Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Prepare for Employee Turnover with a Foolproof Exit Checklist

b2ap3_thumbnail_turnover_checklist_tips_400.jpgOne of the most dreaded situations in the modern office is the resignation of experienced talent. It’s always sad to say goodbye to a colleague and friend… under the right circumstances. What would happen if an angry employee left your company and used their privileges to wreck havoc on your IT?

Continue reading
0 Comments

Are You Sure Your Former Employees Won’t Stab You in the Back?

b2ap3_thumbnail_former_employee_theft_400.jpgAs a business owner, you've probably had the misfortune of letting a valued (or not-so-valued) employee go. The reasons might vary, but one thing is consistent: they're gone, and could potentially use their newfound residual malice to strike your business right where it hurts. How can you prepare yourself against former employees you may have once called "family?"

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Bluetooth Operating System Tech Terms Dark Data Gadgets Cache Point of Sale Phone System Time Management Tracking File Sharing Wi-Fi Robot IT service Vulnerabilities Server Management IT solutions Digital Signature Telephony Bring Your Own Device Big Data Identity Unified Threat Management 5G Office 365 Specifications Remote Computing Spyware Files Operations Data Security Information Zero-Day Threat Security Cameras Compliance Smartphones Licensing Application Black Friday Browser IT Services Electronic Medical Records Mirgation Programming Hard Drive Utility Computing Tip of the Week Network Firefox IoT Tech Support Android WiFi Twitter Servers Privacy Encryption Lenovo Training Miscellaneous Social Networking Gadget Experience Employer-Employee Relationship IP Address ROI Cookies Artificial Intelligence Staffing Content Filtering Alert Backup Cooperation Project Management Uninterrupted Power Supply CIO Legislation Error Managed Services Provider Connectivity Productivity End of Support Analyitcs Current Events Marketing User Meetings WPA3 Update Money Software as a Service Remote Monitoring and Management Best Practices Mobile Data Features Passwords Google Modem Machine Learning Human Error G Suite Permission Automobile Tech Term Test Display Star Wars Mouse Business Intelligence BYOD Health Managed IT Analytics Backup and Disaster Recovery Technology Search Innovation Customer Relationship Management Touchscreen Word Chrome Phishing Botnet Quick Tips Patch Management Storage Microsoft Office Mobile Devices Windows 8 IT Budget Cleaning Internet Scam Fraud History Managed IT Service Consulting Virtual Desktop Distributed Denial of Service BDR Motherboard 3D Printing Antivirus Upgrades Mobile Device Mobility App Spam Internet Exlporer Finance Emoji Cybersecurity Chromebook Two-factor Authentication Monitoring Black Market Going Green Webcam Access Control Google Docs Typing Politics Managed Service Provider Downtime Wearable Technology Efficiency Apps SaaS Hardware VoIP SharePoint Virus Lithium-ion Battery Dark Web Presentation Network Security Data Management Information Technology Multi-Factor Security Refrigeration Address Piracy Google Drive Save Time Cameras Data Warehousing Solid State Drive Administration Vendor Management User Error Redundancy Screen Reader Budget Work/Life Balance Best Practice Wires Business Computing Internet of Things Social Remote Worker Fun Heating/Cooling Unsupported Software Printing Law Enforcement Windows 10 Superfish Read Only PDF Procurement Bandwidth Smart Tech Router Net Neutrality Proactive IT Comparison Document Management Alerts Samsung IT Support Technology Laws Digital Payment Alt Codes Business Management USB Relocation LiFi CCTV Cables Managed Service Environment Tip of the week Computing Infrastructure Web Server Printer Hackers Wireless Technology GPS Notifications Writing Identity Theft Telephone Systems Productivity Financial Automation Backups Mail Merge Corporate Profile Humor Firewall Cyber Monday High-Speed Internet How To Recycling Avoiding Downtime Computer Care Smart Technology Malware Hacking Software Tips Nanotechnology Hosted Solution Chatbots Authentication Sync Networking Administrator Managing Stress Data Breach PowerPoint Monitors IT Technicians Windows Flexibility Hiring/Firing Managed IT Services Intranet How To Mobile Device Managment Virtual Private Network The Internet of Things Laptop Sports WannaCry Crowdsourcing Outlook Staff Running Cable Data Backup Holiday Migration Social Media Remote Workers Electronic Health Records Consultation Buisness Social Engineering Management VPN Communication Bookmarks Hacks Collaboration Motion Sickness Hard Disk Drive Retail Risk Management iPhone Ransomware Upgrade Google Wallet Remote Monitoring VoIP Windows 10 Software Cloud Processors Identities Saving Time Language Vulnerability Supercomputer Google Maps Undo Maintenance Network Congestion IT Consultant Applications Domains IBM Personal Information Co-managed IT Cloud Computing Safety Consumers Blockchain Government Business Continuity Gmail Downloads Email Assessment User Tips Techology Mobile Office IT Support Employee-Employer Relationship Computers HIPAA Hard Drives Managed IT services Documents Small Business Mobile Computing Conferencing Mobile Tablet RMM Theft Smartphone Private Cloud Disaster Resistance Mobile Device Management Cost Management Apple Disaster communications Healthcare Computer Unified Communications Scary Stories Troubleshooting Entrepreneur Outsourced IT Facebook eWaste Virtual Reality Instant Messaging IT Management Cyberattacks Education E-Commerce Permissions Knowledge Physical Security Server Unified Threat Management Taxes IT Consulting Password Break Fix Cryptocurrency Development Business Owner Business Growth Google Calendar YouTube Computer Repair Trending Save Money Employees OneNote Asset Tracking Office Tips Company Culture Geography Saving Money Deep Learning Paperless Office Enterprise Content Management Data Hacker Cybercrime Technology Tips Website Hotspot Legal Users Fleet Tracking Halloween Help Desk Data loss Mobile Security Authorization Microsoft Excel Augmented Reality Computing Infrastructure Office Favorites Travel Regulations Virtualization Hosted Solutions Disaster Recovery MSP Websites Public Cloud Public Speaking Digital Data Recovery Competition Microsoft Cortana Security Enterprise Resource Planning Customer Service Proactive Workplace Tips Wireless Recovery Statistics Data storage Business Network Management Cabling Settings Business Technology Bitcoin Drones Shortcut

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code