Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Terminology: Bookmark

Tech Terminology: Bookmark

The Internet is home to a vast amount of knowledge. Undoubtedly you’ll find yourself revisiting certain sites more often than others to take advantage of the information contained within. Thankfully, the bookmark system is a great way to make this happen, giving users an easy and efficient way to navigate back to frequently-visited websites.

Continue reading
0 Comments

Tech Term: Cookies

Tech Term: Cookies

Browser cookies might not sound delicious, but they are a particularly important part of your browser’s technology. Do you actually know what they do, though? Today’s tech term will explain just what these cookies are, as well as the purpose they serve for your organization.

Continue reading
0 Comments

Tip of the Week: Tricks for Better Internet Browsing

Tip of the Week: Tricks for Better Internet Browsing

If you use the Internet every single day, you’ll start to realize that you can use it more effectively for achieving your goals. In cases like this, it’s important to look at ways you can improve your overall use of the Internet, as it’s the key way you access important information, applications, and contacts. Here are some day-to-day tips that you can use to help improve your mastery of the Internet.

Continue reading
0 Comments

Tip of the Week: Control Where Your Downloads Are Saved

Tip of the Week: Control Where Your Downloads Are Saved

Whenever you download a file from the Internet, the file will, by default, go to an aptly-titled folder in Windows called Downloads. Unless you change the default settings, your files will always be saved here. But what if you want to make it so that your downloads go somewhere else? You can accomplish this pretty easily. We’ll walk you through how to do it for some of the most popular browsers, including Google Chrome, Microsoft Edge, and Mozilla Firefox.

Continue reading
0 Comments

Tip of the Week: Closed a Tab Accidentally? Here’s How to Restore It

Tip of the Week: Closed a Tab Accidentally? Here’s How to Restore It

Everyone has accidentally closed an important web browser tab before they were finished with it. What can you really do about it, though? You might expect that you have to search for the page again, but there’s a much easier way to do it. In your Google Chrome browser on a PC or smartphone, you can reopen closed tabs relatively easily.

Continue reading
0 Comments

Windows 10 is Super Popular... Microsoft’s New Edge Browser, Not so Much

Windows 10 is Super Popular... Microsoft’s New Edge Browser, Not so Much

Have you upgraded your business’s workstations to Windows 10 yet? If not, you should ask yourself why you haven’t done so. However, if you have upgraded, you’re one of the 25.3 percent of people using Windows 10. Windows 10 seems to be a great hit among end-users, but Microsoft’s new browser, Edge, isn’t so fortunate.

Continue reading
0 Comments

Malvertising: Hackers are Paying For Ad Space on Popular Websites

b2ap3_thumbnail_click_on_malware_ad_400.jpgA good business practices extreme caution when using the Internet, thanks to hackers using any means possible to unleash threats against organizations of all sizes. You teach your employees how to avoid threats and to avoid suspicious websites, but what if that’s not enough to keep hackers out of your network infrastructure?

Continue reading
0 Comments

Tip of the Week: 5 Common Sense Tactics to Safeguard Your Online Identity

b2ap3_thumbnail_anonymous_internet_use_400.jpgThe Internet can be a dangerous place thanks to the anonymity it provides. Yet, this anonymity is limited, especially if you take part in questionable Internet browsing activities. Take, for instance, the hack of Ashley Madison, a website dedicated to cheating on one’s spouse. This July, a hacker group called the “Impact Team,” infiltrated the site and is now threatening to expose these cheaters.

Continue reading
0 Comments

5 Nifty Google Easter Eggs You Might Not Realize Exist

b2ap3_thumbnail_chome_easter_eggs_400.jpgGoogle is the world’s most popular search engine, and it’s grown so outrageously popular that there’s even a verb named after it; “to google” is to search for something on the Internet using Google. However, to this day, Google continues to surprise the public with fun Easter eggs, hidden functions which provide a level of entertainment to the user.

Continue reading
0 Comments

Windows 10, Spartan, HoloLens, and More: The Microsoft Live Event in Retrospective

b2ap3_thumbnail_windows_logo_10_400.jpgA few weeks ago, Microsoft presented several of their latest projects at a live event. As expected, there was a lot of focus put on the new Windows operating system, Windows 10, in addition to their in-development browser Spartan; but what we didn’t expect Microsoft to show off was a slew of brand spanking new consumer technologies.

Continue reading
0 Comments

Will You Make Microsoft’s Spartan Your Default Web-browsing Warrior?

