Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Read Only

Tech Term: Read Only

You open a lot of files and folders during your duties around the office, but some of them might seem a little different from others. These files are marked as “read-only.” What is the significance behind these files, and what does this marking mean? Find out in this week’s tech term.

Continue reading
0 Comments

What Happens to Your Data When You Delete It? The Truth will Surprise You

What Happens to Your Data When You Delete It? The Truth will Surprise You

When you delete a file off your PC, or your hard drive becomes corrupted, you just take for granted that the data is gone in perpetuity. That isn’t the case at all, and it can present problems for businesses and individuals alike. The thing is that it’s deleted, it’s gone, it ceases to exist, because you deleted it with your own hands.

Continue reading
0 Comments

The Importance of Having a Secure File-Sharing Solution Cannot Be Overstated

The Importance of Having a Secure File-Sharing Solution Cannot Be Overstated

In the business world, you rely on agile and secure access to critical documents on a number of different devices. However, security can quickly become a problem, especially when your users have multiple devices. Is your file sharing service enough to keep your data safe? Or, if it’s not, what are you going to do about it?

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Cameras Professional Services Licensing Compliance Hotspot Artificial Intelligence Remote Monitoring Health Mouse Fraud Botnet Unified Communications Smart Technology Legislation Writing Modem Politics Employees Windows App Cryptocurrency Hosted Solution Hacks Information Mobile Security Saving Time Running Cable Migration WannaCry Project Management Tech Support Tech Terms Nanotechnology Technology Tips Phone System Printing Search Android Business Management Virtual Reality Physical Security eWaste Tip of the Week E-Commerce Security Webcam Encryption Drones Server Education Google Drive Entrepreneur VoIP IT Support Cache Recycling Computing Infrastructure Travel Cortana Mobile Computing Money Bring Your Own Device Consulting Website Staffing Update Automation Software as a Service IT Technicians Virtual Desktop Network Congestion Address Innovation VPN Data Recovery Alert Public Cloud Humor Google Calendar Read Only Network Security HIPAA Robot File Sharing Cyberattacks Staff Ransomware IT Consulting Router Maintenance Wireless WPA3 Business Growth Backup and Disaster Recovery 5G SaaS Business Big Data Procurement Web Server Conferencing Dark Web YouTube Training Consultation Google Work/Life Balance Smartphones G Suite Social Laptop Internet of Things Chromebook Safety Relocation Firefox CIO Tracking LiFi Taxes Zero-Day Threat Net Neutrality Best Practices Application Machine Learning IBM Hard Drives Multi-Factor Security Specifications Office 365 Vulnerabilities Word Files Documents Remote Computing WiFi Crowdsourcing Instant Messaging Google Maps Piracy Microsoft Office Unified Threat Management Workplace Tips Upgrades Point of Sale Managed IT Electronic Health Records Save Money Personal Information Telephone Systems Efficiency Managed Service Provider Buisness The Internet of Things Gmail 3D Printing Troubleshooting Bandwidth Microsoft Excel Government Downtime Data Management Private Cloud Administrator Data Security Identity Mobile Data Budget BDR Cost Management Mobile Device Management Authentication Mobile Devices Applications Permission Flexibility Digital Signature Black Market Small Business Wireless Technology Mobile Device Managment Wires Operating System Language Business Continuity Supercomputer Motherboard MSP Authorization Social Networking Disaster Display Management Business Intelligence Hackers Cooperation Hosted Solutions Tip of the week Proactive IT Wi-Fi Computing Data storage Digital Programming Consumers Unified Threat Management Managing Stress RMM Fun Regulations Intranet Internet Upgrade Hacker Favorites GPS Managed IT services Statistics Test Operations Cyber Monday Email Hardware Wasting Time Mail Merge Access Control Communication Social Engineering Server Management Features Software How To Bitcoin Processors Browser Smart Tech Apple Star Wars Data Backup Sports Infrastructure Cybersecurity User History Avoiding Downtime Tech Term Company Culture Help Desk Unsupported Software Deep Learning Halloween Gadget Blockchain Knowledge Law Enforcement Digital Payment Cookies Technology Laws Mobility Alt Codes Bookmarks Utility Computing Outlook Facebook Storage Miscellaneous Antivirus Emoji Windows 10 Remote Monitoring and Management Productivity Virtual Assistant Analyitcs Windows 10 Geography Security Cameras Break Fix Cables BYOD Settings Marketing Vulnerability Microsoft Internet Exlporer How To Black Friday Techology Spam Risk Management Computer Care Information Technology Voice over Internet Protocol Error Mobile Device Asset Tracking Connectivity Windows 7 Co-managed IT Domains User Error Chatbots Finance Scam Data Warehousing Tablet Meetings Monitors Hard Drive High-Speed Internet Telephony Sync Refrigeration Notifications Going Green PowerPoint Collaboration Password Typing Undo End of Support Software Tips Network Cleaning Notes Business Technology Superfish Dark Data Apps Virtual Private Network Printer Saving Money Outsourced IT Hacking IP Address Motion Sickness Public Speaking Backup Data Breach Quick Tips Proactive Solid State Drive Monitoring Development Database Social Media Lenovo Office Tips SharePoint CCTV Human Error Augmented Reality VoIP Electronic Medical Records Touchscreen IT service Cloud Computing Document Management Data Malware Remote Workers Managed IT Service Cabling Backups Hard Disk Drive Hiring/Firing Google Docs Office Managed IT Services Employee-Employer Relationship Analytics Virus Comparison Shortcut Retail Environment Computers Phishing OneNote Productivity Identity Theft Cloud Time Management Financial Servers Legal Content Filtering Holiday Users Screen Reader Trending Mirgation Technology Permissions Identities Network Management Data loss Disaster Recovery Remote Worker Samsung communications Gadgets Employer-Employee Relationship Uninterrupted Power Supply Patch Management Vendor Management Current Events Managed Service Assessment Computer Repair Mobile Distributed Denial of Service Lithium-ion Battery Chrome Twitter Presentation Scary Stories Business Computing Websites Windows 8 Customer Service Disaster Resistance Customer Relationship Management Best Practice Business Owner Heating/Cooling Managed Services Provider iPhone Corporate Profile Administration Redundancy Enterprise Content Management IT Budget IT Services USB Firewall Mobile Office IT Management Enterprise Resource Planning Theft Paperless Office Networking Two-factor Authentication Google Wallet IT solutions Automobile Wearable Technology Recovery Fleet Tracking Computer Save Time ROI IT Support Bluetooth Experience Alerts PDF User Tips IT Consultant Smartphone Downloads IoT Passwords Competition Cybercrime Healthcare Privacy Spyware Virtualization

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code