Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Don’t Let Former Employees Haunt Your Business

Tip of the Week: Don’t Let Former Employees Haunt Your Business

For the modern small business owner, there are situations that you are forced to deal with that are frustrating; but, in the course of doing business would be considered normal. Then there are other situations that arise where, every step of the way, the figurative floor falls out from under your feet and you are forced to react quickly. Some of these circumstances can be pretty spooky for your business. This Halloween, we’ve decided to outline three scary circumstances your business may have to deal with, and how to keep your cool.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Smart Tech Cloud Computing Technology Tablet Healthcare Uninterrupted Power Supply Router Data storage Public Speaking PowerPoint Mobile Data Alerts Proactive Business Technology Facebook Refrigeration User Error Hotspot Government Patch Management Crowdsourcing Mobile Device Managment Mouse Lithium-ion Battery Backup Permissions Upgrades Emoji Machine Learning Mirgation Business Management Cortana Business Intelligence IT Consultant Networking Read Only Virtualization Staffing iPhone Gmail Enterprise Content Management Access Control Business Continuity Internet Productivity Business Growth Private Cloud Utility Computing Chromebook Shortcut Cyberattacks Password Hacks Smartphone Cost Management Humor Downtime Telephone Systems Net Neutrality Telephony Storage Data Warehousing Unified Communications Permission Consulting Business Owner CCTV Smart Technology Notifications Data Management Personal Information ROI Computing Infrastructure eWaste Data Backup Dark Data Identity Theft Botnet Black Market Samsung Superfish Bookmarks Electronic Health Records Augmented Reality Best Practice Data Breach Migration Business Computing Software as a Service Nanotechnology Gadget Address Website Data Security Employee-Employer Relationship Solid State Drive Supercomputer Time Management Digital Applications Politics Remote Computing Drones BYOD Training Administrator Company Culture Legal Chatbots Printing Security How To Computers Going Green Mobile Education Digital Signature Efficiency Privacy Sync G Suite Office 365 IBM Techology Unified Threat Management Scam Customer Relationship Management Laptop Flexibility Downloads Alert Robot Security Cameras Proactive IT Theft Procurement Twitter Remote Monitoring Hacking Operating System Google Wallet Server Cybersecurity Users Bluetooth Windows 8 Hacker Star Wars Wi-Fi Google Drive Enterprise Resource Planning Language Statistics Favorites Black Friday Hackers Identity Remote Workers File Sharing Tip of the Week Budget Google Docs Consultation Update Managed Services Provider Network Management Touchscreen IP Address Hosted Solutions Virtual Desktop Files Settings Mobile Office The Internet of Things WPA3 Passwords Cache Hard Disk Drive Authorization Processors 3D Printing Travel Google Maps Public Cloud Windows 10 Disaster GPS OneNote Information Risk Management Backups Apps Malware Email Big Data IT Management Virus Save Money Two-factor Authentication Webcam Deep Learning Conferencing Financial Instant Messaging Social Media Administration Corporate Profile Managed IT Services Technology Tips Mail Merge Automobile Office Tips Save Time IT service Antivirus Microsoft Excel Physical Security Websites HIPAA IT Support Customer Service Asset Tracking Managed Service Provider Collaboration Automation Servers Error Best Practices Taxes Windows Monitors Cybercrime Communication WannaCry Quick Tips PDF User Virtual Private Network Mobile Computing Vulnerabilities Wearable Technology Document Management Wires Specifications Work/Life Balance IT Technicians Holiday Bandwidth Recovery Hard Drives Cables Knowledge Monitoring How To Microsoft communications Software Tips Finance Software Technology Laws Hardware Features IT Services Computer Repair Domains History Current Events Experience Remote Worker Mobility Hiring/Firing Competition USB Undo Spyware Employer-Employee Relationship Licensing Apple Small Business Mobile Device Management Consumers Distributed Denial of Service Outsourced IT Dark Web Google Documents Hosted Solution User Tips Managed IT Service Staff Running Cable Cameras Information Technology Saving Money Analyitcs Bitcoin Application Electronic Medical Records Law Enforcement Entrepreneur Disaster Resistance IT Consulting Mobile Devices Connectivity Windows 10 App Disaster Recovery Intranet Test Display Workplace Tips Search Paperless Office Typing High-Speed Internet Fun Managed IT Tracking Health Cloud CIO Environment Geography Cooperation Redundancy Screen Reader Virtual Reality Social Engineering Point of Sale Authentication Wireless Operations RMM MSP Money Cyber Monday Programming Wireless Technology Google Calendar Recycling Heating/Cooling Ransomware Fraud Tech Terms Employees 5G VPN Writing Unsupported Software Spam Development Break Fix Mobile Security Office Maintenance Sports IT solutions BDR Management Innovation Motherboard Regulations Data Recovery Social Networking Firewall Android Presentation Human Error Computer Care Mobile Device IT Support Social Infrastructure Web Server Saving Time Co-managed IT Alt Codes Phishing Retail Encryption Digital Payment Assessment Hard Drive Piracy VoIP Vendor Management Safety Unified Threat Management End of Support Managed Service Legislation VoIP Bring Your Own Device Productivity Internet of Things Help Desk Computing WiFi E-Commerce SaaS Cryptocurrency Miscellaneous Trending Lenovo Business Server Management Upgrade Scary Stories Network Congestion Identities Cabling Halloween Gadgets Artificial Intelligence Tip of the week IoT Remote Monitoring and Management Printer Compliance Internet Exlporer Content Filtering Firefox Relocation Buisness Comparison Fleet Tracking Cookies Network Security Avoiding Downtime LiFi Multi-Factor Security Zero-Day Threat Microsoft Office Cleaning SharePoint Word Data Blockchain Troubleshooting IT Budget Managing Stress Modem Outlook Chrome YouTube Managed IT services Vulnerability Smartphones Computer Data loss Motion Sickness Meetings Project Management Network Browser Marketing Backup and Disaster Recovery Tech Term Tech Support Analytics Phone System

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...