Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Natural Disasters Can Have a Major Impact on Business

Natural Disasters Can Have a Major Impact on Business

A recent surge of hurricanes, wildfires, earthquakes, and floods have crippled major cities and devastated entire regions all over the world. In the aftermath of these events, business owners are faced with a few glaring truths - one of which is the undeniable vulnerability of their business’ future in the event of a disaster. Most of the major news outlets are reporting this figure: according to the Federal Emergency Management Agency (FEMA), 40% of small businesses never recover from a disaster. Despite all the literature and precautionary tales surrounding these catastrophic events, there are still an overwhelming amount of businesses that choose not to prepare for a disaster until it's too late.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Work/Life Balance Utility Computing Storage Hacking Language Taxes Botnet Websites Avoiding Downtime Customer Relationship Management Server Management Windows 10 Sports Network Congestion Scam Software Microsoft Office Permission Relocation Business Technology Cybercrime Productivity USB Corporate Profile Office Tips Hacker IoT Alerts Smartphone LiFi Document Management RMM Tablet PDF Safety Compliance Unified Communications Fleet Tracking Security Security Cameras Politics Hard Drives Windows 8 Bandwidth Network Humor Help Desk Google Docs Virtual Assistant Cloud communications Hosted Solutions Consulting Distributed Denial of Service Users How To Lithium-ion Battery Meetings Information Technology Error Staff Apps Smart Tech Finance Techology Test Windows 10 Outsourced IT Passwords Typing Cameras G Suite VoIP Backup and Disaster Recovery WPA3 eWaste Android Productivity Apple Health OneNote Operations Two-factor Authentication Travel Training Wi-Fi Computing Infrastructure Unsupported Software Disaster Resistance Professional Services IP Address Data Warehousing Antivirus Workplace Tips Google Calendar Gadgets Managed IT Service Fun User Tips Router Disaster Disaster Recovery Recovery Phone System 3D Printing Project Management Mobile Device Business Growth Education IT Services WannaCry Remote Monitoring Presentation Troubleshooting Procurement Favorites IBM Data Security Cyberattacks Cortana Instant Messaging Cloud Computing Data Recovery Connectivity Managed Service Conferencing Uninterrupted Power Supply Monitors Windows Business Computing Domains IT Management Proactive Identities Twitter Recycling Virus Features Malware Flexibility Bookmarks Backups Virtual Reality Cleaning Cooperation Buisness Black Friday Data loss Chromebook Search Microsoft File Sharing Administrator Cybersecurity Specifications Current Events Smartphones Management Quick Tips Office Data storage Automobile Electronic Health Records Digital Signature Scary Stories Augmented Reality 5G IT solutions Gadget Microsoft Excel WiFi Windows 7 Black Market IT Support IT Technicians Hotspot Virtualization Maintenance Data Management VPN Personal Information Remote Computing Laptop Hard Disk Drive Mobile Data E-Commerce Network Management Net Neutrality Dark Web Smart Technology Analyitcs Technology Laws Ransomware Company Culture Digital Payment Undo Computer Repair User Google Wallet Lenovo Spam Technology Tips Private Cloud Migration Modem Miscellaneous Computers BDR Downtime Running Cable Bring Your Own Device Telephone Systems Entrepreneur Tech Terms Retail Save Time Risk Management Digital HIPAA Managed IT Mobile Device Management Development Cost Management Settings How To Big Data Screen Reader Crowdsourcing Managed Services Provider CIO Phishing Samsung Business Management Robot Competition Voice over Internet Protocol Budget Mobile Security Writing Business Superfish Solid State Drive Efficiency Upgrade Nanotechnology Google Bitcoin Webcam Social Engineering Blockchain Managed Service Provider Remote Worker Paperless Office Environment Information Word Encryption Hackers Browser BYOD Trending MSP Mail Merge Saving Time Upgrades Marketing Address Infrastructure Tip of the week Notifications Break Fix Server Cables Hacks User Error Computer Refrigeration Cookies Remote Monitoring and Management Licensing Drones Holiday Software as a Service Best Practice Files Managing Stress Website Motherboard Business Continuity Wireless Facebook Backup Enterprise Content Management Network Security Computer Care Star Wars Hosted Solution Chatbots Co-managed IT Software Tips Employee-Employer Relationship Law Enforcement Public Speaking Hard Drive Best Practices Financial Small Business Firewall Vendor Management Mobile Office Remote Workers Sync Data Breach GPS Knowledge YouTube Public Cloud Geography Administration Email SaaS Collaboration Healthcare Telephony Touchscreen Redundancy Human Error Fraud Update Database VoIP History Deep Learning Google Maps Physical Security Web Server Innovation Social Heating/Cooling Notes Cryptocurrency Spyware Money CCTV Read Only Applications Emoji Vulnerability PowerPoint Employees Virtual Private Network Zero-Day Threat Computing Internet Exlporer Asset Tracking Mouse Theft Technology Permissions Virtual Desktop Authorization Automation Social Media Employer-Employee Relationship Alt Codes Saving Money Internet of Things Servers App Documents Hardware The Internet of Things Bluetooth Communication Tip of the Week Hiring/Firing Shortcut Going Green Legislation Electronic Medical Records Mobile Devices IT Support Consumers Comparison Chrome Time Management Cache Point of Sale Unified Threat Management Business Owner End of Support Experience Firefox Tracking Data Operating System Internet SharePoint Google Drive Networking Wires Enterprise Resource Planning Government Business Intelligence Content Filtering Assessment Processors Analytics Alert Piracy Programming Wireless Technology IT Consulting Tech Term Multi-Factor Security Vulnerabilities Legal Supercomputer Wasting Time Intranet Mobile Computing Unified Threat Management Patch Management Save Money Downloads Managed IT Services Printer Artificial Intelligence Monitoring Identity Theft Mobility IT Budget Wearable Technology Authentication Dark Data Identity Printing Office 365 Consultation Display Mobile Statistics Outlook Data Backup Access Control Halloween High-Speed Internet Proactive IT Privacy Tech Support Gmail Managed IT services Cabling Social Networking IT Consultant Staffing Customer Service Password iPhone ROI Mirgation Mobile Device Managment Regulations Cyber Monday IT service Motion Sickness Machine Learning Application

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...