Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why You Need to Be Careful when Discarding Technology

Why You Need to Be Careful when Discarding Technology

Nothing lasts forever - especially your business’ technology. However, you shouldn’t just get rid of your old technology willy-nilly. This is mostly for two reasons: one, many of the components in our technology are really bad for the environment; two, carelessly disposing of technology is a great way to put your data at risk. In order to protect your data, you need to make sure that your old equipment is properly disposed of.

Continue reading

Why You Should Think Twice about Throwing Away Working Technology

b2ap3_thumbnail_ewaste_becoming_a_major_issue_400.jpgWhen it comes to getting new technology, it’s typical to spend a significant amount of time agonizing over which product is the best. All the while, little regard is given to the disposal of one’s old tech, which often gets tossed in the trash. You may not have realized it, but haphazardly disposing of our old technology is wreaking havoc on the environment.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Managed IT Company Culture Regulations User Tips Outsourced IT Best Practices Alert Storage Chrome IT Consulting Taxes Employer-Employee Relationship Permission Google Wallet BDR Websites Information Managed Service Provider Bluetooth Mouse Read Only Document Management Botnet User Error Sports Scary Stories Public Cloud Machine Learning Notifications Hosted Solutions Piracy Big Data IoT Cooperation Sync Internet Hacking Documents Office Identity Theft Law Enforcement WPA3 Microsoft Cyber Monday Business Mail Merge Conferencing Unified Communications Licensing Time Management Remote Monitoring and Management Data storage Monitors Access Control Assessment HIPAA Internet Exlporer Settings Patch Management E-Commerce Remote Monitoring Analytics Cybercrime Computing Employees Travel Employee-Employer Relationship Retail Buisness MSP Password Mobile Device Management Permissions Gadgets Office 365 Safety Update Webcam Finance Windows 8 Black Friday Error Paperless Office Data loss Managed Service Managed Services Provider Managed IT services Processors Fraud Comparison Content Filtering Hard Disk Drive Cloud Computing Authorization Current Events Applications Physical Security Consulting Writing Customer Relationship Management Innovation Staffing Hardware Competition Smartphones Twitter Productivity Healthcare Uninterrupted Power Supply Halloween How To Google Calendar Android Cameras Quick Tips Data Warehousing Help Desk Google Remote Computing VoIP Compliance Intranet IBM Social Media Lenovo Software Tips G Suite Security Samsung Tech Support Modem Mobility RMM File Sharing Telephone Systems Mobile Office Drones Disaster Recovery Vulnerability Authentication Network Management Procurement Tech Term Consultation Corporate Profile Avoiding Downtime Google Drive Cabling Business Growth Recycling Infrastructure Point of Sale Encryption Remote Worker Apps Emoji eWaste PDF Laptop Supercomputer Experience Miscellaneous Technology Tips User Computing Infrastructure High-Speed Internet Save Money YouTube Solid State Drive Tech Terms Star Wars Backups Workplace Tips Domains Administration Cryptocurrency Privacy Refrigeration Bring Your Own Device Router Bookmarks Business Management Spam History Net Neutrality Computers Hard Drives 3D Printing Small Business Technology Laws Tip of the week Smart Technology Hiring/Firing Microsoft Office Human Error Phone System Digital Payment Humor Business Intelligence Cyberattacks Bandwidth Cloud Favorites Mobile Device Upgrade Tracking Internet of Things Productivity Maintenance Spyware Chatbots Customer Service Social Networking Geography Security Cameras LiFi Risk Management Augmented Reality Virus Undo Hotspot Government Typing IT service Techology ROI Two-factor Authentication Computer Repair Crowdsourcing Cost Management Downloads iPhone Printing Fun Features Public Speaking Outlook Unsupported Software IT Consultant Phishing Work/Life Balance Politics Management Motherboard Gmail Mobile Devices Computer Care IT Support Proactive IT Disaster Resistance Users Shortcut Holiday Firefox Virtual Private Network Printer Business Technology Running Cable Application Heating/Cooling Data Hard Drive WannaCry Downtime Utility Computing IT Services Apple BYOD IP Address Multi-Factor Security Identities Smartphone Address Connectivity Superfish Virtualization Display Artificial Intelligence Web Server Nanotechnology Money Relocation Budget SaaS Google Maps Firewall Computer Specifications Administrator Malware Managing Stress Google Docs Proactive Electronic Medical Records Entrepreneur Language Presentation Social Deep Learning Office Tips Backup and Disaster Recovery Migration VoIP Ransomware Windows Wi-Fi Windows 10 Mirgation Upgrades Remote Workers Tip of the Week Staff Troubleshooting Facebook Vulnerabilities Mobile Data USB Backup CIO Data Recovery Efficiency Business Continuity Cybersecurity Lithium-ion Battery Managed IT Service Network Congestion Managed IT Services Browser IT Budget IT solutions Search Best Practice CCTV Instant Messaging Motion Sickness Meetings Blockchain Wireless Technology VPN Legislation Mobile Computing PowerPoint GPS Tablet Black Market Automation Software End of Support Electronic Health Records Alerts Bitcoin Chromebook Networking Disaster communications IT Support Cables Dark Web Scam Word OneNote Redundancy Trending Asset Tracking Financial Mobile Security Vendor Management Smart Tech Data Backup Servers Operating System Analyitcs Saving Money The Internet of Things Marketing Alt Codes Going Green Distributed Denial of Service Cortana Antivirus Touchscreen Recovery Project Management Legal Mobile Flexibility Cleaning Health Telephony 5G Mobile Device Managment Consumers Knowledge Hacks Software as a Service Passwords Co-managed IT Wires Information Technology Data Security Business Owner Development Communication WiFi SharePoint Robot Hacker Hackers Hosted Solution Server Management Business Computing Dark Data Files Fleet Tracking Microsoft Excel Education Automobile Monitoring How To Network App Digital Server Virtual Desktop Wireless Website Wearable Technology Collaboration Test Statistics Virtual Reality IT Management Enterprise Resource Planning Break Fix Personal Information Screen Reader Network Security Saving Time Technology Social Engineering Email Windows 10 Operations Identity Unified Threat Management Zero-Day Threat Enterprise Content Management Programming Cookies Data Breach Environment Theft Unified Threat Management IT Technicians Gadget Data Management Training Private Cloud Cache Digital Signature Save Time

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...