b2ap3_thumbnail_windows_10_400_20150119-221737_1.jpgIn addition to Microsoft’s upcoming new operating system, Windows 10, the software company has released that there is a new web browser in production. This new browser, code-named “Spartan,” is expected to have similar functionality to Mozilla’s Firefox and Google Chrome, and will be released alongside Windows 10.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Privacy Outlook Current Events Firefox 3D Printing Identities Staffing IT solutions Cloud Computing Unified Communications Wireless Technology Office 365 Black Friday Display Backup and Disaster Recovery Emoji Recovery CCTV RMM Humor Avoiding Downtime Monitors Cache Language Antivirus Redundancy IT Support Applications Two-factor Authentication Password History Touchscreen Solid State Drive Safety Analytics Knowledge Data storage Data Security Virtual Private Network Samsung Backups Computers Virtual Reality How To Cost Management User Error Windows 7 Voice over Internet Protocol Paperless Office Hiring/Firing Wireless Mobile Security Recycling Dark Data Identity Social Engineering Consumers Smart Technology Hardware Theft Windows Shortcut Troubleshooting Productivity YouTube Phishing Bitcoin Star Wars Distributed Denial of Service Private Cloud Instant Messaging User Mouse Analyitcs Tech Terms Training IT Services GPS Proactive Managed IT services Malware Specifications Cameras Deep Learning Ransomware Typing Outsourced IT Document Management Customer Relationship Management Microsoft Excel Trending Twitter High-Speed Internet Spyware App Read Only Best Practice Customer Service Vulnerability Server Management Maintenance Public Speaking Motion Sickness Law Enforcement Point of Sale Windows 10 Wi-Fi Cleaning Smartphone Google Telephony Proactive IT Collaboration Personal Information Cyber Monday Firewall Holiday Business Technology Piracy Google Calendar Digital VoIP USB Regulations Heating/Cooling Microsoft Save Money Refrigeration Tip of the Week Competition Microsoft Office Machine Learning Google Wallet eWaste Going Green IT Consulting Data Management Administrator Intranet Work/Life Balance IT service Artificial Intelligence Experience BDR Cyberattacks Documents Cybersecurity Management IT Budget Motherboard Chrome Address Unified Threat Management Relocation Settings ROI Search Office Tips Technology Patch Management Unified Threat Management Hard Drives Hosted Solution Time Management Employee-Employer Relationship Marketing Physical Security Managed IT Error Networking Virtual Desktop Fraud Google Drive Software Tips Procurement Comparison Staff Superfish VPN Project Management Servers IT Consultant Upgrades Software Business Owner Human Error Network Management Business Intelligence Dark Web Communication Network Employees Hotspot Lithium-ion Battery Domains Cortana IT Support Mobile Device Management Remote Computing Websites Notes Flexibility Computing Email Smart Tech Enterprise Resource Planning WPA3 Cabling Business Growth Mail Merge Mirgation Network Security User Tips Tip of the week SaaS MSP Alerts Webcam Business Saving Money Tech Support Features Wearable Technology Data Warehousing G Suite Finance Mobile Office Gadgets Quick Tips Employer-Employee Relationship 5G Halloween Best Practices The Internet of Things communications Efficiency Mobile Device Managment Bookmarks Multi-Factor Security Data Breach Users Crowdsourcing VoIP Blockchain Mobile Devices Operating System Robot Cookies Operations Application Public Cloud Authorization Presentation WiFi Running Cable Saving Time Healthcare Company Culture Mobile Computing Co-managed IT Break Fix Mobile Office Notifications CIO Politics Education Statistics Business Continuity Botnet Server Chromebook Supercomputer Business Computing BYOD Remote Monitoring and Management Tablet Automobile Virtualization Update Cloud Security Cameras Entrepreneur Managed IT Service Mobility Gadget Scary Stories Sports Router HIPAA Downtime Downloads Printing Health Connectivity Vulnerabilities Retail Data loss Hacks Android Mobile Device Black Market Technology Laws Wasting Time Alert Telephone Systems Enterprise Content Management Hacking Uninterrupted Power Supply Remote Workers Content Filtering Web Server Windows 8 Data Backup Remote Monitoring Technology Tips iPhone Passwords Mobile Data Printer Remote Worker Managing Stress Permission Internet Exlporer Upgrade Asset Tracking Unsupported Software Government Fleet Tracking End of Support Money Network Congestion Travel Virtual Assistant Innovation WannaCry Phone System Migration Small Business Permissions IP Address Spam Programming Laptop Buisness Bluetooth Disaster Recovery Security Productivity Computer Encryption Electronic Health Records Development Data Recovery How To Legislation Access Control Scam Lenovo Administration Social Networking Browser Meetings Wires IoT Internet of Things Computing Infrastructure Computer Care Internet Favorites Infrastructure SharePoint Screen Reader Assessment Disaster Conferencing Authentication Financial Hard Disk Drive Legal Nanotechnology Consulting Fun Backup PowerPoint Zero-Day Threat Undo Workplace Tips Writing Cables Managed Service Provider Disaster Resistance E-Commerce Budget Vendor Management Drones Social Media Test Managed Service Processors Virus Corporate Profile OneNote Storage PDF Software as a Service Tech Term Risk Management Professional Services Alt Codes Monitoring Automation LiFi Save Time Bring Your Own Device Licensing Cooperation Hosted Solutions Hackers Taxes Managed IT Services Google Maps Tracking Cryptocurrency Apple File Sharing Augmented Reality Information Compliance Computer Repair Windows 10 Consultation Modem Apps Word IBM Digital Signature Social IT Management Digital Payment Facebook Chatbots Techology Gmail Utility Computing Big Data Files Miscellaneous Database Help Desk Sync Information Technology Net Neutrality Electronic Medical Records Cybercrime Environment Data Geography Bandwidth Business Management Hard Drive IT Technicians Managed Services Provider Hacker Identity Theft Google Docs Website Smartphones

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code