Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why You Need to Be Careful when Discarding Technology

Why You Need to Be Careful when Discarding Technology

Nothing lasts forever - especially your business’ technology. However, you shouldn’t just get rid of your old technology willy-nilly. This is mostly for two reasons: one, many of the components in our technology are really bad for the environment; two, carelessly disposing of technology is a great way to put your data at risk. In order to protect your data, you need to make sure that your old equipment is properly disposed of.

Continue reading
0 Comments

Why You Should Think Twice about Throwing Away Working Technology

b2ap3_thumbnail_ewaste_becoming_a_major_issue_400.jpgWhen it comes to getting new technology, it’s typical to spend a significant amount of time agonizing over which product is the best. All the while, little regard is given to the disposal of one’s old tech, which often gets tossed in the trash. You may not have realized it, but haphazardly disposing of our old technology is wreaking havoc on the environment.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Theft Data Backup Information Taxes Financial Cybersecurity Data Recovery Cost Management Password Money Work/Life Balance Save Money Robot Politics Black Friday IT Support Windows 7 Health Social Managed Service Features Mobile Computing RMM Scary Stories PDF Wearable Technology How To Saving Time Best Practice Regulations Redundancy Business Continuity Cyber Monday Computer Disaster Recovery Business Technology Mouse Legislation Computer Repair Human Error Network Business Computing Technology Laws Superfish Chatbots The Internet of Things Lenovo IT Budget Motherboard Retail MSP Migration SaaS Managed IT Service Maintenance Consulting BDR Star Wars Privacy Web Server Microsoft Office Remote Monitoring Mobile Device Management Search Hard Drives Application Internet Proactive YouTube Websites Mobile Security Going Green Backup Disaster Firefox Relocation Vulnerabilities Internet of Things Samsung Windows 8 Productivity Healthcare Office 365 End of Support Chrome WiFi Encryption iPhone CCTV Data Paperless Office Smartphones Business Growth Remote Monitoring and Management Education Professional Services Wireless Technology Geography Facebook Cookies Electronic Health Records Website Mobile Device Managment Heating/Cooling Virtual Private Network Data storage Computing Infrastructure Mail Merge IT service Troubleshooting Laptop Quick Tips Address Recovery Hosted Solutions PowerPoint Business Owner Modem Techology Corporate Profile Identities Government Managing Stress Patch Management Gadget Vulnerability Display Google Maps Current Events Management GPS User Tips Mobility Licensing Smartphone Customer Service Environment Trending Multi-Factor Security ROI Remote Worker Blockchain Documents Office Tips Alerts Gmail Mobile Office Digital Payment Compliance Storage Specifications Browser Company Culture Remote Computing Virtual Assistant Error VPN Travel Nanotechnology Personal Information Google Time Management Files Deep Learning Assessment Holiday Outsourced IT Managed Service Provider Hacks Avoiding Downtime Network Security Cache Antivirus Risk Management Big Data Motion Sickness Meetings Networking IT solutions Authorization Drones Innovation Automobile History Data Breach Google Drive Virtual Desktop Read Only Tablet Operating System Scam Safety Hiring/Firing Permission Fun Tech Support OneNote Permissions Processors Entrepreneur IT Services User Network Congestion Administration Language Small Business Wireless Managed IT Services Microsoft Excel Fraud Cloud Word Spam Infrastructure Intranet Tip of the week Network Management Employees Passwords Competition Hardware Microsoft Hard Disk Drive Net Neutrality Social Media Conferencing Dark Web VoIP 3D Printing Authentication Wires LiFi Unified Communications Twitter Tracking SharePoint Domains Email Virtualization Solid State Drive Efficiency Bluetooth Security Cameras Data loss Cybercrime Virus Identity Uninterrupted Power Supply Tech Terms Cabling Collaboration Artificial Intelligence Crowdsourcing Shortcut Augmented Reality Sports Typing IT Technicians Law Enforcement Printing Backups IT Management Outlook IT Support Security Google Calendar Tech Term Access Control Phone System Co-managed IT Analyitcs Software Tips Lithium-ion Battery Mirgation Disaster Resistance Humor Digital Signature Voice over Internet Protocol Settings Social Networking Two-factor Authentication Technology Tips Favorites IBM Business Management Ransomware Test Black Market Applications Content Filtering Office Update Wasting Time Data Security Writing Supercomputer Technology Managed IT Break Fix Router Miscellaneous Cables HIPAA Staff Cleaning Hacking Comparison Google Docs Remote Workers Bring Your Own Device File Sharing Experience Server Administrator VoIP Vendor Management Software as a Service Printer Business Intelligence Utility Computing Users Emoji Managed Services Provider Presentation Bitcoin Bookmarks Malware Webcam Telephony Public Cloud E-Commerce Information Technology Unified Threat Management Training Development CIO Screen Reader Spyware Windows 10 IP Address Windows Running Cable Computing Monitoring BYOD Data Management Virtual Reality Dark Data Notifications Software Fleet Tracking Halloween App Upgrades Machine Learning Android Alt Codes Mobile Cyberattacks Hard Drive Managed IT services Apple Sync Gadgets Social Engineering 5G Tip of the Week Servers Hotspot Google Wallet Statistics WannaCry Bandwidth Project Management Consumers Telephone Systems Document Management Help Desk Budget Chromebook Notes IT Consulting Smart Tech Mobile Devices Touchscreen Public Speaking IT Consultant WPA3 Cameras Procurement Downloads Alert Backup and Disaster Recovery communications Buisness Recycling Instant Messaging Unified Threat Management Consultation Legal Programming Hosted Solution Zero-Day Threat Data Warehousing Cloud Computing Hackers Business Computer Care Flexibility Downtime Database Cryptocurrency Employer-Employee Relationship Mobile Device Save Time Cortana Asset Tracking Upgrade User Error How To Electronic Medical Records Point of Sale Botnet Operations Private Cloud Monitors Cooperation Wi-Fi Proactive IT Employee-Employer Relationship Mobile Data Physical Security Phishing Connectivity Enterprise Content Management Marketing Identity Theft Internet Exlporer Knowledge Piracy Analytics eWaste Firewall Digital IoT Server Management Staffing Automation Refrigeration Workplace Tips High-Speed Internet G Suite Productivity Best Practices Communication Apps Finance Saving Money Smart Technology Customer Relationship Management USB Windows 10 Enterprise Resource Planning Distributed Denial of Service Hacker Computers Undo Unsupported Software

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...
QR-Code