Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Set Up a Business Succession Plan

b2ap3_thumbnail_death_of_your_business_400.jpgIf something debilitating were to happen to you, could your business carry on? This isn’t a pleasant scenario to think about, but it’s absolutely necessary to have a contingency plan in place for reasons like this. Also known as a business succession plan, if you have a plan in place, then you don’t have to worry about what the future holds, at least, for your business.

Continue reading

Tip of the Week: 3 Easy Ways to Connect Your Business with Your Community

b2ap3_thumbnail_is_your_community_involved_400.jpgIt’s important for a business to be connected with their community. Even if you have a global market, it’s still important to invest in the city you’re headquartered in. It’s where you and your employees live, and if you can build relationships and connect with other organizations in your community, only good things can come from it.

Here are three easy ways your business can become more involved and respected within your community.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Communication Remote Computing App Time Management Distributed Denial of Service Avoiding Downtime Hackers Education Workplace Tips Managed IT services Running Cable Google Calendar Network Zero-Day Threat Intranet Sports Features Mail Merge Artificial Intelligence IP Address Computers Mirgation Business Intelligence Computing Identity Sync Computer Repair Consumers Internet Exlporer BYOD Telephone Systems Vulnerabilities Motherboard Infrastructure User Applications Windows 8 Saving Time Small Business Enterprise Resource Planning Cybersecurity Cortana VoIP Laptop 5G RMM Statistics Server Redundancy Windows 7 Firefox Data Backup IoT Halloween Asset Tracking Database Cloud Language Mobile Data Mobile Device Managment Customer Service Tracking Router Phishing Downtime Bandwidth Voice over Internet Protocol Managed IT Service Phone System Best Practice Backup and Disaster Recovery Touchscreen Domains Mobile Security Tablet Risk Management Smartphones Unsupported Software Favorites Analytics Backup Professional Services Operations Wearable Technology Assessment CIO BDR Legislation Mobile Device Management Wires Hacking Save Time Hacks Analyitcs Webcam Computing Infrastructure Disaster Resistance Users Networking Best Practices Office Tips Uninterrupted Power Supply Outlook Monitoring Holiday Point of Sale Development Proactive IT Managed IT Mobile Computing Cooperation Privacy Hard Drives Upgrade Health WPA3 Electronic Health Records Company Culture Conferencing Office E-Commerce Microsoft Authentication Software Bluetooth Mobility Spyware Web Server Permissions 3D Printing Virus Google Wallet Email Hard Disk Drive Travel Hacker Data Recovery Google Drive Unified Threat Management Blockchain Managed IT Services Troubleshooting Hard Drive Money Ransomware YouTube Paperless Office Relocation CCTV Physical Security Software Tips WiFi End of Support Digital Signature Innovation Saving Money Miscellaneous Automobile Telephony Cache IBM Geography Emoji Fun Business Owner Firewall Tech Support Presentation Heating/Cooling Employees Wireless Management Alerts Employer-Employee Relationship Customer Relationship Management Technology Tips Techology Project Management File Sharing Digital Payment Shortcut Password Remote Workers Productivity Regulations Samsung Cybercrime Spam Chrome Remote Worker Managed Services Provider Theft Black Friday Humor Computer Environment Search Help Desk Solid State Drive Identity Theft Current Events Tech Term Software as a Service Managed Service Provider Data loss Virtual Reality HIPAA Vendor Management Compliance Smartphone Programming Efficiency Chatbots Bitcoin Social Networking Wi-Fi PowerPoint Break Fix Employee-Employer Relationship Save Money Wireless Technology GPS Trending Word Upgrades Piracy Office 365 Data storage Private Cloud Google Docs Refrigeration Websites Modem WannaCry Windows Tech Terms Big Data Quick Tips Managing Stress Recovery Cabling Gadgets Security Browser IT Technicians Nanotechnology Maintenance Healthcare Notes Consulting IT Support How To Malware G Suite Alt Codes Content Filtering Backups Virtual Assistant Passwords Co-managed IT Two-factor Authentication Google IT Budget Flexibility Staff SaaS Outsourced IT Smart Tech Consultation Virtualization Mobile Device Apps Business Computing Experience IT solutions Screen Reader Twitter Authorization Information Scary Stories Recycling Mobile Devices Public Speaking Migration Knowledge Gadget Hardware Licensing Documents Cloud Computing Network Security Social Superfish Collaboration Legal Remote Monitoring and Management MSP Mouse Machine Learning eWaste Gmail Hosted Solutions Black Market Information Technology USB VPN Productivity Social Engineering Hosted Solution The Internet of Things Operating System IT Services Security Cameras Mobile Office Procurement Test Motion Sickness Utility Computing Storage Printing Virtual Private Network Cables Network Management Digital User Error Administrator Finance Augmented Reality Data Security Hotspot OneNote LiFi Antivirus Training Scam Address Data Specifications Alert Google Maps Corporate Profile How To Law Enforcement Proactive Business Management IT Consulting Apple communications Remote Monitoring Patch Management Cyber Monday iPhone Windows 10 Disaster Writing Microsoft Office Settings Virtual Desktop Administration Dark Web Encryption Multi-Factor Security Managed Service Tip of the week SharePoint Servers Entrepreneur Hiring/Firing Mobile Human Error Technology Laws Bring Your Own Device Windows 10 Dark Data Cleaning Instant Messaging Business Technology Cyberattacks Politics Technology Electronic Medical Records Government Deep Learning Display Internet Comparison Network Congestion Personal Information IT Consultant Tip of the Week Lithium-ion Battery PDF Website Computer Care Error Competition Lenovo Processors Fraud Chromebook Data Warehousing Notifications Android Vulnerability Marketing Retail Server Management Files Automation Social Media Going Green Monitors IT service Drones Application Robot Unified Communications Access Control Budget Cost Management Microsoft Excel Identities User Tips Undo Cameras Crowdsourcing Public Cloud IT Support Disaster Recovery Update Read Only Business Growth Work/Life Balance Wasting Time Supercomputer Business Continuity Data Management Net Neutrality Internet of Things Staffing Typing History Document Management Connectivity Meetings Cryptocurrency Fleet Tracking Buisness Cookies Permission Smart Technology Business Downloads Facebook ROI VoIP Enterprise Content Management Unified Threat Management Star Wars Printer Bookmarks Financial Safety IT Management Data Breach Botnet High-Speed Internet Taxes

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...