Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Here’s to You, Mr. Do-It-Yourself Entrepreneur

b2ap3_thumbnail_we_salute_you_400.jpgThe Connection, Inc presents to you “Real Men of Brilliance.” Today, we salute you, Mr. Do-It-Yourself Entrepreneur.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Ransomware Smart Technology Notes eWaste Mirgation Virus Bluetooth Running Cable Undo Big Data Financial Storage Printer Managing Stress Innovation Private Cloud Licensing Conferencing Servers Employer-Employee Relationship Alert Relocation Computer Care Retail Business Growth Spyware Workplace Tips Environment Geography Mobile Security Law Enforcement Lenovo Automation Outsourced IT Legislation Managed IT Services Deep Learning VPN File Sharing Cyber Monday Networking Buisness Migration User Tips Cryptocurrency Internet Exlporer Database HIPAA Wasting Time Windows 7 Refrigeration User Error Features Tip of the week WPA3 Paperless Office Remote Computing Disaster Unified Communications Digital Signature Managed IT services Halloween Word Bitcoin Computing Infrastructure Star Wars Safety Modem Mobile Office Windows 10 Server Management Net Neutrality Cyberattacks Software Remote Monitoring and Management Communication Meetings Document Management Laptop IT solutions Processors Permissions Patch Management Software as a Service Comparison Motherboard Motion Sickness VoIP Mouse Business Technology Mobile Device Managment Samsung BDR Google Wallet Domains Business Owner Apps Saving Money Network Security Unified Threat Management Public Speaking Vendor Management Gadget Customer Relationship Management Network Lithium-ion Battery Enterprise Resource Planning Electronic Health Records Risk Management Microsoft Excel Mobile Data Mobility IT Services Google Docs GPS Tip of the Week Hardware Unified Threat Management Computer Repair iPhone Phone System Google Calendar Automobile CIO Computer Virtual Desktop Trending Government Gmail Tracking Social Media Gadgets Unsupported Software Firewall MSP Project Management Browser Update Error PowerPoint High-Speed Internet Computing Display Email Network Management Politics Mobile Devices Drones Legal Hotspot Public Cloud Fleet Tracking Staff Mobile Apple RMM Zero-Day Threat Scam Recovery Mobile Computing Downloads End of Support USB Uninterrupted Power Supply Point of Sale Employees Two-factor Authentication Presentation Server Monitors Statistics Compliance Competition Business Settings Content Filtering Machine Learning Alt Codes Smartphone Healthcare Downtime ROI Webcam Consulting Human Error IT Support SaaS Hacks Augmented Reality Telephone Systems Office 365 Operating System Customer Service Wearable Technology Hackers Personal Information Screen Reader BYOD IT Management IT Consulting Hard Drives Crowdsourcing Computers Remote Worker Business Continuity Web Server Managed IT Service Android Malware Health Administration Data loss Cybersecurity IT Budget Upgrade Outlook The Internet of Things Best Practices Security Business Intelligence Consultation Telephony Digital Read Only Cookies Managed Service Productivity Efficiency Cortana Cache Hiring/Firing 3D Printing Disaster Resistance Writing Office Tips Management Smart Tech Knowledge VoIP How To Superfish Finance Money Taxes Heating/Cooling Business Management Information Technology Chrome Mail Merge Instant Messaging Troubleshooting Robot Search Analyitcs Fun Cabling Microsoft Office Cloud Computing Test Bandwidth Entrepreneur Data Recovery Corporate Profile E-Commerce PDF Business Computing Windows 8 Google Drive Staffing Data Social Networking Printing Professional Services Website Identity communications Data Warehousing Favorites IoT Facebook Google Maps Users Programming Physical Security Maintenance Tablet Proactive Twitter Technology Tips Productivity Security Cameras Best Practice Hosted Solution Wires Documents Current Events Theft Technology Laws Tech Term Hacking Backup Data Management Identities Company Culture Supercomputer Wireless Technology Budget Save Money Disaster Recovery Holiday IP Address WannaCry Windows Google Cooperation Redundancy Intranet Procurement Black Market Administrator Access Control Infrastructure Voice over Internet Protocol Quick Tips Cybercrime Electronic Medical Records Utility Computing Data Security Managed Services Provider Shortcut Hosted Solutions Data storage Spam Internet Employee-Employer Relationship Cost Management Passwords Password Specifications Microsoft Recycling Information Address Antivirus Asset Tracking Tech Terms Vulnerabilities Internet of Things Data Breach Going Green LiFi WiFi Scary Stories Phishing Network Congestion Time Management Saving Time Authorization Help Desk Regulations Websites Software Tips Windows 10 Backups Cleaning Black Friday Data Backup Encryption IT service Artificial Intelligence Marketing OneNote Piracy Chromebook Hacker Techology Connectivity Typing Experience Backup and Disaster Recovery Application Avoiding Downtime Save Time Distributed Denial of Service How To History Dark Web Social Managed IT Co-managed IT Mobile Device Smartphones Miscellaneous Cameras Files Remote Workers Chatbots SharePoint G Suite Botnet Cables Collaboration Analytics Sports Technology Enterprise Content Management Authentication Solid State Drive Office Wireless Tech Support IT Consultant Break Fix Cloud Alerts Privacy YouTube Language Small Business Managed Service Provider Vulnerability Monitoring Operations Upgrades Emoji User App Development Flexibility Training Virtual Reality Hard Drive IT Support Digital Payment Nanotechnology Assessment Consumers Travel Firefox 5G Applications Education Notifications Virtual Assistant Virtual Private Network Identity Theft Bookmarks Humor Social Engineering Wi-Fi Blockchain IT Technicians Mobile Device Management Remote Monitoring Work/Life Balance Multi-Factor Security CCTV Dark Data IBM Permission Bring Your Own Device Hard Disk Drive Sync Fraud Touchscreen Router Virtualization Proactive IT

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...