Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Newsflash! Electronic Signatures Deemed Legal ...146 Years Ago!

b2ap3_thumbnail_e_signature_400.jpgWhat’s so special about a physical signature created with pen and paper? If it’s an autograph from your favorite celebrity, then you’ve got something special. Other than that, there’s no reason why an electronic signature can’t get the job done in today’s hi-tech business world.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Printing Break Fix Hacking Government Disaster Remote Workers Geography Content Filtering Storage Website eWaste Employer-Employee Relationship Encryption Licensing Tip of the week Assessment communications Motion Sickness Electronic Medical Records Upgrades Hackers User Tips Productivity Meetings G Suite Update Writing Paperless Office Authentication Gadget Authorization Software PDF Cameras Health Botnet Office 365 Touchscreen IBM Spyware Mobile Data Enterprise Content Management Black Friday Applications Data Backup Hiring/Firing Computing Infrastructure Data storage Migration Mobile Security Cooperation Cost Management Windows 10 Computing Websites Scary Stories Consultation Wireless WPA3 Computer Care Gmail Data Management Project Management SharePoint Cyber Monday Time Management Network Vulnerabilities Vendor Management Business Intelligence Point of Sale App Communication Malware Staffing Net Neutrality PowerPoint Downtime User Error Distributed Denial of Service SaaS Avoiding Downtime Co-managed IT Public Cloud Computer Disaster Resistance Smart Technology Cables Bitcoin Facebook Mobility Business Computing Unified Threat Management Mobile Computing Cache Hacker Virtual Reality Google Drive Consulting Digital Signature Piracy LiFi Unified Threat Management Monitors Politics IoT Printer Best Practices iPhone Server Retail RMM Tablet Managed IT services Black Market Unsupported Software Webcam Employees Development Employee-Employer Relationship Save Time Samsung Running Cable OneNote Cyberattacks Innovation IT Management Notifications Information Superfish Taxes Business Management Spam Data Cryptocurrency Business Firefox Travel Virtual Private Network IT Support Automobile Connectivity Current Events IT Budget The Internet of Things Files Social Programming Administration Processors Business Owner Refrigeration Bookmarks Crowdsourcing Cookies Lenovo Downloads Zero-Day Threat Safety Sports Telephony Data Warehousing Backup Customer Service Address Undo Halloween Managed IT Service Remote Monitoring and Management Identity Language Multi-Factor Security Hard Disk Drive Test Office Network Congestion Data Security Human Error Flexibility Software Tips Scam Word Emoji Virtual Desktop Save Money Backups Fraud Saving Money Utility Computing Domains Hosted Solution Social Media Quick Tips Chromebook Typing Trending Mobile Device Management Technology Laws CIO Solid State Drive Wearable Technology Screen Reader Modem Finance Security Cameras Mobile Office Education IT solutions Server Management Techology Staff Company Culture Public Speaking Sync Personal Information Patch Management Analytics Mirgation Specifications Bring Your Own Device Hardware IT Services Cortana Lithium-ion Battery Monitoring Procurement IT service Workplace Tips Features Mouse VoIP IT Consulting Proactive Information Technology Alert Financial Alt Codes End of Support Microsoft Office Gadgets Deep Learning Social Networking Google Docs How To Collaboration Mail Merge Hosted Solutions Windows 10 Big Data Statistics Automation Mobile Device Servers Artificial Intelligence Intranet Smartphone Best Practice Bluetooth Dark Web Fun Technology Alerts Legal History YouTube Money USB Google Maps VoIP Managed Services Provider Remote Worker Identity Theft Computer Repair Two-factor Authentication Nanotechnology Business Continuity Backup and Disaster Recovery Tracking Star Wars Competition Tech Terms Efficiency Data Recovery Application Machine Learning Managing Stress Firewall Digital Managed Service Remote Monitoring Experience Networking Cloud Computing Motherboard Read Only Customer Relationship Management IT Technicians Upgrade Email Comparison Chrome Marketing Cleaning Smartphones Wireless Technology Passwords Apple Internet Virtualization Display Laptop File Sharing Data loss Work/Life Balance Wi-Fi VPN Microsoft Legislation Computers Training Dark Data IP Address Asset Tracking Shortcut Cybercrime Analyitcs 3D Printing 5G High-Speed Internet Remote Computing Saving Time Windows Budget Proactive IT Heating/Cooling Tech Support Tip of the Week ROI Risk Management Fleet Tracking Productivity WiFi Ransomware Hotspot Software as a Service Managed IT Small Business How To Tech Term Managed IT Services BYOD Internet of Things Redundancy Business Growth Augmented Reality Twitter Drones Security Regulations Digital Payment Windows 8 Users Telephone Systems Outsourced IT Network Security Smart Tech Electronic Health Records Corporate Profile Entrepreneur Microsoft Excel Physical Security Supercomputer WannaCry Web Server Troubleshooting Management Disaster Recovery Google Calendar Settings Mobile Device Managment Network Management GPS Technology Tips Holiday Router Operations Android Cybersecurity Hard Drive Mobile Compliance Wires Blockchain Maintenance Permissions Enterprise Resource Planning Miscellaneous IT Support Hacks Law Enforcement Bandwidth Cabling BDR CCTV Administrator MSP Social Engineering Browser Help Desk Identities Going Green Presentation Office Tips Managed Service Provider Privacy Apps HIPAA Recovery Theft Document Management Internet Exlporer Documents Instant Messaging Business Technology Vulnerability Data Breach Hard Drives Uninterrupted Power Supply Conferencing Recycling Antivirus Outlook Relocation Unified Communications Virus Environment User Error Buisness Cloud Access Control Healthcare IT Consultant Mobile Devices Phone System Knowledge Infrastructure Password Favorites Google Private Cloud Consumers Humor E-Commerce Robot Chatbots Phishing Permission Operating System Search Google Wallet

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...