Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What Exactly Do We Mean by “Managed” Services?

What Exactly Do We Mean by “Managed” Services?

Managed services - what are they? The short answer, other people managing the IT systems that you rely on every day to be productive and accomplish your tasks. In essence, they are a freedom from dealing with the troublesome and time-consuming parts of leveraging technology. You may have heard this much about managed services before, but have never been given a deeper understanding of what they entail. That is precisely what we aim to accomplish below.

Continue reading
0 Comments

Solid Vendor Management Leads To Solid Successes

Solid Vendor Management Leads To Solid Successes

In order to function properly, any business will need to procure certain pieces of equipment. Some of this equipment will be specialized to the business’ purpose, while some will be the sort that may be more commonly found in offices everywhere. This equipment must be procured from somewhere, and this is where vendors come in--but who in your organization is responsible for your vendor management?

Continue reading
0 Comments

Why Multi-Factor Authentication is Way Better Than Passwords

Why Multi-Factor Authentication is Way Better Than Passwords

Time hasn’t been kind to the password. It’s continuously put down as one of the least secure methods of protecting systems. It’s not due to any fault of the password, though. People just have a hard time remembering long and complex passwords. To aid in security, it’s recommended that you use some sort of multi-factor authentication. While some users prefer easy SMS message two-factor authentication, there are actually many different types of multi-factor authentication available.

Continue reading
0 Comments

Welcome Nick Gaydos to the Team

b2ap3_thumbnail_Untitled.pngMy IT experience begins with the peak of curiosity during my childhood. I can recall my father bringing worn and derelict computers home for us to use. Over time, these computers would start having problems that was beyond my father’s skill level to fix. So, I embraced the opportunity to take them apart and dig around in them to get a sense of how things work inside a computer. As I grew older, I expanded on curiosity and made it into my hobby. I would soon have quite a few people contacting me for computer support and repair. After high school, I soon decided that I wanted to make IT my career. I enrolled into a program at Lincoln Technical Institute, obtained two certifications, completed an internship, and aided on a business startup all within a single year. I am excited to see where the path of life will lead me next!

