Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

5 Cuts Your Business Should Consider Before Laying Off Staff

b2ap3_thumbnail_cut_costs_today_400.jpgWouldn’t it be nice if you could provide your staff an over-the-top benefits package similar to what Google offers their employees (aka, “Googlers”)? For most SMBs, making Glassdoor’s annual list of “50 Best Places to Work” (a list routinely dominated by Google) is a fantasy; primarily due to the fact that the average enterprise operates within the confines of a strict budget. As the owner of an SMB, this reality often means making tough decisions and budget cuts.

Continue reading
0 Comments

What We Mean When We Say “Enterprise-Level”

b2ap3_thumbnail_enterprise_business_400.jpgYou’re a small business, and as such, you need technology in order to keep your operations moving forward. Many organizations will refer to their services and products as “enterprise-level,” as if there’s a certain draw to them that wouldn’t ordinarily be there. Here’s what this term means, not just for larger businesses, but for your SMB.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Error Wasting Time Remote Monitoring Electronic Medical Records Electronic Health Records IT Services Politics Cabling IT Support Hacking Consulting Microsoft Office Cybercrime Holiday Save Time Machine Learning Information Technology Remote Computing 3D Printing Cortana Telephony Authentication Chromebook Staff Server Analyitcs WiFi Quick Tips Applications IBM Tech Term Save Money Disaster Resistance Trending Wearable Technology Disaster Recovery Facebook Competition Website Voice over Internet Protocol Augmented Reality Hosted Solutions Hard Drives Authorization Black Market Proactive Data Recovery Network Congestion Hard Drive Assessment WannaCry Enterprise Resource Planning Cloud Computing Patch Management Employer-Employee Relationship PowerPoint High-Speed Internet Mobile Device Managment Government Google Maps Social Engineering Computing Infrastructure Cloud Data Management Windows 8 IT Support Android Net Neutrality Instant Messaging Staffing Proactive IT Network Security Browser Specifications Redundancy Training Virus Windows 10 Firefox Managed IT Service Software Tips Miscellaneous Hosted Solution Wires CIO Mobile Office Printer Language Environment Office Tips Communication IT Consultant IT Technicians Twitter Meetings Efficiency Social Media Websites Computer Care Notifications Identity Theft IoT Cameras Relocation VoIP Internet Exlporer Touchscreen Data storage Health Permission Virtual Assistant Avoiding Downtime Bluetooth G Suite Company Culture Disaster How To Chrome Unified Threat Management Licensing Entrepreneur Personal Information Consumers Vulnerability Co-managed IT Content Filtering Mobile Security Statistics Gadgets Unified Communications Remote Worker Digital Payment Tablet Bookmarks Buisness IT Budget Managed IT Scary Stories Cables Managed Service Cryptocurrency Hackers Spam Travel GPS Mobile Data Solid State Drive Undo Features Vendor Management Intranet VPN Data loss Google Wallet BDR Office 5G Remote Monitoring and Management Computers Downloads How To Virtualization Conferencing IT solutions Google Docs Unsupported Software Office 365 Modem Distributed Denial of Service Password Flexibility Business Continuity Operating System Analytics Business Owner Alert Web Server Cybersecurity Budget E-Commerce Work/Life Balance Digital Point of Sale Smartphone Smart Technology Alerts Document Management Outlook IT Management Recovery Automobile Best Practices Business Intelligence Malware Saving Money Social Cyber Monday Monitoring RMM Data Security Running Cable Google Drive Administrator Management Education Hacks Black Friday Fleet Tracking Internet Bitcoin WPA3 Physical Security Private Cloud Emoji Test Business Technology Cost Management Two-factor Authentication Motherboard Shortcut Smartphones Favorites Going Green Update ROI USB Technology Google Calendar Firewall Outsourced IT Display Google Mirgation Vulnerabilities Crowdsourcing Software as a Service Best Practice Public Speaking Hardware Ransomware Virtual Desktop HIPAA Webcam Windows Hacker Piracy Hiring/Firing User Error Techology Privacy Documents Gmail Server Management Computer Administration Printing Mobile Devices Upgrades Recycling Internet of Things Network Management Monitors Saving Time Paperless Office Writing Social Networking Motion Sickness Storage Business Geography PDF Managed IT Services Passwords Scam Alt Codes Lithium-ion Battery Artificial Intelligence Uninterrupted Power Supply Mobile Device Programming Mobile Break Fix IT service Retail Cleaning Business Computing Marketing Safety Backup Unified Threat Management Human Error OneNote Operations Mouse Big Data Heating/Cooling Database YouTube Professional Services Employee-Employer Relationship Lenovo Managing Stress Consultation Phone System BYOD MSP IP Address Wireless Security Cameras Backup and Disaster Recovery Dark Web Word Read Only Healthcare Networking Experience Drones Supercomputer Domains Money Network Theft Data Breach Email Tip of the week eWaste Cooperation Employees Samsung Spyware iPhone Compliance Data Warehousing IT Consulting The Internet of Things Law Enforcement Project Management Settings Address Router communications Workplace Tips Computer Repair Tracking SaaS Virtual Reality App CCTV Fraud Connectivity Collaboration Data Backup Screen Reader Hard Disk Drive Superfish Deep Learning Dark Data Hotspot Enterprise Content Management Apple Bandwidth Tech Support SharePoint Virtual Private Network Productivity Corporate Profile Time Management Nanotechnology Phishing Chatbots Sports Cache Search File Sharing Apps Star Wars Remote Workers Information Antivirus Cyberattacks Mobile Device Management LiFi Typing Comparison Technology Tips Backups Smart Tech Managed Services Provider User Tips Computing Maintenance Legal Customer Relationship Management Small Business Identity Windows 10 Utility Computing Innovation Blockchain Wireless Technology Wi-Fi Automation Laptop Finance Asset Tracking Identities Taxes Permissions Customer Service Cookies Botnet Infrastructure Zero-Day Threat Halloween Tech Terms Mobile Computing Telephone Systems Technology Laws Upgrade Presentation Bring Your Own Device Financial Digital Signature Encryption Files Humor Current Events Regulations Troubleshooting Windows 7 Procurement End of Support Application Development Microsoft Software Microsoft Excel Notes VoIP Multi-Factor Security Managed IT services Migration Gadget History Data Security Tip of the Week Business Management Knowledge Servers Fun Users Managed Service Provider Sync Downtime Access Control Productivity Refrigeration User Public Cloud Business Growth Processors Mail Merge Mobility Help Desk Risk Management Robot Legislation

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code