Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Write Your Own Success Story - Improve Your Technology!

Write Your Own Success Story - Improve Your Technology!

How SMBs can write their own success stories by improving their technology engagements oal.lu/123s1 

Continue reading

What Exactly Do We Mean by “Managed” Services?

What Exactly Do We Mean by “Managed” Services?

Managed services - what are they? The short answer, other people managing the IT systems that you rely on every day to be productive and accomplish your tasks. In essence, they are a freedom from dealing with the troublesome and time-consuming parts of leveraging technology. You may have heard this much about managed services before, but have never been given a deeper understanding of what they entail. That is precisely what we aim to accomplish below.

Continue reading
0 Comments

Solid Vendor Management Leads To Solid Successes

Solid Vendor Management Leads To Solid Successes

In order to function properly, any business will need to procure certain pieces of equipment. Some of this equipment will be specialized to the business’ purpose, while some will be the sort that may be more commonly found in offices everywhere. This equipment must be procured from somewhere, and this is where vendors come in--but who in your organization is responsible for your vendor management?

Continue reading
0 Comments

Why Multi-Factor Authentication is Way Better Than Passwords

Why Multi-Factor Authentication is Way Better Than Passwords

Time hasn’t been kind to the password. It’s continuously put down as one of the least secure methods of protecting systems. It’s not due to any fault of the password, though. People just have a hard time remembering long and complex passwords. To aid in security, it’s recommended that you use some sort of multi-factor authentication. While some users prefer easy SMS message two-factor authentication, there are actually many different types of multi-factor authentication available.

Continue reading
0 Comments

Welcome Nick Gaydos to the Team

b2ap3_thumbnail_Untitled.pngMy IT experience begins with the peak of curiosity during my childhood. I can recall my father bringing worn and derelict computers home for us to use. Over time, these computers would start having problems that was beyond my father’s skill level to fix. So, I embraced the opportunity to take them apart and dig around in them to get a sense of how things work inside a computer. As I grew older, I expanded on curiosity and made it into my hobby. I would soon have quite a few people contacting me for computer support and repair. After high school, I soon decided that I wanted to make IT my career. I enrolled into a program at Lincoln Technical Institute, obtained two certifications, completed an internship, and aided on a business startup all within a single year. I am excited to see where the path of life will lead me next!

