Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 8 Essential Questions to Ask of Your IT Provider

Tip of the Week: 8 Essential Questions to Ask of Your IT Provider

When was the last time that your organization had an unexpected technology expense blast your IT budget out of the sky? Surprise issues that you don’t plan for could potentially derail your budget for months, or even years, depending on the severity of it. Having a clear idea of what your IT service plan covers is a great way to make sure that you don’t get hit by surprise billing.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

VoIP Facebook Time Management Robot Quick Tips WiFi Star Wars Infrastructure Data Breach Apple Hacks Webcam Printer IT Technicians Passwords Lithium-ion Battery Sync Digital Cloud Computing Antivirus Proactive IT Emoji Remote Monitoring and Management Electronic Health Records Health Consumers Botnet Identities Paperless Office Artificial Intelligence Google Calendar Downtime Bring Your Own Device Drones Small Business Apps History Shortcut Disaster Recovery Flexibility Customer Service PowerPoint Hosted Solution Work/Life Balance Employees Hard Drives Save Time Unified Communications Mouse Zero-Day Threat Hard Disk Drive Social Engineering Privacy USB Cache Application Big Data Server Management Windows 7 Cleaning Fleet Tracking Phone System Politics Business Growth IT service Fun Bitcoin Humor Patch Management Mobile Computing Smart Tech Website Wireless Technology Piracy Running Cable Computing Google Best Practices Networking Remote Monitoring Permission Geography Dark Data User Automation PDF Statistics Email Twitter Monitors Best Practice Authorization Search Business Continuity IBM Law Enforcement Augmented Reality SharePoint Public Cloud Safety Legislation ROI Data Management Cameras Software as a Service Theft Wasting Time Analyitcs Training Information Technology The Internet of Things Operating System Alerts Management Websites Cooperation Windows 10 Voice over Internet Protocol Spam Blockchain Company Culture End of Support Enterprise Content Management Wireless Alt Codes Bookmarks Virtual Assistant Office 365 Financial Mirgation Professional Services HIPAA Touchscreen Vendor Management Mobile Data Phishing Intranet Google Wallet Comparison Virtual Private Network Cybersecurity Budget Files Going Green Cryptocurrency Applications Co-managed IT WPA3 Technology Undo Vulnerability Domains Virtualization Notes VoIP Security Outlook Hard Drive Asset Tracking Regulations Laptop Network Congestion High-Speed Internet MSP Multi-Factor Security Hackers Password Black Market Risk Management Scary Stories Mobile Office Managed Service Relocation IT solutions How To GPS Chromebook Microsoft Office Miscellaneous Typing Corporate Profile Avoiding Downtime Staff Hotspot Unsupported Software Mobile Devices Gadgets Microsoft Gmail Firefox Software Consultation IP Address Specifications Managed Services Provider Favorites Two-factor Authentication Telephony Solid State Drive VPN Saving Time File Sharing Licensing Presentation Connectivity Scam YouTube Wearable Technology RMM How To Deep Learning Identity Cyber Monday Business Owner Disaster Resistance Virtual Desktop Tip of the week Managing Stress Google Docs Superfish Computer Repair BYOD Electronic Medical Records Backups Upgrade Content Filtering Marketing Virtual Reality Computing Infrastructure Bandwidth Consulting Legal Cables Authentication E-Commerce Motion Sickness Utility Computing Employer-Employee Relationship Computers Mail Merge Tech Term Error Data Recovery Firewall Data IT Support Computer CCTV Test Storage Documents Data Warehousing Outsourced IT Data loss Workplace Tips Remote Computing Social Hardware Social Networking Innovation Digital Payment Access Control Mobility Microsoft Excel Help Desk Current Events Windows Modem Ransomware G Suite Tracking Smart Technology Users IoT Buisness Distributed Denial of Service Compliance BDR Business Technology Entrepreneur Printing Conferencing SaaS Assessment Collaboration Technology Laws Permissions Chrome Fraud Troubleshooting Personal Information Upgrades Processors Healthcare Vulnerabilities Hiring/Firing Information Data storage Money Customer Relationship Management Features Word Cybercrime Internet of Things Hacking Crowdsourcing Database Smartphones Identity Theft Efficiency Virus Technology Tips Knowledge Data Security Software Tips Recycling Physical Security Machine Learning Managed IT Nanotechnology Lenovo Servers IT Support Notifications Language Techology Document Management Employee-Employer Relationship Backup and Disaster Recovery Cloud Remote Workers Disaster Finance Dark Web Chatbots Remote Worker Social Media Productivity Net Neutrality Unified Threat Management Break Fix Communication Uninterrupted Power Supply Tech Support Supercomputer 3D Printing Competition Cabling Address Taxes Tablet eWaste Cortana Heating/Cooling Spyware Gadget IT Budget Wi-Fi communications Windows 8 Backup Office Mobile Device Managment Point of Sale IT Consultant WannaCry Enterprise Resource Planning Mobile Device Holiday Settings Smartphone Sports Administrator Business Intelligence Human Error Tech Terms Managed Service Provider Business Samsung Malware Halloween 5G Travel Operations Downloads Writing Trending Internet Unified Threat Management Network IT Services Telephone Systems Wires Experience Staffing Analytics Refrigeration Retail Browser Computer Care Office Tips Business Computing Cookies Education Network Security Instant Messaging Save Money Hosted Solutions Managed IT Services Screen Reader iPhone Android Black Friday Google Maps Mobile Device Management Digital Signature Google Drive Mobile Security Tip of the Week Procurement Private Cloud Alert Cost Management LiFi Managed IT Service Network Management User Tips IT Management Data Backup Business Management Monitoring Migration Web Server Server Windows 10 Productivity Bluetooth Government Administration Managed IT services App Mobile Read Only Security Cameras Hacker Programming Cyberattacks Motherboard Encryption Proactive Project Management OneNote Router CIO Maintenance Update Internet Exlporer IT Consulting Public Speaking Recovery Saving Money User Error Environment Development Redundancy Display Meetings Automobile

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...