Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Don’t Let Former Employees Haunt Your Business

Tip of the Week: Don’t Let Former Employees Haunt Your Business

For the modern small business owner, there are situations that you are forced to deal with that are frustrating; but, in the course of doing business would be considered normal. Then there are other situations that arise where, every step of the way, the figurative floor falls out from under your feet and you are forced to react quickly. Some of these circumstances can be pretty spooky for your business. This Halloween, we’ve decided to outline three scary circumstances your business may have to deal with, and how to keep your cool.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Consumers Procurement Facebook Miscellaneous Best Practices Unified Communications Networking Legislation Software Tips Two-factor Authentication Relocation Access Control Presentation Cyberattacks Outsourced IT Cyber Monday Hosted Solution Hotspot Cabling Encryption Humor Sports Flexibility App User Work/Life Balance Disaster Recovery Proactive Electronic Health Records Application OneNote Business Technology Saving Money Artificial Intelligence Robot Communication Politics Mobile Security Windows 10 Digital Payment Wires Data Warehousing Virtual Private Network Virus Outlook Asset Tracking SaaS Internet of Things Machine Learning VoIP Data Recovery Development Data Management Cameras Scary Stories USB Microsoft Dark Web Motherboard Cooperation Running Cable Mail Merge Permission Mobile Device Managment Phishing Apps History Screen Reader Theft Managed IT services Uninterrupted Power Supply Unified Threat Management Disaster Data storage IT solutions Domains Information Technology Business Computing User Tips Bluetooth Mobile Device Management Cache Current Events Solid State Drive Word How To Security Cameras Going Green IT Support Firewall Vulnerability Blockchain Employer-Employee Relationship Enterprise Resource Planning Ransomware Computing Infrastructure Maintenance Environment Processors Recycling Fleet Tracking Cloud Computing ROI Refrigeration Big Data Virtual Reality Nanotechnology Virtual Assistant Administrator Cookies Staff RMM Office 365 MSP Motion Sickness Modem Botnet Assessment Specifications Managed Service Meetings Windows Google Calendar Email Mobile User Error Regulations Mobile Computing Avoiding Downtime Smartphones Buisness IT Services Touchscreen The Internet of Things Wasting Time Heating/Cooling Gadget Virtual Desktop Applications GPS Google Docs Data Backup Innovation Techology Social Networking Holiday Computer Repair Laptop Telephone Systems Financial Trending Training Files Administration Gadgets Vulnerabilities WannaCry Safety Cybercrime Physical Security Google Drive Database IT service Small Business Twitter Entrepreneur Website Save Money Downloads Fun Supercomputer Smart Tech Google Programming Business Owner Upgrades Black Market Business PDF VPN Net Neutrality Writing Remote Worker Web Server Bitcoin LiFi Recovery Data Security Saving Time Analytics BYOD Consulting Compliance Security Tech Support Conferencing Bookmarks Legal Time Management Government Notes Data loss iPhone Documents Identities Employee-Employer Relationship Private Cloud Apple Workplace Tips Mobile Data Telephony Cybersecurity Upgrade Multi-Factor Security Productivity IT Management Business Growth How To WPA3 Update Google Maps Passwords Technology Tips Risk Management Halloween Tip of the week Project Management BDR Favorites Error Backup Co-managed IT Computers Display Infrastructure Read Only Wi-Fi Alerts Point of Sale Printing Samsung Hard Drives Operating System Budget Computer Care Printer Cloud Downtime Network Congestion Dark Data Hackers Managing Stress Remote Computing Customer Service CCTV Lenovo Hiring/Firing Competition Mobile Device Travel Mobile Devices Hardware Troubleshooting Shortcut Zero-Day Threat Augmented Reality Social Media IT Budget Internet Servers Managed IT Collaboration Users Managed IT Services Retail Gmail Drones Statistics Black Friday Password Typing Digital Signature Employees Remote Workers Undo Windows 8 Comparison Monitoring G Suite Automation IoT Productivity PowerPoint communications Migration Management Electronic Medical Records CIO Test Hard Disk Drive Identity Hosted Solutions Company Culture Healthcare Sync Authentication Software as a Service Network Management IT Technicians 3D Printing Tablet Mobile Office Backups Unsupported Software Identity Theft Mobility Virtualization Mouse Bring Your Own Device Phone System Cost Management Alert Fraud eWaste Tracking Piracy Hacker Firefox Operations Hacking Microsoft Office Router Superfish Unified Threat Management Business Intelligence Disaster Resistance Windows 7 Smart Technology WiFi Law Enforcement Deep Learning Mirgation Server Computing Server Management Managed Service Provider Wireless Technology Redundancy Software Star Wars Information Data Notifications Connectivity Spam Chromebook Features Network Security Wearable Technology Technology Laws File Sharing Office Tips Tech Terms Automobile Public Speaking Alt Codes Geography Windows 10 Backup and Disaster Recovery Analyitcs Chatbots Money Smartphone Cryptocurrency Staffing Public Cloud Technology Human Error Browser Corporate Profile VoIP HIPAA Managed Services Provider Business Management Personal Information Office Cleaning Professional Services Internet Exlporer Lithium-ion Battery Paperless Office Address Help Desk Voice over Internet Protocol Instant Messaging 5G Remote Monitoring Health Scam Websites Storage Monitors Hacks Tech Term Business Continuity Social Engineering Google Wallet Privacy Social Taxes Vendor Management IP Address Utility Computing Marketing Wireless Consultation Save Time IT Consultant Permissions High-Speed Internet Webcam Distributed Denial of Service Digital Proactive IT Experience Chrome Licensing Break Fix Malware IT Consulting Language Education End of Support Patch Management Document Management Efficiency Settings Best Practice Emoji Quick Tips Crowdsourcing Cortana Enterprise Content Management Intranet Android Hard Drive Cables Spyware Remote Monitoring and Management IBM SharePoint Antivirus E-Commerce Authorization Managed IT Service Tip of the Week Bandwidth Microsoft Excel YouTube Data Breach IT Support Finance Network Search Content Filtering Knowledge Customer Relationship Management Computer

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...