Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Lock Your Computer By Simply Walking Away With Dynamic Lock

Tip of the Week: Lock Your Computer By Simply Walking Away With Dynamic Lock

Security best practices demand that a workstation should never be left unlocked. However, it can be really tempting to leave it unlocked if you only plan on stepping away for a moment--but unfortunately, that moment can easily turn into many if you are distracted from your task. Fortunately, there is now a fix that relies on the one device most of us are never without: our phones.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Cyber Monday Conferencing Mobile Device Mail Merge Application Innovation Supercomputer Virtual Assistant Sports Patch Management Chromebook Enterprise Resource Planning Authentication Downloads Robot Office Buisness Utility Computing Health Technology Tips Competition User IT Technicians CCTV Applications Experience Maintenance GPS IP Address Firefox MSP Writing Telephone Systems ROI Marketing Alt Codes Social Media Wi-Fi YouTube Permissions USB Distributed Denial of Service Digital Cost Management Virtual Desktop Uninterrupted Power Supply Email Co-managed IT Help Desk Bookmarks Efficiency Instant Messaging Private Cloud SharePoint Touchscreen Cabling Mirgation Firewall Wireless Technology Windows 10 Quick Tips Tip of the week Bluetooth Comparison 3D Printing Managed IT User Error Windows 7 Mobile Security Troubleshooting Website LiFi Avoiding Downtime Windows 8 Enterprise Content Management Wasting Time Proactive IT Notes Wires Management Two-factor Authentication Employer-Employee Relationship Emoji Shortcut Augmented Reality Miscellaneous Asset Tracking Hardware Business Computing IBM Display Google Drive Cloud IT Support Remote Workers Networking Cybersecurity Virus Human Error Mobility IT Services Business Owner Scam Wireless Data Read Only Hiring/Firing Data Warehousing Fun Permission Gadgets Mobile Office Business IT Consulting Dark Data Mobile Data Gadget Government Google Docs Net Neutrality Small Business Chrome Fleet Tracking Piracy Network Assessment Saving Time Files Company Culture Vulnerabilities Cache Mobile Alert Network Management Nanotechnology Education WiFi Statistics Cybercrime Malware Money Paperless Office Machine Learning Apps Computing Infrastructure Botnet Unsupported Software BYOD Employee-Employer Relationship Microsoft Deep Learning Software Tips Users iPhone Password Word CIO Cooperation Search RMM Webcam Documents Relocation Settings Motherboard Google Consultation Microsoft Excel Processors Content Filtering Encryption Tracking Servers Privacy Black Friday Managing Stress Best Practices Digital Payment Microsoft Office Identity Passwords Legislation Outsourced IT Features How To Android Laptop Travel Meetings Motion Sickness Office Tips Lithium-ion Battery eWaste Infrastructure Techology Notifications Internet of Things Administrator Windows 10 Zero-Day Threat Digital Signature Managed IT Services Hacking Politics Consumers Remote Monitoring and Management Screen Reader Communication Licensing Hotspot Budget Hosted Solution Mobile Device Management Sync App Refrigeration Compliance Database Public Speaking Disaster Data Backup Safety Tablet Managed IT Service communications Blockchain Computer Care Knowledge Drones Server Management Disaster Resistance Trending Virtualization Intranet Dark Web Tech Terms Productivity Going Green Professional Services Specifications Training Identities IT Support Corporate Profile Tech Support Computers Risk Management Business Growth Social Networking Business Management Computer Data Management Project Management Network Security Domains Phishing PowerPoint Internet Exlporer Data Breach Vulnerability Data storage Chatbots Backups Managed Service Virtual Reality Flexibility Unified Threat Management Theft Physical Security Hard Drives Time Management Access Control Customer Service Web Server Automation End of Support Finance Hard Drive Operations Gmail Automobile Hard Disk Drive Internet Vendor Management Development Spam Antivirus VoIP Law Enforcement Managed Services Provider Current Events Cryptocurrency Monitoring Software Ransomware Business Intelligence Telephony Bitcoin Employees Holiday Remote Computing The Internet of Things Social Hacker Printer Upgrade Analytics Monitors VPN Information Technology Office 365 IT Management History Consulting Virtual Private Network Artificial Intelligence Halloween Cameras Presentation IT solutions Save Money Connectivity WannaCry E-Commerce Mobile Devices Outlook Technology Address Healthcare Apple Google Maps 5G Hacks Operating System Data Recovery Smart Technology G Suite Public Cloud Save Time Black Market Personal Information Proactive Mouse Information Staff Running Cable Cortana Printing Workplace Tips Disaster Recovery Authorization Managed IT services SaaS Mobile Device Managment Tech Term Customer Relationship Management Cookies Software as a Service Smartphone Humor Social Engineering File Sharing Taxes VoIP Network Congestion Procurement Server Undo Crowdsourcing User Tips Recovery Smart Tech Entrepreneur Facebook Migration Regulations Data loss Samsung Wearable Technology Financial Legal Business Continuity Typing Browser Storage Language Remote Monitoring Geography Voice over Internet Protocol Break Fix Fraud Twitter Remote Worker Router Tip of the Week Technology Laws Bring Your Own Device Hackers Administration Identity Theft OneNote Backup Computer Repair Smartphones PDF Collaboration Update Data Security Spyware Superfish Hosted Solutions Electronic Health Records Staffing IT Consultant Security Cameras Security Redundancy Best Practice High-Speed Internet Downtime WPA3 Point of Sale Programming Managed Service Provider Big Data Environment Document Management Scary Stories Solid State Drive Analyitcs Lenovo Computing BDR Error Star Wars Retail Bandwidth Test Unified Communications Business Technology Saving Money Cables Phone System Favorites Google Wallet IoT Upgrades Mobile Computing Electronic Medical Records Productivity Google Calendar IT Budget How To HIPAA Recycling Heating/Cooling Websites Unified Threat Management Backup and Disaster Recovery Windows IT service Cloud Computing Modem Alerts Work/Life Balance Cleaning Cyberattacks Multi-Factor Security

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...