Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Best Utilize a Physical Backup

How to Best Utilize a Physical Backup

How does your business handle its on-premise, physical data backups? This is a question that you don’t necessarily have to ask yourself under pressure of a looming data loss incident. Despite the cloud being the clear victor in terms of restoration and reliability, physical data backup is still an important part of the business continuity process. In the worst-case scenario, a physical backup can be helpful for getting back on track.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Staff Read Only Virtual Reality Tech Support Humor Computing Infrastructure OneNote Google Drive Application Knowledge Mail Merge Quick Tips Scam Tracking Artificial Intelligence Human Error Money Efficiency Unsupported Software Notes Data Electronic Health Records Smart Technology Dark Data Disaster Resistance Network Migration Augmented Reality Private Cloud Chromebook Software as a Service Break Fix 5G WannaCry Domains Windows 10 Going Green Google Docs GPS The Internet of Things Business Continuity Utility Computing Mobile Data Operating System Workplace Tips Proactive Vulnerabilities Settings BYOD IT service Public Speaking Chatbots Recovery Saving Money Wearable Technology Hosted Solutions Emoji Machine Learning Lenovo Language Update Miscellaneous Laptop Data Security Education Maintenance Automation Hacks Instant Messaging Specifications BDR Business Computing Remote Monitoring Cloud Computing Fleet Tracking Retail IoT IT Consultant Remote Monitoring and Management Productivity Sync Managed Services Provider Google Maps Big Data Samsung Legal Cost Management Web Server Budget Database Blockchain Cookies Undo Search Unified Threat Management Asset Tracking Hacker User Tips Shortcut Downloads Address Motherboard Business Growth Motion Sickness Computer Infrastructure Spam Current Events Virtual Private Network Patch Management Wi-Fi Hacking Marketing Bandwidth Technology Regulations Halloween Telephone Systems Browser Documents Managed IT Troubleshooting Firewall Politics WiFi Managed Service Cortana Error Botnet Microsoft Office Windows 8 Digital Payment WPA3 Managed IT services IP Address Cameras Malware Flexibility Training Virtual Assistant Professional Services Managing Stress Wasting Time Running Cable RMM End of Support Wires Digital Avoiding Downtime Finance Piracy Experience Remote Workers Backup and Disaster Recovery Social Innovation Identities Alerts Cabling Procurement Test Privacy Router VoIP Hardware Analyitcs Lithium-ion Battery Google Calendar Consulting Security PDF Help Desk IT Support Apple Public Cloud Best Practices Display Best Practice Tech Terms Vulnerability Robot Identity E-Commerce Network Management Bring Your Own Device Data Warehousing Computing Gmail Microsoft Smartphone Windows 10 Social Engineering Licensing Deep Learning Bluetooth Authentication Security Cameras Modem Safety Business Technology VoIP Upgrades Two-factor Authentication Multi-Factor Security Heating/Cooling Tech Term Screen Reader Firefox Saving Time Webcam communications Save Money Data storage Healthcare Mirgation Alt Codes Outlook Drones Data Management Conferencing Automobile Server Cyber Monday IT Consulting SharePoint Hard Drives Gadget Voice over Internet Protocol Company Culture Chrome Productivity Time Management Uninterrupted Power Supply Passwords Printing Comparison Monitoring Relocation Facebook Sports Intranet Virus HIPAA Project Management Tip of the Week PowerPoint Health IT Technicians Risk Management Distributed Denial of Service IT Services Encryption App Hosted Solution Apps Networking Dark Web Collaboration Mobile Device Unified Threat Management IT Support iPhone Mobile Devices Employees Cyberattacks Enterprise Content Management Google Hackers Employee-Employer Relationship Government Backup High-Speed Internet Smart Tech Data Breach Hiring/Firing Co-managed IT Nanotechnology Presentation Phishing Managed Service Provider Notifications Authorization How To Windows 7 Favorites Disaster Recovery Holiday Fun Theft Mobile Device Managment MSP Applications Customer Service Enterprise Resource Planning Managed IT Service Hard Drive Business Internet Exlporer Gadgets Work/Life Balance Word Microsoft Excel Digital Signature Mobile Device Management Scary Stories Development Crowdsourcing Password Entrepreneur Network Congestion Business Management Communication Internet Spyware Cybercrime YouTube Data Recovery Bookmarks Fraud Hard Disk Drive Content Filtering User Computer Repair Corporate Profile Star Wars ROI Office Tips IT solutions Mobile Techology Google Wallet Wireless Technology Upgrade Data Backup Electronic Medical Records Information Technology File Sharing Technology Tips Software Tips Websites Travel Connectivity Programming How To eWaste Cloud Point of Sale G Suite Managed IT Services Office CCTV Compliance Access Control Technology Laws Twitter User Error Legislation Wireless Internet of Things Cache Hotspot Paperless Office Mobile Security Server Management Servers Printer Analytics Redundancy Cybersecurity Operations Smartphones Cryptocurrency Consumers Social Networking Writing Android Administrator Files Taxes Features IBM Network Security Save Time Backups Ransomware VPN Meetings Superfish Tip of the week Refrigeration Website Bitcoin Physical Security Financial CIO Touchscreen Statistics LiFi Phone System Cooperation IT Budget Identity Theft Assessment Mouse Permissions Customer Relationship Management Tablet Black Market Processors History Employer-Employee Relationship Consultation 3D Printing Information IT Management Antivirus Buisness Trending Computer Care Office 365 Virtual Desktop Competition Business Intelligence Management Vendor Management Permission Net Neutrality Mobility Data loss Typing Administration Disaster Environment Document Management Remote Computing Telephony SaaS Staffing Personal Information Mobile Computing Law Enforcement Geography Storage Cleaning USB Black Friday Zero-Day Threat Recycling Windows Supercomputer Unified Communications Proactive IT Downtime Remote Worker Small Business Monitors Business Owner Solid State Drive Email Mobile Office Social Media Computers Alert Software Cables Users Outsourced IT Virtualization

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...