Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Password Protecting a Word Document

Tip of the Week: Password Protecting a Word Document

The funny thing about some documents is how the data written on them can strongly influence how important they are. If, for instance, there were two pieces of paper on a table, there is objectively no difference between the two, and so they are objectively equivalent in value.

Continue reading
0 Comments

Tip of the Week: Four Microsoft Word Tricks You Didn’t Know You Missed

Tip of the Week: Four Microsoft Word Tricks You Didn’t Know You Missed

Microsoft Word is more or less synonymous with word processing, but with the right tricks, you can do so much more. For this week’s tip, we’ll go over four neat and useful capabilities that Microsoft Word has.

Continue reading
0 Comments

4 Compelling Reasons to Upgrade to Office 365 Business Premium

4 Compelling Reasons to Upgrade to Office 365 Business Premium

Microsoft Office 365 offers many different solutions that allow your employees to be able to do their jobs, keep everything organized, and communicate efficiently. Although, it can be tricky to select a good Office 365 plan for your business. To help streamline operations, the Microsoft Office 365 Business Premium edition offers a versatile selection that can meet any needs your business may encounter.

Continue reading
0 Comments

Tip of the Week: How to Set Up Multi-Factor Authentication for Office 365

b2ap3_thumbnail_office_365_multi_factor_400.jpgHackers are growing bolder by the day, taking on huge organizations like the IRS and Sony Entertainment, and forcing businesses to stay on the defensive at all times. In spite of this, what can the average small business do to keep themselves safe? For starters, you can integrate multi-factor authentication, a solution designed to make it extra difficult for hackers to access online accounts.

Continue reading
0 Comments

Tip of the Week: View Multiple Pages at Once in Microsoft Word

b2ap3_thumbnail_microsoft_word_400.jpgLet’s face it; sometimes you need a bird’s eye view of your Microsoft Word document that a single page can’t provide you with. Wouldn’t it be nice if you could view multiple pages and take everything into perspective? Well, as it turns out, you can. In fact, you can view up to eight pages at once by following this simple procedure.

Continue reading
0 Comments

Tip of the Week: Take Advantage of Microsoft Outlook’s Quick Step Feature

b2ap3_thumbnail_outlook_email_quick_steps_400.jpgSometimes the reason for not taking advantage of more complex features in programs is that they take multiple steps to complete. For those deterred from these features or functions, Microsoft Outlook has a Quick Steps feature that takes the pain out of multiple-step processes and reduces it to the click of a button.

Continue reading
0 Comments

Microsoft PowerPoint is Useful, but Not In the Courtroom

b2ap3_thumbnail_powerpoint_no_courts_400.jpgWe all know Microsoft PowerPoint as a great presentation tool which can help you drive information home to the audience. Naturally, this makes it a great medium for use in more than one type of professional environment. It can be used for webinars, lectures, and even the courtrooms; but is a legal trial really a place for a slideshow?

Continue reading
0 Comments

Tip of the Week: How to Go Back in Microsoft Word

b2ap3_thumbnail_ms_word_400.jpgWhen working on a project, it can be helpful to retrace your steps. This is especially true when using Microsoft Word. To help you find where you were last at in Word, Microsoft has a Go Back command that’s not very well known. For this week’s tip, we’ll show you how to use it.

Continue reading
0 Comments

Look Out: Critical Microsoft Office Flaw Finally Patched

b2ap3_thumbnail_microsoft_office_vulnerability_400.jpgDoes your office practice proper maintenance and security against the latest threats, like Sandworm and CryptoWall 2.0? You should, or else your business might get a nasty holiday gift in the form of the Schannel vulnerability in Microsoft Office. This particular threat allows a hacker to take over the entire system, making it an exceptionally dangerous vulnerability that you can’t ignore. Thankfully, a patch is available to the general public, so you want to apply it as soon as possible.

Continue reading
0 Comments

Tip of the Week: Organize Your Microsoft Outlook Contact List

b2ap3_thumbnail_microsoft_outlook_400.jpgWhat's your Microsoft Outlook contact list looking like these days? For many busy business owners, their email contacts list is jumbled and unorganized, making it difficult to do something simple like locate needed information. Here are a few tips to help you better organize your Outlook contacts so that you can quickly find what you're looking for.

