Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Don’t Let Former Employees Haunt Your Business

Tip of the Week: Don’t Let Former Employees Haunt Your Business

For the modern small business owner, there are situations that you are forced to deal with that are frustrating; but, in the course of doing business would be considered normal. Then there are other situations that arise where, every step of the way, the figurative floor falls out from under your feet and you are forced to react quickly. Some of these circumstances can be pretty spooky for your business. This Halloween, we’ve decided to outline three scary circumstances your business may have to deal with, and how to keep your cool.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Unified Threat Management Alerts Software Tips Website Environment Phone System Cache Electronic Health Records Comparison Google Docs Information Technology Emoji Backup Hackers Access Control Hosted Solutions iPhone Microsoft Excel Virtual Desktop Business Technology Conferencing Tech Term Android Cybersecurity Multi-Factor Security Hard Disk Drive Backup and Disaster Recovery Customer Service CCTV Digital Signature GPS Mobile Office IT Services Read Only Computer Undo Company Culture Mirgation Business Computing Instant Messaging Authentication Cabling Bring Your Own Device eWaste Encryption Physical Security Tablet Phishing Writing Marketing Twitter Regulations Alert Wireless Networking Privacy Supercomputer Going Green Search Uninterrupted Power Supply Disaster Recovery Dark Data Electronic Medical Records Microsoft IT Management Assessment Computers Cybercrime Mobile Devices Outsourced IT Refrigeration Authorization Settings Vulnerability Hard Drives Retail Downloads Remote Monitoring and Management Procurement Troubleshooting IoT User Error Virus The Internet of Things Point of Sale Remote Worker Internet Exlporer Specifications File Sharing Sync Relocation Data Buisness Unified Threat Management Black Market Firewall Bluetooth ROI Managed IT Service Managed IT services Budget Wires Programming Firefox Content Filtering Break Fix IT Support Scary Stories Identities Permissions Safety Mobile Device Managment Address Mail Merge Servers Cameras Mobile Device Management Enterprise Content Management Network Congestion Tracking Small Business Time Management Business Owner Utility Computing Hiring/Firing Screen Reader IT solutions WannaCry Email Solid State Drive Meetings Tip of the Week Entrepreneur Gmail Storage Human Error Ransomware Application Technology Drones Humor Mobile Device Remote Monitoring G Suite MSP Password Smart Tech Motion Sickness Compliance Word SaaS Save Money Wi-Fi Internet Artificial Intelligence Security Cameras Hosted Solution LiFi Windows 10 Software Blockchain Workplace Tips Data Security Healthcare Computer Repair Augmented Reality Operations Data storage Internet of Things Public Cloud Cloud Disaster Data Warehousing End of Support Managed IT Server Theft Data Backup Spyware Customer Relationship Management Cyber Monday Update Private Cloud Smart Technology Spam Monitors Enterprise Resource Planning How To Licensing Virtualization Flexibility Telephony Bitcoin HIPAA Quick Tips Operating System Employees Recycling Patch Management Politics Intranet Managed IT Services E-Commerce Printer Consulting Smartphones Office 365 Black Friday Geography Network Security Money Education Network Management Collaboration Social Media Administration Computer Care Zero-Day Threat Google Maps Shortcut Samsung Language Gadget Social Networking History Big Data Proactive Taxes Websites Chatbots USB Cyberattacks Mobile Computing Running Cable Best Practices Financial Passwords Webcam Migration Modem Information Fleet Tracking Risk Management Public Speaking Infrastructure Software as a Service Machine Learning Managed Service Provider Office Tips Gadgets IP Address Distributed Denial of Service Automobile Lenovo Work/Life Balance Tech Terms Nanotechnology Data Recovery Cooperation Lithium-ion Battery Domains Law Enforcement Miscellaneous IT Consultant Wireless Technology Trending Windows 10 CIO WPA3 Remote Computing Identity Theft WiFi Backups Staffing Co-managed IT Two-factor Authentication Mobility App Downtime VoIP Files Mobile Cortana RMM BDR Telephone Systems Mobile Security Documents Superfish Virtual Private Network Automation Knowledge Botnet Help Desk Social Business Growth Cables Users 5G Facebook PDF Legal Apple IT service Maintenance Wearable Technology Statistics VPN Server Management Malware Unified Communications Printing Digital Error Personal Information Virtual Reality Project Management Display Development Features Upgrade Upgrades Hardware Star Wars Test Cookies Hacker Proactive IT Saving Money Apps Sports Data Management Microsoft Office Business Intelligence Data loss Piracy Finance 3D Printing Corporate Profile Network Unsupported Software Document Management Staff Chromebook Technology Laws Communication Hotspot IT Consulting Disaster Resistance Bookmarks Scam Managed Services Provider Best Practice Touchscreen Fun Managed Service Training Paperless Office Business Management Innovation Google Dark Web Travel Employee-Employer Relationship Technology Tips User Business Cryptocurrency Hacks Remote Workers YouTube IT Support High-Speed Internet Avoiding Downtime Typing IT Budget Analytics Vendor Management Mouse Data Breach Applications Management Web Server IT Technicians Security Google Wallet Robot Bandwidth Efficiency Chrome Health Hard Drive Saving Time Cleaning User Tips BYOD Identity Alt Codes Office Favorites Recovery Permission Presentation PowerPoint Productivity Analyitcs How To Router Current Events Laptop Experience communications OneNote Redundancy Mobile Data Connectivity Heating/Cooling Fraud Motherboard Holiday Computing Google Drive Vulnerabilities Computing Infrastructure Cloud Computing Windows 8 Processors Productivity Browser Halloween Outlook Cost Management Employer-Employee Relationship Asset Tracking Tech Support VoIP Monitoring Social Engineering Notifications Google Calendar Administrator Tip of the week Digital Payment Hacking SharePoint Consultation Deep Learning Save Time IBM Antivirus Government Techology Net Neutrality Business Continuity Consumers Windows Legislation Smartphone Managing Stress Competition Crowdsourcing

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...