Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

You Need More Than a Power Strip to Protect Your Company’s Equipment

You Need More Than a Power Strip to Protect Your Company’s Equipment

What would happen if you were in the middle of typing a report or performing some task, and the office suddenly lost power? Too many would find themselves staring blankly at an equally blank screen as their infrastructure suddenly ceased operations. However, there is a device that can help save you from the worst effects of sudden power loss.

Continue reading

Tip of the Week: How to Defend Your Network from 3 Top-Tier Disasters

b2ap3_thumbnail_protect_your_network_400.jpgYour company’s network can be very sensitive at times, and even the slightest disruption can cause downtime. Be it an immense natural disaster or something as simple as forgetting your login credentials, it’s common problems which cause the most trouble for businesses. In order to fight against these issues, it’s best to prepare yourself for these three common (and fairly simple) scenarios.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Software Permission Computers Gmail Gadget Wireless Connectivity Remote Monitoring and Management Bandwidth Passwords Wireless Technology Servers Operating System Network Management Environment Break Fix Facebook WannaCry IT Consultant Hotspot Firewall Browser Chrome Remote Worker Spyware Hosted Solutions Documents 5G OneNote Mobile Device Management Printing Technology Tips Enterprise Content Management Proactive IT Screen Reader Office Writing Google Wallet Cost Management Web Server Training Human Error Robot Google Docs Proactive Procurement Information Technology Downloads 3D Printing Android Network Congestion Paperless Office Fraud Financial Administrator BDR Google Maps Google Typing Enterprise Resource Planning Efficiency Intranet Black Market Business Management Google Drive Hard Disk Drive Computer Care Notifications Meetings Cameras Communication Virtualization App Money Data Breach Windows Knowledge Files Public Cloud Malware Big Data Business Owner Social Engineering Sync Hiring/Firing Information Mobile Computing Chatbots Asset Tracking Bookmarks Windows 10 Techology Public Speaking Healthcare Theft Upgrades IT Services Geography Outlook Entrepreneur Digital Disaster Resistance Data Security Experience History Outsourced IT Business Hacking Microsoft Excel Unified Communications User Tips Humor Uninterrupted Power Supply Wearable Technology Smart Tech PowerPoint Going Green Scary Stories Nanotechnology Business Intelligence Smartphone Physical Security Vendor Management Presentation Microsoft Office Technology Laws Social Media Identity IT Consulting SharePoint Save Time Current Events Tablet Sports Internet MSP Laptop IT Technicians Holiday Security Downtime Samsung Favorites Wires Antivirus Politics Spam Virtual Private Network VoIP Vulnerability Google Calendar Operations Time Management Motion Sickness IT Support Bring Your Own Device Data Recovery Personal Information Hard Drive Analyitcs Managed IT Machine Learning Data Warehousing End of Support User Error Finance Star Wars User Dark Data Applications Staffing Webcam Help Desk Digital Payment Cyber Monday Internet of Things Zero-Day Threat Analytics Backups Managing Stress Content Filtering Automation Assessment Chromebook High-Speed Internet ROI Education Read Only Language Hard Drives Smart Technology Word Display Data storage Identity Theft Business Growth GPS Users Telephone Systems Buisness VPN Access Control Network Cybersecurity Bitcoin Saving Time Legislation Hackers Data Backup Mobility Avoiding Downtime Private Cloud Cybercrime File Sharing Authorization Two-factor Authentication Apple Heating/Cooling IT Management Router Refrigeration Dark Web YouTube IT service Server Remote Workers Management Consumers Cryptocurrency Productivity Marketing Net Neutrality CCTV Modem Company Culture Managed IT Services Innovation Customer Service Apps Mobile Device Remote Computing Electronic Medical Records Drones Collaboration Telephony Computer Point of Sale Software as a Service Employee-Employer Relationship Hosted Solution Phone System Permissions Automobile BYOD Error Relocation Address RMM Websites Digital Signature Supercomputer Virus Halloween Disaster Recovery iPhone Tip of the week Mobile Security Competition Taxes Retail Maintenance Unified Threat Management Safety G Suite Hacks Workplace Tips Botnet Scam Ransomware Solid State Drive Mobile Device Managment Licensing IBM Wi-Fi Administration Employees Virtual Reality Data loss Data Management Cache Windows 10 Mobile Office Shortcut E-Commerce Recovery Piracy Cables Alt Codes Cloud Computing Cortana Project Management Social Networking How To Server Management Augmented Reality Redundancy CIO Small Business Utility Computing Alerts Managed Service Provider Software Tips Patch Management Backup Twitter Employer-Employee Relationship Tech Terms Compliance Saving Money Cyberattacks IT Support Social Instant Messaging Business Computing communications Staff Mobile Data Disaster IT Budget Customer Relationship Management Emoji eWaste Save Money Black Friday Vulnerabilities Business Technology Deep Learning Hacker Managed IT services Statistics Consultation Cloud LiFi Best Practice Virtual Desktop Risk Management Tip of the Week Features Miscellaneous Lenovo Budget Consulting Email IT solutions Undo Specifications Networking Flexibility WPA3 Unified Threat Management Troubleshooting Recycling Bluetooth Internet Exlporer Network Security Distributed Denial of Service Application Office Tips Travel Crowdsourcing Business Continuity Running Cable Test Migration Quick Tips Monitors Hardware Upgrade Storage Touchscreen Electronic Health Records Technology Mirgation Health Monitoring Firefox Multi-Factor Security Cleaning Regulations Corporate Profile Co-managed IT Legal Processors Alert Tech Term Fleet Tracking Computer Repair Computing Office 365 Remote Monitoring Trending Gadgets Managed IT Service Security Cameras Password The Internet of Things Government Productivity How To Work/Life Balance Privacy SaaS Programming Tech Support Update Windows 8 Document Management IP Address Website Authentication Cabling WiFi Blockchain Smartphones Settings Motherboard USB Backup and Disaster Recovery Cookies Managed Service Encryption Fun Search Domains HIPAA Artificial Intelligence Mobile Identities Mobile Devices Computing Infrastructure Tracking Printer Superfish Unsupported Software Best Practices Managed Services Provider Lithium-ion Battery Infrastructure Microsoft Data IoT Development VoIP Comparison Mouse Cooperation Conferencing Phishing Law Enforcement PDF Mail Merge

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...