Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Things That Go Bump in the Server Closet

b2ap3_thumbnail_spooky_technology_400.jpgHalloween is a time to conjure up things that give people the creeps. Scary sounds are just one way to send shivers up the spine. Sounds like, howling werewolves, zombie groans, chainsaws, and bloodcurdling screams are enough to make you want to run and hide. Yet, there’s one sound that’s the most terrifying of them all, and it’s coming from your server room!

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Computer Care Cloud Computing Processors Emoji IP Address Network Unified Threat Management Administration Flexibility Mobile Digital Signature Mouse Internet Exlporer Notifications Politics Hotspot Microsoft Backups Modem Regulations Save Time Net Neutrality Social Network Congestion Tip of the week Small Business Sports WannaCry Network Management Customer Service Cookies Virtual Desktop Training Finance Asset Tracking Password Unsupported Software Virtual Assistant Consulting USB Wearable Technology Writing Android Twitter Telephony Tip of the Week Network Security Efficiency Fun Enterprise Content Management Recovery User Error Augmented Reality Procurement Social Media Managed Service Provider OneNote E-Commerce Assessment Outlook Security Cameras Documents Analytics Wires User Tips Remote Computing Gadgets Mobile Office Apps Supercomputer Identity Virtual Private Network Mobile Device Phishing Domains Mobile Device Managment Internet of Things File Sharing Legislation LiFi Current Events Screen Reader 5G IT Technicians Cooperation Firewall Information VoIP Database Bandwidth Shortcut IT Management Printer Computing Infrastructure Hacking Refrigeration Multi-Factor Security Meetings Voice over Internet Protocol Business Cyber Monday Proactive IT CCTV Disaster End of Support Techology Users Cryptocurrency Cybersecurity IT Services Help Desk Operations Sync Document Management Hacks RMM Update MSP Business Computing Recycling IT Consultant Fraud Troubleshooting PDF Smart Technology Software as a Service Experience Computer Mobile Devices Cameras Administrator Personal Information Customer Relationship Management Alerts Business Technology Downloads Mobile Device Management ROI Automation Electronic Medical Records Security Data storage Social Networking Authentication Antivirus Taxes Legal Access Control Saving Time Nanotechnology Features iPhone Browser Google Drive How To Crowdsourcing Cabling Theft How To Windows 10 Mail Merge Professional Services Management Bitcoin Disaster Recovery Microsoft Office Corporate Profile Technology Laws Remote Monitoring and Management Phone System Managed IT services Office 365 Dark Web PowerPoint Cables Error Server Management Social Engineering Cortana Facebook Humor Proactive Virtual Reality WPA3 Remote Workers Electronic Health Records Managing Stress Authorization Permission Redundancy Heating/Cooling Statistics Distributed Denial of Service Google Calendar Productivity Uninterrupted Power Supply Development Miscellaneous Unified Threat Management Google Wireless Technology Mobile Data Artificial Intelligence Smart Tech Going Green Best Practices SharePoint YouTube Botnet The Internet of Things Government GPS Zero-Day Threat Hosted Solutions Lenovo Windows 10 Mirgation User Vulnerabilities Time Management Automobile High-Speed Internet Robot Hard Disk Drive Consultation Cybercrime Web Server Alert Presentation Hard Drive Drones Buisness Undo Employer-Employee Relationship Wireless Touchscreen Cloud Printing Managed IT Law Enforcement Alt Codes Consumers History Test Data Backup Utility Computing Gadget Hard Drives Innovation Data Relocation Office Enterprise Resource Planning IoT Dark Data Outsourced IT Patch Management Google Maps Lithium-ion Battery Tracking Firefox Retail Public Cloud Backup and Disaster Recovery Big Data Mobility SaaS Intranet Managed IT Service Servers Cyberattacks Digital Payment Operating System App Computer Repair Office Tips Notes VPN Productivity Permissions Environment Solid State Drive Analyitcs IBM Hiring/Firing Gmail Website Wasting Time Spyware Geography Storage Apple Fleet Tracking Data Security Virtualization Best Practice Technology Tips Windows 8 Internet IT service Display Bookmarks Settings Tech Terms Remote Worker HIPAA BDR Tech Support Scary Stories Data Recovery Disaster Resistance Content Filtering Halloween Budget Read Only Connectivity Motherboard Save Money Software Tips Business Growth Hackers Star Wars Language Safety Workplace Tips Identities Cache IT Support Conferencing Application Search Router Scam Programming Marketing eWaste Black Market Saving Money Wi-Fi Windows 7 Business Continuity Company Culture Staffing Google Docs Ransomware Passwords Trending Black Friday Encryption Two-factor Authentication Collaboration Quick Tips IT Budget Employees Tech Term Managed Services Provider Blockchain Favorites Avoiding Downtime Chromebook Remote Monitoring Technology Microsoft Excel Upgrades Digital Healthcare Hacker Health Holiday Identity Theft Hardware Staff Computing Mobile Security Specifications Data Management Backup Mobile Computing Knowledge CIO Webcam Monitors Applications Software Smartphones Managed IT Services Laptop Networking IT Consulting Education Monitoring Machine Learning Chatbots Travel Word Data Warehousing Spam Break Fix Maintenance Bring Your Own Device Risk Management Licensing Chrome Information Technology Cost Management Tablet Managed Service Hosted Solution Data Breach communications Virus Computers Employee-Employer Relationship Smartphone Physical Security Project Management Work/Life Balance Windows Paperless Office Infrastructure Business Intelligence Business Management Upgrade Superfish IT solutions Point of Sale Downtime Malware G Suite Migration Entrepreneur 3D Printing Financial Motion Sickness Human Error Running Cable Samsung Vendor Management Bluetooth Business Owner Deep Learning Private Cloud Comparison Communication Piracy Files BYOD Privacy Websites Email Compliance Typing Cleaning Competition Co-managed IT Vulnerability VoIP Unified Communications Server Instant Messaging Money IT Support Google Wallet Data loss Telephone Systems Public Speaking Address WiFi

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...