Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Clean Your Monitor, Keyboard, and the Inside of Your PC

b2ap3_thumbnail_clean_computer_tips_400.jpgA clean computer is a happy computer. Just like any other piece of gadgetry, a computer requires regular cleanup sessions that allow users to get the most from them. In fact, January is known as Clean Up Your Computer Month, so what better way is there to ring in the new year than making sure your computer is in tip-top shape?

Continue reading
0 Comments

When it’s Hot Outside, Your Servers Are Burning Up Inside

b2ap3_thumbnail_ac_units_cool_servers_400.jpgIf you host your own servers in-house, or in an off-site data center, you know all about the frustrations of keeping your hardware up to date and healthy. This also includes keeping your servers from overheating. These mission-critical pieces of hardware are known to produce incredulous amounts of heat, and keeping them cool only gets more challenging during hot, sticky summer months.

Continue reading
0 Comments

All You Need is Love... and a Network Security Solution

b2ap3_thumbnail_all_you_need_is_love_400.jpgHave you tried online dating? There are many happy couples who attribute their love to the matchmaking algorithm of an online website. Internet dating is a legitimate option for modern singles, but like most good things on the web, naive users run a risk of getting scammed.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Distributed Denial of Service Language Mobile Managed IT services Webcam IoT ROI Holiday Relocation Digital Conferencing Error Smartphones Refrigeration WPA3 Budget Motherboard eWaste Malware Vulnerabilities Windows 7 Tip of the Week Comparison Management Processors Professional Services Public Cloud How To IP Address Lithium-ion Battery Settings Application Trending User Tips VPN Politics Hosted Solution Browser Cortana Connectivity Money Servers Network Congestion Upgrades Mirgation IT solutions Authorization Identity Theft Black Friday Recovery Bitcoin Nanotechnology Scam Data Security Social Notifications Privacy Mobile Device Management Business Owner Cameras Fleet Tracking Office Tips Word Websites Big Data Data Warehousing Disaster Recovery Bandwidth Employees Fraud Employer-Employee Relationship Chatbots Microsoft Office Point of Sale Business Users Cybersecurity Technology Tips Saving Money Productivity Regulations Patch Management The Internet of Things Web Server Enterprise Content Management Cyberattacks IT Support Network Content Filtering Facebook Bring Your Own Device Tracking Project Management communications Staffing SaaS Router Firewall Telephone Systems Programming Star Wars IT service User Error Computing Mobility Notes Black Market Writing Disaster Resistance IBM Business Computing BYOD Cookies Proactive Monitors Wasting Time Google Corporate Profile Specifications Lenovo History GPS Alt Codes Gadgets Data loss Wi-Fi Dark Data Development Private Cloud Wearable Technology Disaster Windows Authentication Licensing IT Consultant Update YouTube 3D Printing Consultation Outsourced IT Data Backup Printing Virtual Assistant IT Technicians Information Technology Heating/Cooling Screen Reader Computing Infrastructure Twitter Cabling Downloads Tech Term Computer Environment Mobile Office IT Services Apple Cloud Computing Recycling Analytics Retail Mobile Security Cache Chromebook Antivirus Experience Touchscreen Microsoft Artificial Intelligence Backup Data storage Consulting Assessment Virtual Desktop OneNote Hardware Passwords Migration Training Social Networking Undo Managed Service Provider Bookmarks Proactive IT LiFi Dark Web Computers Computer Care Smart Tech Cloud Hard Disk Drive Maintenance Operations Time Management Communication IT Management Network Security Business Technology Solid State Drive Electronic Health Records Smart Technology Customer Service Finance Office Features Mobile Devices Favorites Personal Information Virus Net Neutrality Vendor Management Automobile Automation Computer Repair Mobile Device Managment Wireless Social Engineering Healthcare Buisness Government Alert MSP Saving Time PowerPoint BDR RMM Supercomputer Security Productivity Downtime Domains Managed IT Service Managed Service Cables Legislation Emoji Techology Tip of the week Statistics Compliance Risk Management Printer Help Desk Scary Stories Apps Health Virtual Private Network Hackers Consumers Documents Samsung Tablet Halloween Sports IT Consulting Education PDF Google Calendar Customer Relationship Management Mouse VoIP Phishing Unsupported Software Search Piracy Chrome Internet Exlporer Internet Zero-Day Threat Applications Remote Monitoring and Management Going Green VoIP Travel Software Employee-Employer Relationship Best Practice Software Tips Paperless Office Outlook Cleaning Entrepreneur Operating System Taxes HIPAA Read Only Address Files Crowdsourcing Smartphone Work/Life Balance CCTV Alerts Digital Payment Laptop Botnet Backups Knowledge Human Error Electronic Medical Records Robot Administrator Business Growth IT Budget CIO Staff Innovation Windows 10 App Current Events Ransomware Google Wallet Cost Management Deep Learning End of Support Bluetooth Fun Typing Digital Signature Data Recovery Software as a Service Backup and Disaster Recovery Database Hard Drive Machine Learning Save Money 5G Managing Stress Miscellaneous WiFi Remote Monitoring USB Company Culture Public Speaking How To Google Maps Best Practices Infrastructure Technology Wireless Technology Remote Worker Unified Threat Management Managed IT Services Data Breach Drones Analyitcs Hacker Mail Merge Gmail Virtualization Superfish Shortcut Spam Unified Communications SharePoint Identities Voice over Internet Protocol Mobile Device Financial Troubleshooting Server Management Business Intelligence Managed Services Provider iPhone Document Management Remote Computing Collaboration Intranet Tech Support Network Management Upgrade Enterprise Resource Planning Blockchain Hiring/Firing Theft E-Commerce Cybercrime Business Management Avoiding Downtime Encryption Motion Sickness Networking Cooperation Hacking Hard Drives Tech Terms Vulnerability Presentation Meetings Legal Co-managed IT Internet of Things Competition Wires File Sharing G Suite Technology Laws Quick Tips Safety User Password Google Drive Firefox Remote Workers Data Google Docs Phone System Website Permission Virtual Reality WannaCry Access Control Marketing Server High-Speed Internet Efficiency Managed IT Cyber Monday Identity Redundancy Unified Threat Management Utility Computing Mobile Data Workplace Tips Instant Messaging Windows 8 Hosted Solutions Save Time Windows 10 Gadget Augmented Reality Display Physical Security Social Media Hacks Cryptocurrency Hotspot Mobile Computing Business Continuity Flexibility Law Enforcement Small Business Test Administration Asset Tracking Office 365 Two-factor Authentication Multi-Factor Security Procurement Geography Spyware Permissions IT Support Telephony Email Information Sync Android Security Cameras Storage Running Cable Humor Modem Microsoft Excel Uninterrupted Power Supply Monitoring Break Fix Data Management

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code