Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

How To Writing Password WPA3 Social Saving Time Mobile Office Shortcut BDR Multi-Factor Security Bookmarks Facebook Voice over Internet Protocol Save Time Remote Monitoring Mirgation Travel Test Entrepreneur Cost Management High-Speed Internet Security Uninterrupted Power Supply Productivity Administrator Save Money Network Passwords Notes Cortana IT Technicians Outlook Undo Identity Conferencing Tech Support Running Cable Work/Life Balance Meetings Connectivity Mobile Devices communications Notifications Identity Theft IT Support Public Cloud Retail Employee-Employer Relationship Update Hard Disk Drive Email Digital Payment Maintenance Utility Computing Comparison Permissions Managed Service Hackers Collaboration Consultation Network Congestion PDF Remote Monitoring and Management Data Security Environment Technology Tips Efficiency Webcam Access Control Telephone Systems Unified Threat Management Healthcare IT Services Presentation Taxes Enterprise Content Management Financial Geography Settings IT Consultant Server Management Mobility Windows 10 Experience Security Cameras Chromebook Unified Communications Emoji Compliance Cyber Monday Public Speaking Employees Wireless Technology Workplace Tips History Sync Analytics Address Corporate Profile Operations Paperless Office Website Recovery Language IP Address Communication Alt Codes Business Continuity Dark Data Solid State Drive Consulting Instant Messaging Troubleshooting Motherboard Digital Signature Current Events Relocation Outsourced IT Disaster Black Market Virtual Private Network User Error GPS Microsoft Office E-Commerce Apple Vendor Management Remote Computing IBM Wearable Technology Computing Software Proactive IT Lenovo Managed IT Service Employer-Employee Relationship Search Drones Android User Redundancy Remote Workers Smartphones Privacy User Tips Authorization Wi-Fi Business Computing Business Intelligence Samsung Hosted Solution Touchscreen Malware Time Management Training Database Operating System Blockchain Display Hacker Customer Service Websites Heating/Cooling Software as a Service Modem Money Upgrade Data Backup Cabling Asset Tracking Hosted Solutions Network Security Legal CIO Knowledge Black Friday Social Engineering Hiring/Firing Social Media BYOD Superfish Application Patch Management Office Tips Nanotechnology How To Legislation Avoiding Downtime Software Tips Smart Technology Procurement Piracy Company Culture Cybercrime Fraud Business Growth Technology Laws YouTube Data Spyware Analyitcs Vulnerabilities IT Consulting Tip of the week Processors IT Support Error IT Management Two-factor Authentication Saving Money Migration HIPAA Phone System Automobile Quick Tips Crowdsourcing Typing Managed IT Services eWaste Cleaning 5G Internet of Things Fleet Tracking Twitter Google Mouse Hacking Scam End of Support Domains Apps Google Calendar Document Management Development Sports Zero-Day Threat Hard Drives Word VPN Information Electronic Health Records Electronic Medical Records Artificial Intelligence Internet Net Neutrality Mobile Device Managment USB Bandwidth Best Practice Cameras Consumers Finance Professional Services Networking IoT Theft Antivirus Computer Repair App Productivity Downloads Microsoft Excel Google Docs Office Help Desk Hardware Enterprise Resource Planning Managed IT services iPhone Humor Google Maps 3D Printing Google Wallet Cooperation Innovation WannaCry Backup and Disaster Recovery Proactive Budget WiFi Phishing Windows 8 Router Infrastructure Mobile Security Business Smart Tech Robot Mail Merge Content Filtering Staff Data Recovery Browser Hotspot Read Only Politics Encryption Programming RMM Data Management Documents Buisness Regulations Competition Human Error Computers Statistics Chrome Alert Bitcoin Physical Security MSP Management Data loss Miscellaneous Permission Unsupported Software Social Networking Upgrades Server Windows Fun Private Cloud Laptop Business Management Refrigeration Trending Technology Cyberattacks File Sharing Assessment Cloud Backup Gadget Features Monitoring Personal Information IT Budget Deep Learning VoIP Smartphone Identities Virtual Assistant Wasting Time Backups Mobile Device Users Disaster Resistance Mobile Data Virtual Reality Virus Safety Windows 10 Managed Services Provider Authentication Cloud Computing Flexibility SaaS Digital Holiday IT solutions Files Microsoft Small Business Tip of the Week Ransomware Cables Web Server Dark Web LiFi Virtualization Data Breach IT service Office 365 Administration Bring Your Own Device Health Tech Term Telephony Cryptocurrency Tablet Windows 7 Alerts Tech Terms Screen Reader Lithium-ion Battery Data Warehousing Downtime OneNote Hard Drive Disaster Recovery Applications G Suite Break Fix Halloween Mobile Information Technology Marketing Distributed Denial of Service Cookies Wireless Best Practices VoIP Computer Star Wars Servers Favorites Customer Relationship Management Supercomputer Wires Co-managed IT Botnet Google Drive The Internet of Things Firewall Motion Sickness Computer Care Scary Stories Data storage Firefox Education Mobile Device Management Licensing SharePoint Business Owner Automation Machine Learning Printing PowerPoint Mobile Computing Printer Cybersecurity Chatbots Network Management Staffing Virtual Desktop Tracking Managed Service Provider Law Enforcement Big Data Managing Stress Government Business Technology Hacks Intranet Vulnerability Specifications CCTV Augmented Reality Spam Going Green Monitors Internet Exlporer Managed IT Point of Sale Computing Infrastructure ROI Risk Management Gadgets Gmail Techology Project Management Storage Recycling Bluetooth Cache Remote Worker Unified Threat Management

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...