Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Onboarding Remote Workers to Build a Better Business

Onboarding Remote Workers to Build a Better Business

The funny thing about entrepreneurs is that they have to be very detail-oriented in order to find any modicum of success. This often leads them to inevitably becoming controlling people overall. For years the technology has been present to utilize remote workers, but only recently has the practice become commonplace. This is largely because businesses have begun to seriously consider reducing costs as a strategy to gain profits.

Continue reading

Tip of the Week: Don’t Let Former Employees Haunt Your Business

Tip of the Week: Don’t Let Former Employees Haunt Your Business

For the modern small business owner, there are situations that you are forced to deal with that are frustrating; but, in the course of doing business would be considered normal. Then there are other situations that arise where, every step of the way, the figurative floor falls out from under your feet and you are forced to react quickly. Some of these circumstances can be pretty spooky for your business. This Halloween, we’ve decided to outline three scary circumstances your business may have to deal with, and how to keep your cool.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Management Microsoft Office Data Security Redundancy Holiday Downtime Data Breach Upgrades User Disaster Resistance Competition Business Owner Processors Robot Web Server Financial Unified Threat Management Sports Patch Management Computer Repair VPN Employee-Employer Relationship Customer Service Data Warehousing Backups Infrastructure Social Engineering VoIP Computers Hosted Solutions Vulnerability IT Budget Managed IT Services Notifications Company Culture 5G Google Docs Cache Read Only Downloads Managed Service Provider Mobile Device Presentation Information Point of Sale Windows 10 Apple Mobile Data Digital Payment Wireless Technology Document Management Firefox Data Backup Hard Disk Drive Productivity Net Neutrality Save Money User Tips Time Management Finance Data Recovery Paperless Office Virtualization Google Maps Co-managed IT Licensing Digital IT Support Small Business Test Social Media Bookmarks Wi-Fi LiFi Phishing Screen Reader Social Networking Gadget Black Market Software Programming WPA3 Servers Emoji Safety Electronic Health Records Environment Google Drive Cookies Mobile Devices Printing Risk Management Mail Merge Taxes Privacy SharePoint Virtual Desktop Internet Procurement Statistics Hiring/Firing Automation Computer Care Collaboration The Internet of Things Software as a Service Data Management Business Cybersecurity Efficiency File Sharing Upgrade Dark Data Office Tips Windows 10 Cooperation Corporate Profile Disaster Augmented Reality Digital Signature Mobility Update Features Nanotechnology Avoiding Downtime Managed Services Provider Hacking Alt Codes Router IP Address Chromebook Antivirus Cortana Unified Communications IT Consultant Outlook Email Save Time Communication Cybercrime Users Mobile Office Legislation Computing Infrastructure Identity Theft Google Password Human Error Passwords Firewall Comparison Hard Drive Virus Cyber Monday Hacks Consulting Permissions Smart Tech Staffing Cameras Internet of Things Multi-Factor Security Search Google Wallet Flexibility VoIP Cryptocurrency Public Speaking Money Electronic Medical Records Managed IT services Business Growth Facebook Quick Tips Legal Personal Information Compliance Unsupported Software Unified Threat Management Remote Worker Employer-Employee Relationship Network Congestion Samsung Motherboard Consultation WiFi BYOD Deep Learning Help Desk Vulnerabilities Cyberattacks Proactive IT Specifications IT Support Geography Humor Knowledge Fun Star Wars Outsourced IT Internet Exlporer Analyitcs Relocation Workplace Tips Android Authentication Maintenance Black Friday How To Government Word Bring Your Own Device Scam Technology Tips Hacker Theft Intranet Virtual Reality Spyware Mobile Law Enforcement Telephone Systems Migration Identities Business Continuity Training Big Data Smart Technology Dark Web Operations Websites Botnet Lenovo Administration End of Support Tech Terms Crowdsourcing Mirgation Display Miscellaneous eWaste Innovation Managed IT Service iPhone Malware Tablet Windows 8 Applications IoT Mobile Device Management Documents Typing Domains Identity Bluetooth Buisness Managed IT Cloud Security Cameras IT Management Cables Telephony Healthcare Monitoring Instant Messaging Refrigeration Authorization Wearable Technology Content Filtering Remote Monitoring Utility Computing Tip of the Week Productivity Virtual Private Network Chatbots Data loss Marketing Work/Life Balance Saving Money Settings Application Travel Conferencing Entrepreneur Address Networking Microsoft Excel Error Fleet Tracking Network Security Best Practices Best Practice Superfish Alert Technology Administrator YouTube Monitors Sync IT service Connectivity Phone System PDF Cabling 3D Printing Hosted Solution Remote Computing Google Calendar Security Computing Software Tips Information Technology Scary Stories Mouse Motion Sickness IT Consulting User Error Remote Workers USB Network Apps Favorites Hard Drives Business Computing HIPAA Project Management communications Tech Support Managed Service Meetings Webcam Enterprise Resource Planning Trending Printer Smartphones Remote Monitoring and Management Going Green Recycling Enterprise Content Management Techology Cleaning Automobile Hackers IT solutions Gmail Mobile Security Backup and Disaster Recovery Private Cloud Tip of the week Encryption Physical Security Analytics Zero-Day Threat Browser Alerts Bandwidth Development Permission Tracking Modem Asset Tracking Staff Running Cable Experience Vendor Management Budget Language Supercomputer Break Fix App Heating/Cooling Lithium-ion Battery CIO Social ROI Touchscreen Customer Relationship Management Two-factor Authentication Halloween Windows Operating System Storage Distributed Denial of Service Solid State Drive Bitcoin IT Technicians Data storage Fraud Technology Laws Business Management Assessment Saving Time History Data Server Management Education G Suite PowerPoint Wireless Regulations Writing Office 365 IBM Consumers Smartphone MSP Public Cloud Undo Microsoft Health Business Technology How To Cloud Computing E-Commerce Website Mobile Device Managment Mobile Computing Recovery Blockchain IT Services Twitter Laptop Chrome BDR Cost Management Hotspot Proactive Hardware WannaCry Ransomware Troubleshooting CCTV Tech Term Wires Shortcut Business Intelligence Uninterrupted Power Supply Employees Managing Stress Files Retail OneNote Politics Current Events Access Control Disaster Recovery Computer Artificial Intelligence Piracy RMM High-Speed Internet SaaS Drones Machine Learning Office Network Management Server Backup Spam GPS Gadgets

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...