Continue reading
0 Comments

Make Dynamic Infographics with Microsoft PowerPoint

b2ap3_thumbnail_powerpoint_for_infographs_400.jpgNot only can Microsoft PowerPoint make great slideshows, it can also make engaging infographics. The latest trend in marketing is fairly simple: Visual content sells. Images and videos are the most popular way to take advantage of this. Infographics can offer your marketing campaign a combination of text and image, allowing your marketing content to be both engaging and informative.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Unsupported Software Public Speaking Multi-Factor Security Mobile Security Customer Relationship Management Printer Upgrades Cybercrime Remote Monitoring Managed IT services Application iPhone PowerPoint Mobile Office Data Recovery Crowdsourcing Processors Computing Cables IP Address Social Networking Black Friday Websites Save Money Geography Heating/Cooling Corporate Profile Browser Email ROI RMM PDF SharePoint Computing Infrastructure Vendor Management communications Business Growth Network Management Employer-Employee Relationship Content Filtering Politics Electronic Medical Records HIPAA Saving Time Google Docs Virus Innovation Mail Merge Zero-Day Threat Intranet Fun Mobile Data Privacy Data Security E-Commerce Best Practice Technology Tech Terms Workplace Tips Alerts Webcam Solid State Drive WPA3 Human Error Chromebook Hacking Private Cloud Screen Reader Big Data Money Scary Stories Data Breach Google End of Support Sports VoIP USB Tracking Spyware Paperless Office Flexibility Cyber Monday Consultation IT Consultant Distributed Denial of Service Windows 10 Wireless Statistics Backup and Disaster Recovery Samsung Business Continuity Digital Signature Recovery Tech Support Dark Web Avoiding Downtime Halloween Relocation Employee-Employer Relationship Internet Data storage VPN Storage Wearable Technology Public Cloud Hosted Solution Apps Vulnerabilities Point of Sale Work/Life Balance Wi-Fi Domains Internet of Things Hacks Settings Infrastructure Redundancy Google Maps Government Web Server Health Budget Security Cameras Blockchain Managed IT Services Google Calendar Assessment Competition Modem Server Firewall Legal Black Market Google Wallet Hard Drives Cloud Computing Telephone Systems Mobile Device Managment Proactive Management Permission Data Backup Business Owner Asset Tracking Encryption Technology Tips Gadgets Administrator Business Computing Authentication Favorites Efficiency Windows 8 Cache Remote Workers Test Malware Tablet Business Technology Remote Computing Refrigeration Scam Word Sync Consumers Connectivity Staffing Bookmarks IT Budget Customer Service Documents Unified Threat Management How To Digital Payment eWaste Employees Uninterrupted Power Supply OneNote Access Control Knowledge Technology Laws Financial Password Mobile Wireless Technology Passwords Features Office 365 Mobile Device History Environment Data Warehousing Windows Specifications Hard Drive Cloud Running Cable Proactive IT Managed Services Provider Information Technology Utility Computing Presentation Router Downloads Authorization Machine Learning Backup Regulations Applications Users Typing Bitcoin How To Managing Stress Mobile Device Management Buisness IoT Communication Computer Repair Downtime Productivity Co-managed IT Emoji Microsoft Office Hosted Solutions Conferencing Licensing Alt Codes Office Website Laptop Taxes Tip of the Week Hardware IT Support Bluetooth Motion Sickness CIO Social Net Neutrality Bring Your Own Device Patch Management Chrome Humor Social Media IT Technicians Going Green Dark Data Productivity Twitter Risk Management Notifications WannaCry Fleet Tracking Antivirus Trending Business Facebook Managed IT Servers Automation Travel Identities Smart Technology Administration Cabling 5G Gadget Company Culture Cybersecurity Document Management Supercomputer Managed IT Service The Internet of Things Firefox Instant Messaging Disaster Enterprise Content Management Hiring/Firing Unified Threat Management 3D Printing Two-factor Authentication Enterprise Resource Planning Internet Exlporer Software as a Service Virtualization Unified Communications Small Business Mouse Managed Service GPS Current Events Monitors Safety Theft File Sharing Healthcare Permissions Consulting Save Time Read Only Hackers Monitoring Network Security Identity Comparison Data Telephony Analyitcs CCTV Drones Upgrade Project Management Security Phishing User Error IT solutions Cyberattacks Robot IT service Remote Monitoring and Management MSP IT Services Compliance Nanotechnology WiFi Information Development Lenovo Fraud Chatbots Operating System Google Drive Mobility Time Management Techology Automobile Phone System Physical Security Tip of the week Computer Procurement Error Digital YouTube Holiday Maintenance Microsoft Vulnerability Training Alert Recycling IBM Hotspot Piracy Wires Printing Business Intelligence G Suite LiFi Undo BYOD Bandwidth Social Engineering Update Education Gmail Mobile Computing Programming Network Congestion Lithium-ion Battery Electronic Health Records Virtual Reality Address Smartphones Computer Care Virtual Desktop Ransomware Migration Collaboration Break Fix Augmented Reality Retail Legislation Shortcut Data loss IT Support Motherboard Smartphone Server Management Hard Disk Drive Search VoIP Cooperation Cost Management Entrepreneur Backups Law Enforcement Language Mobile Devices Software Writing BDR Operations Cookies Disaster Recovery Networking Cryptocurrency Office Tips Miscellaneous Star Wars Remote Worker Analytics Touchscreen IT Consulting SaaS Apple Meetings Deep Learning Identity Theft Files Computers Best Practices IT Management High-Speed Internet Staff User Tips Troubleshooting Disaster Resistance Outsourced IT Personal Information Tech Term Display Windows 10 App Marketing Software Tips Cleaning Finance Hacker Experience Cameras Mirgation Superfish Botnet Outlook Smart Tech Microsoft Excel Network Help Desk Cortana Data Management Quick Tips Artificial Intelligence Spam Business Management Saving Money Managed Service Provider Android Virtual Private Network User

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code