment Test Education Quick Tips Piracy IT Support Managed IT Service Motion Sickness Scam Network Website Work/Life Balance Permissions Networking Best Practice Point of Sale Mobile Office Solid State Drive Data Warehousing Black Friday Productivity Processors Phishing Buisness Remote Monitoring and Management Data Breach The Internet of Things Files Cyber Monday Internet Exlporer Help Desk Information Technology Geography Customer Relationship Management Unified Communications Workplace Tips Alt Codes Webcam Marketing Authentication VPN IT Consultant IT Services communications Office 365 Spyware Mobile Device Halloween Network Management Electronic Medical Records Gadget Miscellaneous Bandwidth Bitcoin Backup and Disaster Recovery Encryption PowerPoint Fun Cloud Cortana Flexibility Windows 10 Mobile Device Managment WPA3 Net Neutrality Employee-Employer Relationship Disaster Security Cameras Company Culture Ransomware CIO Google Wi-Fi Holiday Current Events Data storage Computer Care Database Tech Support Budget Password Tracking IoT Remote Monitoring Websites Backups Save Money Chatbots Passwords Screen Reader Technology Laws WannaCry

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...