Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The G Suite Just Got Smarter

The G Suite Just Got Smarter

With the recent overhaul of Google’s G Suite productivity software products comes a new way to keep your business’ data secure. We’ll go over some of the major changes introduced in the updates, including the integration of artificial intelligence.

Continue reading

The Many Ways Your Business Can Benefit By Having a Productivity Suite

The Many Ways Your Business Can Benefit By Having a Productivity Suite

For the modern business it’s important to have software that is both simple to use and powerful enough to meet your needs. Nowadays, there are cloud-based platforms that come with storage, communication options, and many of the enterprise-level productivity applications that drive your organization’s productivity. Two of these, Microsoft’s Office 365 and Google’s G-Suite bring substantial value and flexibility to the table where there was once only expense.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Upgrades Mobile Office Chrome Public Cloud Politics Deep Learning IT Services Small Business Hosted Solutions Experience Application Disaster Recovery Smartphones Database Unified Communications Hardware Files HIPAA Disaster Finance Display Language Collaboration Risk Management IBM Microsoft Office Halloween Remote Computing Connectivity Piracy Money G Suite Relocation Network Computers Security Cameras Downtime Personal Information Bring Your Own Device IT Support Unsupported Software Apps IT solutions IT Support Passwords WiFi Upgrade Permission Virtualization Co-managed IT Cortana Documents Virtual Desktop Mobile Security Electronic Health Records Employer-Employee Relationship Computing Office 365 Best Practices Nanotechnology Management Website Knowledge Safety Managed Service Provider Staffing Modem Wasting Time Legal Internet of Things Software Screen Reader Administrator Managed Service Meetings Lenovo Operating System Mouse IT service Statistics Redundancy Project Management Save Time Users Wearable Technology Instant Messaging Password Migration 5G Smart Technology Wireless Buisness Business Continuity Cryptocurrency Operations Social Engineering Analyitcs Scary Stories Asset Tracking Content Filtering Automobile Administration Blockchain Consumers Access Control Utility Computing E-Commerce Motion Sickness Zero-Day Threat Virus Recovery Office Tips Phone System Touchscreen Domains Social Firewall Network Congestion Google Drive IoT Productivity IT Budget Network Security Antivirus Cookies Cameras Data Security User Tips Disaster Resistance Unified Threat Management Machine Learning Network Management Gmail Star Wars Ransomware Two-factor Authentication Dark Data Employees Cables Remote Monitoring Company Culture Private Cloud Malware Alert Business Gadget Bluetooth Outsourced IT Assessment Specifications User Error Mail Merge Mobile Hosted Solution Managed Services Provider IP Address Google Docs Vulnerability Monitoring Maintenance Business Technology Public Speaking Physical Security Avoiding Downtime Apple WannaCry Business Growth Sports Data storage Presentation Mobile Device Management Windows 10 PDF Social Media Entrepreneur Help Desk Best Practice Consulting Technology Laws Intranet Emoji IT Management Botnet Storage History Tracking Vulnerabilities Webcam Data Breach Consultation Smart Tech Time Management Settings Legislation Google Maps Data loss Remote Workers Proactive Dark Web Save Money VoIP Internet Enterprise Content Management Marketing Enterprise Resource Planning Recycling Innovation Processors Healthcare High-Speed Internet Superfish Managing Stress CIO Wi-Fi Digital Signature Mobile Devices Outlook Cyber Monday Data Recovery Data Backup Identity Theft Bandwidth Favorites Remote Worker Hotspot Artificial Intelligence Identities Authorization Document Management Going Green Backup Supercomputer Lithium-ion Battery Scam How To Mobile Data Data Warehousing Multi-Factor Security Customer Relationship Management Flexibility Fun Cost Management Technology Spam Regulations Voice over Internet Protocol Business Intelligence Education Tip of the week Tablet Server IT Consulting Web Server Licensing Technology Tips Holiday Environment Running Cable Chromebook Smartphone Travel Distributed Denial of Service Permissions VPN Human Error Net Neutrality Patch Management Android Features Data Management ROI Communication Robot Read Only SaaS Hacks Security Managed IT Services Virtual Assistant Bookmarks BYOD Procurement Software as a Service App LiFi Downloads Mobile Device Server Management YouTube Windows 7 GPS Applications Computer Repair Telephony Staff Notifications Printer Cabling Troubleshooting Infrastructure Financial Cleaning Taxes Cybersecurity Compliance Wires Digital Websites Employee-Employer Relationship Shortcut Gadgets Business Computing Virtual Private Network End of Support Update Microsoft Black Market Comparison Backups Information Technology How To Microsoft Excel Point of Sale Fraud Hard Drive Crowdsourcing Spyware Conferencing Theft Black Friday CCTV Work/Life Balance Google Budget Hard Drives Router Geography Cooperation IT Consultant Law Enforcement Privacy Mobility Tech Term Samsung communications Fleet Tracking Workplace Tips Windows 8 Printing Techology Break Fix Saving Time IT Technicians Bitcoin The Internet of Things Facebook Google Calendar Test Augmented Reality Hacker eWaste File Sharing iPhone Heating/Cooling Big Data Servers Typing Managed IT Service Motherboard Electronic Medical Records Social Networking Customer Service Business Owner Miscellaneous USB Retail Virtual Reality Tip of the Week BDR Monitors Writing Hard Disk Drive Notes Error WPA3 Cyberattacks Remote Monitoring and Management Competition Drones Analytics Health Computer Office Hacking RMM Development Identity Quick Tips Information Solid State Drive Saving Money Computing Infrastructure Twitter Vendor Management Authentication Undo Data Current Events Cloud Computing Humor Backup and Disaster Recovery Address Cache Laptop Trending Professional Services Government Wireless Technology Windows MSP Windows 10 Browser Digital Payment Mobile Computing Proactive IT Unified Threat Management User Efficiency Sync Firefox Productivity Hackers Networking Software Tips Business Management OneNote Internet Exlporer Hiring/Firing VoIP Tech Support Chatbots Word Uninterrupted Power Supply Alerts Cybercrime Automation Paperless Office Tech Terms Managed IT Alt Codes 3D Printing SharePoint Computer Care Telephone Systems Programming Search Managed IT services Mirgation Cloud Encryption Corporate Profile Phishing Refrigeration Email PowerPoint Mobile Device Managment Google Wallet Training

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...