Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Making a Functional Database in Excel

Tip of the Week: Making a Functional Database in Excel

A database is an incredibly useful tool for organizing a lot of information in a relatively concise and accessible way. Did you know that you can use a relatively common program, Microsoft Excel, to generate a database for your business to use? For this week’s tip, we’ll walk you through this process to help you keep your data organized.

Continue reading
0 Comments

Tip of the Week: Password Protecting a Word Document

Tip of the Week: Password Protecting a Word Document

The funny thing about some documents is how the data written on them can strongly influence how important they are. If, for instance, there were two pieces of paper on a table, there is objectively no difference between the two, and so they are objectively equivalent in value.

Continue reading
0 Comments

Tip of the Week: Four Microsoft Word Tricks You Didn’t Know You Missed

Tip of the Week: Four Microsoft Word Tricks You Didn’t Know You Missed

Microsoft Word is more or less synonymous with word processing, but with the right tricks, you can do so much more. For this week’s tip, we’ll go over four neat and useful capabilities that Microsoft Word has.

Continue reading
0 Comments

4 Compelling Reasons to Upgrade to Office 365 Business Premium

4 Compelling Reasons to Upgrade to Office 365 Business Premium

Microsoft Office 365 offers many different solutions that allow your employees to be able to do their jobs, keep everything organized, and communicate efficiently. Although, it can be tricky to select a good Office 365 plan for your business. To help streamline operations, the Microsoft Office 365 Business Premium edition offers a versatile selection that can meet any needs your business may encounter.

Continue reading
0 Comments

Tip of the Week: How to Set Up Multi-Factor Authentication for Office 365

b2ap3_thumbnail_office_365_multi_factor_400.jpgHackers are growing bolder by the day, taking on huge organizations like the IRS and Sony Entertainment, and forcing businesses to stay on the defensive at all times. In spite of this, what can the average small business do to keep themselves safe? For starters, you can integrate multi-factor authentication, a solution designed to make it extra difficult for hackers to access online accounts.

Continue reading
0 Comments

Tip of the Week: View Multiple Pages at Once in Microsoft Word

b2ap3_thumbnail_microsoft_word_400.jpgLet’s face it; sometimes you need a bird’s eye view of your Microsoft Word document that a single page can’t provide you with. Wouldn’t it be nice if you could view multiple pages and take everything into perspective? Well, as it turns out, you can. In fact, you can view up to eight pages at once by following this simple procedure.

Continue reading
0 Comments

Tip of the Week: Take Advantage of Microsoft Outlook’s Quick Step Feature

b2ap3_thumbnail_outlook_email_quick_steps_400.jpgSometimes the reason for not taking advantage of more complex features in programs is that they take multiple steps to complete. For those deterred from these features or functions, Microsoft Outlook has a Quick Steps feature that takes the pain out of multiple-step processes and reduces it to the click of a button.

Continue reading
0 Comments

Microsoft PowerPoint is Useful, but Not In the Courtroom

b2ap3_thumbnail_powerpoint_no_courts_400.jpgWe all know Microsoft PowerPoint as a great presentation tool which can help you drive information home to the audience. Naturally, this makes it a great medium for use in more than one type of professional environment. It can be used for webinars, lectures, and even the courtrooms; but is a legal trial really a place for a slideshow?

Continue reading
0 Comments

Tip of the Week: How to Go Back in Microsoft Word

b2ap3_thumbnail_ms_word_400.jpgWhen working on a project, it can be helpful to retrace your steps. This is especially true when using Microsoft Word. To help you find where you were last at in Word, Microsoft has a Go Back command that’s not very well known. For this week’s tip, we’ll show you how to use it.

Continue reading
0 Comments

Look Out: Critical Microsoft Office Flaw Finally Patched

b2ap3_thumbnail_microsoft_office_vulnerability_400.jpgDoes your office practice proper maintenance and security against the latest threats, like Sandworm and CryptoWall 2.0? You should, or else your business might get a nasty holiday gift in the form of the Schannel vulnerability in Microsoft Office. This particular threat allows a hacker to take over the entire system, making it an exceptionally dangerous vulnerability that you can’t ignore. Thankfully, a patch is available to the general public, so you want to apply it as soon as possible.

Continue reading
0 Comments

Tip of the Week: Organize Your Microsoft Outlook Contact List

b2ap3_thumbnail_microsoft_outlook_400.jpgWhat's your Microsoft Outlook contact list looking like these days? For many busy business owners, their email contacts list is jumbled and unorganized, making it difficult to do something simple like locate needed information. Here are a few tips to help you better organize your Outlook contacts so that you can quickly find what you're looking for.