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Heating/Cooling Scam Phishing Business Management Undo Update Analytics Distributed Denial of Service Running Cable Cabling Software Computing Knowledge Multi-Factor Security Virtual Assistant Bring Your Own Device Alt Codes Business Technology Communication Public Cloud Office Tips Twitter Cache Data Recovery Network Management Business Computing How To Best Practice Data Backup Humor Website Hacking LiFi Retail Bandwidth Tracking Virtualization Unified Threat Management BYOD Shortcut Big Data Authorization Bluetooth Hosted Solution Law Enforcement Smart Tech Wi-Fi Users RMM iPhone Avoiding Downtime Business Continuity Monitoring Miscellaneous Staff Consultation Unified Communications Mail Merge Social Networking Error Test Remote Monitoring and Management Drones Electronic Health Records Proactive IT Time Management Voice over Internet Protocol Managed IT services Risk Management Social Engineering IT Services Sports Consumers Lithium-ion Battery Application Writing High-Speed Internet Gadgets Crowdsourcing Procurement Information Managed IT Service IT Support Data storage Vulnerabilities Computers Google Drive Backup and Disaster Recovery Tablet Legislation Saving Time Identity IBM Employer-Employee Relationship Financial Employees CIO Environment Black Market Mobile Security VoIP Hackers Hotspot IT solutions Efficiency Employee-Employer Relationship Virtual Reality Superfish Samsung Backup Personal Information Touchscreen Data Warehousing Tip of the week Apps Cortana Blockchain Tech Term Network Congestion Saving Money CCTV Recovery Education Tip of the Week Virtual Desktop Modem Smart Technology Server Management Windows 10 Automobile Refrigeration Zero-Day Threat Two-factor Authentication Wireless Technology User Tips Malware Physical Security Computer Cryptocurrency Office 365 Cybersecurity IT Consultant Fun Maintenance Work/Life Balance Mobile Data Security Cameras Smartphone Cloud Computing Data Breach Save Money Technology Google Docs Microsoft Excel Ransomware Data Security VoIP Gmail Cameras Business Owner Patch Management Machine Learning Hacks Fleet Tracking Mobile Computing Managed Service Provider Migration Backups Operating System Holiday Computer Repair WannaCry Database Competition Corporate Profile Password Internet SaaS Disaster Resistance Technology Tips Authentication IT Consulting Telephone Systems Printer Artificial Intelligence Proactive Motherboard Presentation Read Only Storage Project Management Managed Service Domains Content Filtering Hosted Solutions Computer Care Point of Sale Vendor Management Spyware Document Management Data Address Managing Stress Save Time Augmented Reality Hardware File Sharing Monitors Robot Google Applications Company Culture Encryption Administration Recycling Alerts Documents G Suite Google Maps Professional Services Marketing Data Management VPN User Wasting Time PowerPoint E-Commerce Email Unified Threat Management Notes Utility Computing Botnet Microsoft Mobility Features Cleaning Antivirus Notifications Mobile Device Management Cloud Comparison The Internet of Things Google Wallet Specifications Co-managed IT Chromebook Unsupported Software Remote Monitoring Digital Signature Virtual Private Network Private Cloud Mobile Devices Permissions Language Nanotechnology End of Support Wireless Business Growth Cookies Mirgation Supercomputer Mobile Device communications Networking Favorites Politics YouTube Theft Processors Firefox Remote Workers Workplace Tips Cyberattacks Data loss Compliance Passwords Relocation Software Tips Fraud Vulnerability Social Business Intelligence Google Calendar IT service Word Browser Digital Public Speaking IT Support Firewall Apple Intranet Wires IT Budget Emoji History Windows 8 Managed IT Laptop Healthcare Technology Laws Microsoft Office Cost Management Search Current Events Screen Reader Software as a Service Meetings Dark Data Internet Exlporer Windows 7 Managed Services Provider Motion Sickness 5G Hard Drive Staffing Android Techology Internet of Things Budget Spam Identity Theft Analyitcs Customer Service Sync HIPAA Webcam Net Neutrality Experience Management Gadget Productivity Trending Entrepreneur SharePoint Human Error Telephony Smartphones Break Fix OneNote Tech Support WPA3 Downloads Going Green Wearable Technology Alert Redundancy Assessment Upgrades Licensing Electronic Medical Records 3D Printing Cables Managed IT Services Training WiFi Disaster Recovery Chrome Virus Files Conferencing Piracy Windows Cyber Monday Chatbots Travel Money Business Permission Cybercrime Buisness Administrator Security Operations Scary Stories Customer Relationship Management Phone System Office Upgrade Taxes Programming IT Management Safety Dark Web Network Geography Solid State Drive Remote Worker Infrastructure IT Technicians Hacker Collaboration Computing Infrastructure Regulations Health Consulting Hard Disk Drive IP Address Social Media PDF Asset Tracking Information Technology Server GPS Mobile Device Managment Mouse App Outsourced IT Websites Development Best Practices Star Wars Government IoT Small Business Servers Identities Troubleshooting BDR Automation Typing Bitcoin Bookmarks Enterprise Content Management Disaster Uninterrupted Power Supply Instant Messaging Lenovo Printing Enterprise Resource Planning Mobile Web Server Help Desk How To Flexibility Mobile Office Privacy Settings Productivity Digital Payment eWaste Access Control Display Connectivity Finance Quick Tips Deep Learning USB Cooperation Hard Drives Hiring/Firing MSP Downtime Windows 10 Halloween ROI Facebook Network Security Innovation Black Friday Router Outlook Remote Computing Legal User Error Paperless Office Tech Terms Statistics

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code