Continue reading

5 Tips for Saving Money on your IT

b2ap3_thumbnail_save-money.jpgSaving a little on your technology can go a long ways, but cutting too many corners can lead to additional problems and expensive downtime. Here are a few ways you can cut costs without creating long term issues.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Emoji G Suite Motherboard Utility Computing Black Market Holiday Analyitcs IT Support Applications Mobility Saving Money Company Culture Artificial Intelligence Hard Disk Drive Software Tips Deep Learning Tech Terms Administrator Data storage Business Computing Networking Websites Internet of Things Computer Repair Phone System Consultation Computing Infrastructure Google Docs Experience Net Neutrality Touchscreen Word Cabling Data Security Avoiding Downtime WPA3 Redundancy Hosted Solutions Network Congestion Public Cloud High-Speed Internet communications Backup and Disaster Recovery Document Management Intranet Users Fun Patch Management BYOD Samsung Network PowerPoint Private Cloud Update Retail SaaS Healthcare IoT IT Support Nanotechnology Multi-Factor Security Cleaning Android Finance Permission Specifications BDR Wireless Technology Efficiency Favorites Health Data Management Piracy Notifications Security Remote Monitoring Gmail Undo Presentation Antivirus PDF Personal Information Search Knowledge Passwords Software Monitors Office Read Only Screen Reader Big Data USB Small Business Point of Sale Hacking Cyber Monday Managed Services Provider Information Managed IT services Printer Sync Virus 3D Printing Innovation Competition Chromebook Trending Address Business Owner History Microsoft Solid State Drive Humor Sports User Error Authentication Troubleshooting Running Cable Microsoft Excel Compliance Dark Data Telephone Systems Mobile Computing Mail Merge Managed Service Refrigeration Bluetooth Smartphone Encryption Scam File Sharing Servers Physical Security Productivity Bandwidth Saving Time Proactive IT Development Wearable Technology Vendor Management Computer Care Drones Gadget Network Management Motion Sickness Safety Hiring/Firing IT Technicians Break Fix Mobile Office Management Relocation Backups Proactive Halloween Hosted Solution Laptop Marketing Scary Stories RMM Data Breach Migration Best Practices Processors Unsupported Software Budget Unified Threat Management Tip of the Week Features Facebook Blockchain Staffing Recovery Bring Your Own Device Administration IT solutions How To Star Wars Mirgation Environment Windows 10 Tablet Mobile Device Management Backup Training Mobile Devices App Business VoIP Windows 10 Infrastructure Digital Signature Cyberattacks Hotspot Workplace Tips Gadgets Enterprise Content Management Social Engineering Cloud Computing Network Security Wires Browser Comparison Virtual Reality Data loss CCTV Time Management Remote Workers Tech Term Flexibility Tech Support Managed Service Provider Travel Mobile Device Managment Work/Life Balance Techology Google Maps Remote Worker Managing Stress Consumers Cables Instant Messaging Server Employees Licensing Buisness Display Co-managed IT Authorization Recycling Operations Disaster Recovery Website iPhone Consulting Automobile Maintenance Best Practice SharePoint Productivity Cooperation Remote Computing Employee-Employer Relationship Settings Disaster Resistance Managed IT Service Smartphones Cryptocurrency Technology Laws LiFi User Hard Drive Help Desk Spam Staff Superfish Regulations Alt Codes Vulnerabilities Supercomputer Lenovo Customer Relationship Management Email Augmented Reality User Tips Risk Management OneNote VPN Internet Malware Mouse YouTube Privacy Chrome Project Management Application Microsoft Office Test Twitter Google Calendar Writing Documents Smart Technology Firewall Save Time Asset Tracking Business Management Hacker Cost Management Programming Hardware GPS Managed IT Services Identity Theft Cybersecurity Computing Unified Threat Management Alert Technology Tips Ransomware Technology CIO Computers Apple VoIP Electronic Health Records Fraud Remote Monitoring and Management Downloads Business Growth Legal Hackers Virtual Desktop WiFi Corporate Profile Content Filtering Business Intelligence Telephony The Internet of Things Webcam Downtime Education Lithium-ion Battery Error Entrepreneur Digital ROI Cookies Wireless Vulnerability Zero-Day Threat Electronic Medical Records Firefox Collaboration Software as a Service Outlook Wi-Fi Miscellaneous Mobile E-Commerce Digital Payment Machine Learning Language Files Statistics Uninterrupted Power Supply Typing Social Networking Financial Black Friday Money Cache Data Mobile Security Legislation Windows Disaster Crowdsourcing Hard Drives Human Error Google Modem Shortcut Smart Tech Monitoring Hacks Information Technology Tip of the week IT Budget Current Events IT Consulting WannaCry Dark Web Government Virtual Private Network HIPAA Identities Data Warehousing Cybercrime Data Backup Public Speaking Enterprise Resource Planning IP Address Identity Mobile Data Google Drive Heating/Cooling Chatbots Password Cloud Bitcoin Law Enforcement Assessment Two-factor Authentication Router Cortana Business Continuity Geography Storage Domains End of Support Meetings Bookmarks Robot Business Technology How To Apps Access Control Data Recovery Security Cameras Mobile Device Procurement Alerts Phishing Office Tips Social Media Quick Tips IBM Windows 8 Fleet Tracking Unified Communications Tracking Connectivity Communication Virtualization Taxes Save Money Theft IT Consultant Conferencing Server Management IT service Outsourced IT Managed IT IT Services 5G Printing eWaste Politics Employer-Employee Relationship Spyware Computer Distributed Denial of Service MSP Cameras Google Wallet Office 365 Upgrades Customer Service Automation Operating System Going Green Botnet Analytics Permissions IT Management Paperless Office Internet Exlporer Social Upgrade Web Server

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code