Continue reading
0 Comments

Make Dynamic Infographics with Microsoft PowerPoint

b2ap3_thumbnail_powerpoint_for_infographs_400.jpgNot only can Microsoft PowerPoint make great slideshows, it can also make engaging infographics. The latest trend in marketing is fairly simple: Visual content sells. Images and videos are the most popular way to take advantage of this. Infographics can offer your marketing campaign a combination of text and image, allowing your marketing content to be both engaging and informative.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Update Conferencing Android Electronic Health Records Windows Law Enforcement Mouse Virtual Desktop Business Continuity Authentication Employer-Employee Relationship Motion Sickness Business Intelligence Environment Solid State Drive Financial Vendor Management Cloud Documents Digital Signature Google Wallet Cybersecurity Google Drive Tracking VPN Network Mobile Security Business Owner Heating/Cooling Private Cloud PowerPoint Chrome Sports Work/Life Balance Vulnerabilities IoT Computing Infrastructure HIPAA Remote Worker Proactive IT Migration Hacker 5G WannaCry Outsourced IT Patch Management USB Co-managed IT Spam Application Hard Drives Electronic Medical Records BYOD Internet of Things Managed Service Provider IT Consulting Writing Access Control Scam Politics Nanotechnology IT solutions Settings Smartphones Password Chromebook Website Techology Bring Your Own Device Innovation Best Practice Motherboard Business Computing Webcam Two-factor Authentication Firefox Gadget Phishing Workplace Tips Database Consulting Test Small Business Address Botnet App Websites Virtual Reality Cybercrime Network Management Finance Windows 8 CIO Legislation Company Culture Blockchain Entrepreneur Bitcoin Save Time Apple Lenovo Saving Time Cleaning Hacks G Suite Staffing Programming Facebook Authorization communications Mobile Data Employee-Employer Relationship Budget Managed IT Service Analyitcs iPhone Twitter Break Fix Notifications Government Content Filtering Emoji Vulnerability 3D Printing Machine Learning Holiday Paperless Office Ransomware Network Security Infrastructure Zero-Day Threat Hiring/Firing Mobile Miscellaneous Tip of the week Voice over Internet Protocol Data Security Router Smartphone Intranet Proactive Staff Going Green Business How To IT Support Technology Tips File Sharing Regulations Mobile Device Productivity Customer Service Social Networking Tech Terms Features Cameras Taxes Consultation Managed IT services Time Management Apps Cortana Storage Permission Current Events Superfish Tech Term Administration Computer Repair Healthcare Mobile Office Virus Language Managed IT Halloween Security Drones IBM Statistics Server Management Training End of Support Dark Data Passwords Wearable Technology High-Speed Internet Consumers Backup and Disaster Recovery Chatbots Analytics Lithium-ion Battery Mobility Browser Utility Computing Remote Monitoring Data loss OneNote Risk Management Robot Hosted Solutions Data Backup Customer Relationship Management Data Recovery Education Upgrade WPA3 Relocation IT service Managing Stress Humor Retail Google Calendar Collaboration Computer Development Hardware Cyberattacks Error Managed IT Services Microsoft Excel Save Money Health Information Technology Geography BDR Downtime Public Speaking Wi-Fi Telephony Hard Drive History Word Disaster Resistance Undo Alert Licensing Permissions Travel Disaster Flexibility Tip of the Week Business Growth Cloud Computing Bookmarks Black Friday Gmail Marketing IT Services Screen Reader Project Management Asset Tracking Identity Theft Saving Money Upgrades Mobile Device Managment Efficiency Information Communication IT Management Knowledge Remote Monitoring and Management Data Management Data E-Commerce Human Error Net Neutrality Recycling Money Hard Disk Drive Encryption Personal Information Phone System LiFi Smart Technology Remote Computing Cabling Instant Messaging Windows 10 Mobile Computing Cookies Business Management Virtual Private Network Shortcut Microsoft Office Black Market Mobile Devices SaaS Social Engineering Unified Threat Management Tech Support Network Congestion The Internet of Things Email Telephone Systems Unified Communications Remote Workers Search Dark Web eWaste Cyber Monday Recovery Hotspot Enterprise Content Management SharePoint Wires Hackers Firewall Supercomputer Google Outlook Display Operations IT Consultant Business Technology Samsung Point of Sale Physical Security VoIP Touchscreen Windows 7 Operating System Office 365 Assessment Identity Comparison PDF YouTube Specifications Hosted Solution Networking Printing Crowdsourcing Data Breach Computing Backups User Error Processors Professional Services Artificial Intelligence Social Media Identities Running Cable Wireless Notes How To CCTV Internet Exlporer MSP Downloads User Managed Services Provider VoIP Files Bluetooth Safety Technology Spyware Security Cameras Automation Social Alerts Sync Wasting Time Windows 10 Laptop Big Data Presentation GPS Printer Redundancy Public Cloud Microsoft Virtual Assistant Software Tips Office Smart Tech Google Maps Web Server Gadgets Mirgation Cryptocurrency Compliance Managed Service Tablet ROI Cooperation Favorites Virtualization Deep Learning Applications Automobile IT Support Quick Tips Legal Corporate Profile Monitoring Office Tips Enterprise Resource Planning Unsupported Software Alt Codes Fraud Privacy Modem IT Budget User Tips Bandwidth Cache RMM Computer Care Competition Trending Fun Productivity Monitors Scary Stories Malware Internet Augmented Reality Google Docs IP Address Domains Connectivity Software as a Service Employees Avoiding Downtime Read Only Theft Maintenance IT Technicians Fleet Tracking Best Practices Digital Procurement Digital Payment Unified Threat Management Hacking Cables Data storage Document Management Typing Uninterrupted Power Supply Mail Merge Disaster Recovery Software Servers Wireless Technology Computers Help Desk Star Wars Buisness WiFi Antivirus Management Technology Laws Administrator Multi-Factor Security Experience Distributed Denial of Service Meetings Server Backup Users Cost Management Data Warehousing Troubleshooting Refrigeration Mobile Device Management Piracy

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...
QR-Code