Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Clean Your Monitor, Keyboard, and the Inside of Your PC

b2ap3_thumbnail_clean_computer_tips_400.jpgA clean computer is a happy computer. Just like any other piece of gadgetry, a computer requires regular cleanup sessions that allow users to get the most from them. In fact, January is known as Clean Up Your Computer Month, so what better way is there to ring in the new year than making sure your computer is in tip-top shape?

Continue reading

When it’s Hot Outside, Your Servers Are Burning Up Inside

b2ap3_thumbnail_ac_units_cool_servers_400.jpgIf you host your own servers in-house, or in an off-site data center, you know all about the frustrations of keeping your hardware up to date and healthy. This also includes keeping your servers from overheating. These mission-critical pieces of hardware are known to produce incredulous amounts of heat, and keeping them cool only gets more challenging during hot, sticky summer months.

Continue reading

All You Need is Love... and a Network Security Solution

b2ap3_thumbnail_all_you_need_is_love_400.jpgHave you tried online dating? There are many happy couples who attribute their love to the matchmaking algorithm of an online website. Internet dating is a legitimate option for modern singles, but like most good things on the web, naive users run a risk of getting scammed.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

IT Consultant Backup Retail Financial Smartphone Sync Humor Managed Service Money Knowledge Information Telephone Systems Data BDR Crowdsourcing IT Management IT Technicians Taxes Bluetooth Computing Distributed Denial of Service Features Computer Repair Dark Data Hosted Solution Unsupported Software Quick Tips Proactive IT Artificial Intelligence Chromebook MSP Competition Address Security Computer Care Wearable Technology Employees Entrepreneur Remote Monitoring and Management Authentication Access Control IT service Passwords Machine Learning USB Touchscreen Test OneNote Staffing Mail Merge IT Consulting 3D Printing Data Recovery Google Drive Time Management Bitcoin Business Computing Firewall Wireless Technology Internet Exlporer WiFi Data Backup Motherboard The Internet of Things Remote Monitoring Small Business BYOD Blockchain Vulnerability Data Warehousing Google Fleet Tracking Permission Hard Drive IT Budget Hackers IP Address Spyware Hotspot Remote Workers Favorites Help Desk Permissions Company Culture Microsoft Printing Black Market Consulting Proactive Office Tips App How To Bookmarks Halloween Deep Learning Techology Antivirus Intranet Business Growth Cameras VPN Education Best Practice Sports Wireless How To Managed Services Provider Licensing Twitter Compliance Google Wallet Administrator Smart Technology Administration Dark Web Display Law Enforcement Mobile Data Piracy Multi-Factor Security Typing Miscellaneous Malware Backup and Disaster Recovery Work/Life Balance Data Management Budget communications Computer Technology Laws Firefox Documents Data Security Cloud Managed IT Services Internet of Things Android Document Management Networking Websites Troubleshooting Tracking Hosted Solutions Apple Unified Threat Management Conferencing Files Specifications Network Security Router Migration Marketing Save Time Authorization Laptop RMM User Tips Analyitcs Cost Management Phone System Error Alert Healthcare Mobile Devices Cables Screen Reader Cortana Cyber Monday Identity Black Friday eWaste Lithium-ion Battery Efficiency Identities Infrastructure Modem Customer Service Language Alerts Cookies Disaster WPA3 Windows 8 Digital Payment CIO Remote Worker Chatbots Samsung Flexibility Password Procurement CCTV Regulations Augmented Reality Holiday Office Communication Managed IT Service Undo Project Management Encryption VoIP Enterprise Resource Planning Electronic Health Records Automobile Government Paperless Office Shortcut Unified Communications Finance Virtual Reality Notifications Mirgation Google Docs Hardware Cache Business Continuity Experience Wires 5G Outlook Monitors Safety SaaS Digital Business Technology Emoji Mobile Device Managment Business Intelligence Buisness Applications Recycling Social Information Technology Avoiding Downtime GPS Environment Remote Computing Heating/Cooling Virus Gmail Server Backups Training Content Filtering Identity Theft Processors Digital Signature Employer-Employee Relationship Legislation Business Management Domains Human Error Productivity History Personal Information Trending Utility Computing Email Development Hacker Co-managed IT Cryptocurrency Two-factor Authentication Legal Google Maps Browser Virtual Desktop Computing Infrastructure Star Wars Managing Stress Mobility Server Management Tip of the week Meetings Computers Mobile Security Customer Relationship Management Programming Mobile Office Spam Network IT Support End of Support Printer Web Server Windows 10 Outsourced IT Cybersecurity Upgrade Servers Best Practices Relocation Private Cloud Virtualization Tip of the Week VoIP Lenovo Cybercrime Gadget Social Networking YouTube Webcam Robot Consumers Maintenance Security Cameras Superfish IT Support Health Internet Storage WannaCry Bring Your Own Device Bandwidth Mobile Computing User Error Social Engineering Zero-Day Threat Wi-Fi Microsoft Office Fraud PowerPoint Privacy Asset Tracking Cabling Enterprise Content Management Staff Data storage Network Management Downtime Botnet Saving Money Recovery Microsoft Excel Mobile Running Cable Social Media Uninterrupted Power Supply Application Alt Codes Hiring/Firing Managed IT Vulnerabilities Fun Mobile Device Software iPhone Telephony Hard Disk Drive Search Comparison Google Calendar Corporate Profile Network Congestion Redundancy Scam Physical Security Chrome Management User Apps Business Hacking Drones Data loss Analytics Productivity Website Instant Messaging Cyberattacks Tech Support SharePoint Cooperation Hard Drives Big Data Word Innovation Public Cloud Geography Tech Term Tablet G Suite Operating System Mouse Writing Risk Management Travel Smartphones Ransomware Monitoring Cloud Computing Business Owner IoT Workplace Tips Disaster Resistance Phishing Net Neutrality Break Fix IT Services Point of Sale Going Green PDF Operations Users Employee-Employer Relationship IT solutions LiFi Motion Sickness Automation Office 365 Data Breach Disaster Recovery Virtual Private Network Technology Nanotechnology Theft Refrigeration Saving Time Scary Stories IBM Software Tips Windows 10 Gadgets File Sharing Patch Management ROI Save Money Update Politics Downloads Tech Terms Supercomputer Upgrades Statistics Managed Service Provider Settings Windows Presentation Collaboration Facebook HIPAA Technology Tips Vendor Management Current Events Consultation Managed IT services Software as a Service Electronic Medical Records Smart Tech High-Speed Internet Cleaning Public Speaking Assessment Hacks Unified Threat Management E-Commerce Solid State Drive Read Only Mobile Device Management Connectivity

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...