Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Create Envelopes For Your Whole Contact List With Word

Tip of the Week: Create Envelopes For Your Whole Contact List With Word

Microsoft Office has many capabilities that aren’t fully utilized by the majority of their users. Mail merges in Word used to be a time consuming, frustrating process. With each new edition of Word, Microsoft has refined the process to make it a lot more user-friendly. Take the following steps to create a professional looking envelope for your business that easily adds a list of contacts from a CSV file, Outlook, and more.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Private Cloud Business Growth Cookies Management Proactive Data Security Comparison Information Technology Unified Threat Management Maintenance Computer Repair Tech Term Windows 7 Display Access Control Upgrades Privacy Firefox Automobile Managing Stress Printing Backup and Disaster Recovery Cyber Monday Scary Stories Email Wasting Time Miscellaneous Fraud Company Culture Botnet Avoiding Downtime Firewall Artificial Intelligence Processors Sync Money Remote Computing Monitoring Innovation Health Mobility Law Enforcement Cryptocurrency Going Green Alt Codes Network Recovery Staffing Managed Services Provider Multi-Factor Security Efficiency Computers App Halloween CCTV IT Management Hacking Computer Care Technology Laws Point of Sale Voice over Internet Protocol Quick Tips Spam Alerts Taxes Router Data Recovery Internet Exlporer Windows 8 Business Owner HIPAA Employee-Employer Relationship Error Distributed Denial of Service Managed IT Service Vulnerabilities Budget Upgrade Phone System Cybercrime Specifications Mobile Security Language Cyberattacks Disaster Recovery Dark Data Motherboard Hard Disk Drive Hacker Lithium-ion Battery Save Time Star Wars Outsourced IT Bookmarks Telephone Systems Human Error IT Consulting Managed IT services Presentation Unsupported Software Samsung Intranet Authentication Search VoIP Mirgation Wires Technology Tips Customer Relationship Management Heating/Cooling VoIP Financial Hard Drive Software Tips Theft Microsoft Excel Licensing Server G Suite Trending Tablet Passwords Business Continuity iPhone Digital Signature Best Practice Antivirus Word Supercomputer Compliance IT Budget Identity Theft Tracking Piracy Solid State Drive How To Smart Technology Chromebook Tech Support Spyware LiFi Humor Politics Authorization Browser Internet Sports Encryption Techology Social Networking Webcam OneNote Current Events Mobile Device End of Support Productivity Mobile Legislation Cloud Files Time Management Government YouTube Tech Terms Disaster Resistance Wireless Hackers Social Tip of the week Consumers Virtual Assistant Utility Computing Technology Mobile Office Cortana Work/Life Balance eWaste Backups Recycling Connectivity Competition 5G Asset Tracking Printer Cost Management Saving Time Features Typing Web Server Microsoft Office WannaCry Analyitcs Unified Communications Facebook Downtime Hard Drives Blockchain Managed Service Wireless Technology Mouse Virus Dark Web Data storage IT Services Software as a Service Migration Chatbots Safety Emoji Alert Augmented Reality Smart Tech How To Robot Vendor Management Servers Collaboration Flexibility Net Neutrality Favorites Password Customer Service Geography User Enterprise Content Management Screen Reader Big Data Modem User Error Holiday Infrastructure Managed IT Services 3D Printing Virtual Reality Save Money Lenovo Read Only Paperless Office Running Cable Mobile Devices Marketing Patch Management Business Intelligence Google Internet of Things Employees Application Workplace Tips Fleet Tracking Digital Data Breach IT solutions Permissions IT Support Social Engineering Assessment Telephony Deep Learning PDF Tip of the Week Identities IoT Productivity Downloads Computing Infrastructure Users Shortcut Saving Money High-Speed Internet Fun Server Management Administration Mobile Device Management Electronic Medical Records Identity Mobile Data Hardware The Internet of Things Phishing CIO Touchscreen Redundancy Development Cameras Social Media Staff Consulting Twitter Hosted Solutions Google Docs IT Technicians Network Management Regulations Cache Machine Learning Backup Buisness Computing Training Business Technology Gadget Mobile Device Managment Automation Proactive IT Statistics Administrator Public Cloud Smartphones ROI Information Professional Services Unified Threat Management Virtual Private Network Conferencing Google Maps Employer-Employee Relationship Risk Management Motion Sickness Hotspot Black Friday Cooperation Cables Computer Scam VPN Data History Software Procurement Knowledge Relocation Android Help Desk Cybersecurity Remote Monitoring Break Fix Operations Storage Gmail Co-managed IT IBM Writing Two-factor Authentication Retail Operating System Data Management Document Management Notifications communications Superfish Bandwidth User Tips IT Consultant Best Practices Permission Education Travel File Sharing Notes Windows 10 Refrigeration Malware Domains Network Security Mobile Computing Physical Security BYOD WPA3 Entrepreneur IP Address Wearable Technology Apple Communication Windows Business Management BDR Google Calendar Apps Digital Payment IT Support Websites Applications Hosted Solution Ransomware Analytics Settings Monitors PowerPoint Disaster Black Market Update Nanotechnology Cabling Chrome Instant Messaging Data Warehousing Bluetooth Vulnerability Cleaning SaaS Mail Merge Zero-Day Threat Office 365 Drones Wi-Fi Bitcoin GPS Google Wallet Meetings Healthcare Finance Remote Workers Security Cameras Address Hiring/Firing Undo Crowdsourcing Database WiFi MSP Consultation Corporate Profile Remote Worker Documents Office Tips Laptop Cloud Computing Networking USB Virtual Desktop Office Business Managed Service Provider Website Smartphone Network Congestion IT service Outlook Experience Virtualization Data loss Data Backup Security Bring Your Own Device Personal Information SharePoint Environment Windows 10 E-Commerce Content Filtering Public Speaking Managed IT RMM Project Management Test Troubleshooting Microsoft Google Drive Uninterrupted Power Supply Programming Legal Hacks Electronic Health Records Remote Monitoring and Management Business Computing Gadgets Enterprise Resource Planning Small Business

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...