Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Read Only

Tech Term: Read Only

You open a lot of files and folders during your duties around the office, but some of them might seem a little different from others. These files are marked as “read-only.” What is the significance behind these files, and what does this marking mean? Find out in this week’s tech term.

Continue reading
0 Comments

What Happens to Your Data When You Delete It? The Truth will Surprise You

What Happens to Your Data When You Delete It? The Truth will Surprise You

When you delete a file off your PC, or your hard drive becomes corrupted, you just take for granted that the data is gone in perpetuity. That isn’t the case at all, and it can present problems for businesses and individuals alike. The thing is that it’s deleted, it’s gone, it ceases to exist, because you deleted it with your own hands.

Continue reading
0 Comments

The Importance of Having a Secure File-Sharing Solution Cannot Be Overstated

The Importance of Having a Secure File-Sharing Solution Cannot Be Overstated

In the business world, you rely on agile and secure access to critical documents on a number of different devices. However, security can quickly become a problem, especially when your users have multiple devices. Is your file sharing service enough to keep your data safe? Or, if it’s not, what are you going to do about it?

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Smartphones Remote Monitoring Programming Social Networking Printer Operating System Android Sync Unified Threat Management Network Security Application Break Fix eWaste Tech Term Customer Relationship Management Sports Training Techology Router Apple Tip of the week Google Mobile Device Management Writing Data loss Hosted Solutions Screen Reader Office Tips Distributed Denial of Service Social Staffing File Sharing Crowdsourcing Laptop Smartphone Proactive IT Specifications Vulnerability Big Data Recycling Machine Learning Network Theft Information Technology SharePoint Corporate Profile Files Internet of Things Vendor Management Utility Computing Remote Worker User Error Downtime Geography Spam Presentation Time Management Miscellaneous Human Error Collaboration Language Hosted Solution Display Alerts Gmail Assessment Remote Workers Legislation Tablet Uninterrupted Power Supply Network Congestion End of Support Alt Codes Domains Business Intelligence Twitter Consulting IT Support Budget Finance Going Green Marketing Hiring/Firing IT Budget ROI Analytics Storage Smart Tech Digital Signature Tech Terms Content Filtering Address Cables Robot Analyitcs Compliance Customer Service Cloud Computing Employees Data Breach Unified Threat Management Data Recovery 5G Computer Repair Recovery Business Owner Employer-Employee Relationship E-Commerce Project Management IT Consultant Upgrade Backups Managed IT Service Network Management Monitors Statistics Software Tips Innovation Bandwidth Emoji Connectivity iPhone Security VPN Remote Computing Politics Wireless Tracking Conferencing Travel Identities Windows 10 Windows 10 Maintenance High-Speed Internet Workplace Tips Intranet Paperless Office History Scam Star Wars GPS Business Continuity Mobile Device Computer Cookies Server Management Work/Life Balance Permissions Apps Applications OneNote Update Black Market Alert Access Control Mobile Device Managment Settings Private Cloud Running Cable Google Wallet Data Security Migration RMM Operations App Environment Mobile Office Digital Unified Communications Software as a Service Legal Tip of the Week PowerPoint Licensing Mobile Physical Security Software Hacker Smart Technology Wires Saving Money Business Technology Solid State Drive Disaster Recovery Computers Holiday Money How To Hotspot Data Warehousing Zero-Day Threat Hacking Permission Managing Stress Spyware Chromebook Web Server Redundancy Unsupported Software Virtual Private Network Word communications Electronic Health Records Cabling Motherboard Cryptocurrency Competition Google Docs Server Document Management Telephony Chatbots Saving Time Business Growth Tech Support Cost Management Managed Service Provider Law Enforcement Email Google Calendar Administration Managed IT Services Cyber Monday Scary Stories CCTV Social Media Mobile Devices Motion Sickness Cameras Mobile Computing Digital Payment Entrepreneur Public Speaking Windows Mobile Security Authorization Net Neutrality Hacks Google Drive Patch Management IoT Antivirus Search Relocation Disaster Resistance Identity Theft Save Time Information How To Computing Infrastructure G Suite Read Only YouTube Risk Management HIPAA VoIP Botnet Upgrades Windows 8 User Hard Drives Chrome Proactive Hard Drive Gadgets Best Practice Microsoft Computer Care Help Desk Fraud Networking User Tips Mirgation Monitoring Servers Automobile Enterprise Resource Planning Productivity Cortana IT Services Fleet Tracking Staff Humor MSP IT solutions Undo Halloween Ransomware IT Support Bookmarks Phishing Backup and Disaster Recovery Data Augmented Reality Safety Avoiding Downtime Business Users Gadget SaaS Firewall Communication Mobile Data Privacy Productivity Procurement Instant Messaging Dark Data Bitcoin Office Artificial Intelligence Hard Disk Drive Piracy Quick Tips Vulnerabilities Public Cloud Microsoft Office Virus Administrator WPA3 3D Printing Government Small Business Identity Favorites Bluetooth Remote Monitoring and Management Samsung Cleaning Flexibility Virtualization WiFi Consultation Social Engineering Internet Exlporer Passwords IT Technicians Internet Taxes Save Money Managed IT Co-managed IT Hackers USB Asset Tracking Bring Your Own Device Microsoft Excel Managed Services Provider Buisness Regulations Backup IT service Health Office 365 Knowledge Superfish Two-factor Authentication Best Practices Telephone Systems Website Phone System Dark Web Blockchain Mail Merge Troubleshooting Downloads Disaster Wearable Technology Notifications Comparison Shortcut Virtual Desktop Wireless Technology Touchscreen Data Backup Data storage Printing Cloud Financial Electronic Medical Records Technology Tips Documents Modem Automation Development Firefox Experience Technology Healthcare Processors Supercomputer Refrigeration BDR Multi-Factor Security Password Cache Cooperation Heating/Cooling Outlook Cybersecurity VoIP Cybercrime Company Culture Enterprise Content Management The Internet of Things Managed IT services Computing Google Maps Webcam Browser Efficiency Typing Features Mouse Virtual Reality Technology Laws LiFi Point of Sale Error Mobility Business Management Data Management Meetings Encryption Authentication Test Consumers Drones Security Cameras Lenovo IP Address CIO Management Trending Websites Education Outsourced IT Fun Current Events Infrastructure Wi-Fi IBM Lithium-ion Battery Malware WannaCry Cyberattacks PDF Hardware Retail Business Computing Deep Learning Employee-Employer Relationship IT Management Personal Information Managed Service BYOD IT Consulting Black Friday Nanotechnology Facebook

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code