Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Don’t Let Former Employees Haunt Your Business

Tip of the Week: Don’t Let Former Employees Haunt Your Business

For the modern small business owner, there are situations that you are forced to deal with that are frustrating; but, in the course of doing business would be considered normal. Then there are other situations that arise where, every step of the way, the figurative floor falls out from under your feet and you are forced to react quickly. Some of these circumstances can be pretty spooky for your business. This Halloween, we’ve decided to outline three scary circumstances your business may have to deal with, and how to keep your cool.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Technology Laws Alerts Cabling Social Media Patch Management Techology Spam Wi-Fi Cybercrime Fun Cooperation Mobile Office Collaboration Webcam ROI Disaster Resistance Network Management IT Consultant Data Mobility LiFi Authorization Internet of Things Geography Business Technology Operating System Notes Google Drive SharePoint Google Calendar Information Technology Business Management IT solutions Development Net Neutrality Monitoring Dark Web Theft Data Recovery Users Time Management Digital Payment Data Security Website Downloads Windows 10 Access Control Data Warehousing Business Owner Vulnerabilities Work/Life Balance Technology Tips WannaCry Proactive IT Marketing Meetings Company Culture Running Cable Analyitcs Education Computers Tablet Legislation PDF 3D Printing Saving Time Router Point of Sale Lithium-ion Battery Test Staffing Permission Display Domains Utility Computing Outsourced IT Features Training Augmented Reality Troubleshooting Network Security Identity Theft Business Computing Chatbots Paperless Office Cyberattacks Law Enforcement Productivity Cleaning Privacy VPN Apple Operations Consultation IT Budget Permissions Voice over Internet Protocol Travel Information Web Server Project Management Computer Repair Virtual Reality Automation Trending Android Remote Worker Customer Relationship Management Break Fix Bitcoin YouTube Corporate Profile Consulting Robot Avoiding Downtime Data storage Favorites Hacking Office 365 Mobile Authentication Compliance IT Support Mobile Computing Windows 10 CIO Hacker Specifications Artificial Intelligence Chromebook Computing Infrastructure Antivirus Hotspot Money IT Services USB Google Google Maps Hackers Notifications Regulations Two-factor Authentication Google Docs Identity Remote Monitoring Botnet Security IBM Twitter Virtual Assistant Cyber Monday Smartphone Professional Services Processors Server BDR Internet Tracking Employer-Employee Relationship Co-managed IT Hardware Machine Learning Documents Efficiency Public Cloud Safety Communication Physical Security Managed Service Typing Taxes Wireless Technology Gadgets IT Support Business Intelligence Private Cloud Business Continuity Virus Scary Stories Big Data Computer Care IT service Data loss Managed IT Service High-Speed Internet Internet Exlporer User Tips Content Filtering Government Laptop Consumers Save Time Piracy Encryption Files Wireless Healthcare Identities Managed IT services Knowledge Upgrades Office Tips Conferencing Comparison Ransomware Quick Tips File Sharing Budget Settings Business Growth Password Writing Upgrade Firefox Experience Microsoft Excel Security Cameras Managed IT Services Presentation Word Hard Disk Drive Human Error History Recovery How To Personal Information E-Commerce Hiring/Firing Managing Stress Scam Social BYOD Firewall Distributed Denial of Service OneNote Entrepreneur IoT Alt Codes Programming Dark Data Document Management Email Infrastructure Bring Your Own Device Applications iPhone Networking Tech Support Tech Terms SaaS Supercomputer Network Congestion Unified Threat Management Microsoft Sports App Samsung G Suite Wires HIPAA Browser WPA3 Vulnerability Mobile Security Mail Merge Windows 8 Data Management Remote Workers Shortcut Holiday Vendor Management Productivity Blockchain Undo Gmail Best Practices Procurement Hacks Finance Phone System Competition Data Breach PowerPoint Cache Managed IT VoIP IT Management Cost Management Read Only Mobile Device Management Digital WiFi The Internet of Things Screen Reader Software as a Service Facebook Managed Service Provider Hosted Solutions User Error Best Practice Maintenance Enterprise Content Management Statistics Computing Technology Mirgation Computer Gadget GPS Administrator Phishing Spyware Smart Tech Retail Mobile Data RMM Application Cybersecurity Public Speaking Mobile Device Management Unified Communications IT Technicians Cloud Computing Virtual Private Network Heating/Cooling Current Events Hard Drive Tip of the week Workplace Tips Telephony Zero-Day Threat Server Management Motion Sickness Politics Smartphones Touchscreen How To Assessment Hosted Solution Telephone Systems Database Going Green User Asset Tracking eWaste Cryptocurrency Customer Service Superfish Software Drones IP Address 5G Social Networking Connectivity communications Fraud Printing Cameras Storage Downtime Windows 7 Licensing Outlook CCTV Fleet Tracking Remote Monitoring and Management Star Wars Passwords Nanotechnology Motherboard Servers Emoji Websites Electronic Health Records Mouse Miscellaneous Refrigeration Virtual Desktop Lenovo Instant Messaging Backups Cloud Multi-Factor Security MSP Network Flexibility Search Black Market Staff Data Backup Backup Address End of Support Relocation Deep Learning Proactive Crowdsourcing Modem Smart Technology Update Virtualization Administration Enterprise Resource Planning Legal Save Money Software Tips Chrome Uninterrupted Power Supply Language Sync Social Engineering VoIP Black Friday Halloween Business Disaster Recovery IT Consulting Disaster Cables Intranet Automobile Wasting Time Office Financial Windows Tip of the Week Microsoft Office Recycling Bluetooth Bookmarks Help Desk Unsupported Software Employees Humor Analytics Managed Services Provider Remote Computing Hard Drives Mobile Device Managment Cortana Google Wallet Environment Buisness Printer Unified Threat Management Health Small Business Migration Malware Wearable Technology Solid State Drive Backup and Disaster Recovery Mobile Devices Saving Money Digital Signature Risk Management Alert Apps Electronic Medical Records Tech Term Monitors Employee-Employer Relationship Redundancy Error Bandwidth Cookies Innovation

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...