Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Tell When Your Network is Stretched Too Thin

b2ap3_thumbnail_network_obstruction_400.jpgA network is arguably one of the most important assets that your business has. It keeps your team connected to crucial information and mission-critical applications. This is perhaps why it’s so irritating when your network acts up. You should be on the lookout for even the slightest problem with your network, as even a small change could be a sign of bad things yet to come.

Continue reading

Just 28% of Organizational Data Stored Has a Clear Business Value

b2ap3_thumbnail_dark_data_400.jpgAccording to a recent survey by IDG Research Services of business and technology leaders, on average, only 28 percent of data stored and maintained has value to the day-to-day operations of a business. Translation: a whopping 72 percent of files stored by a business are useless.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Disaster Recovery Connectivity Statistics Malware Small Business History Authorization Search Hard Disk Drive Remote Computing Enterprise Resource Planning Programming VoIP Wi-Fi Wireless Workplace Tips Google Drive Router Competition Upgrades Botnet Microsoft WPA3 IT service Chatbots Data Management Saving Time Emoji Network Blockchain Managed Service Provider Office Tips Geography Computers Company Culture Spyware Tech Term Bookmarks Conferencing Distributed Denial of Service Infrastructure Cloud Business Owner Upgrade Sync Microsoft Office Heating/Cooling Hosted Solutions Chrome LiFi Application Internet VPN Cortana Browser Analyitcs Windows 10 Productivity Recovery Lithium-ion Battery Monitoring Environment Knowledge Features Net Neutrality Documents Cooperation Dark Data Co-managed IT Apps Work/Life Balance Backup and Disaster Recovery Permission IT Technicians User Error Meetings Shortcut Robot Laptop Printing Legal GPS Break Fix Cybercrime Users Files Storage Technology Laws Outsourced IT Error Dark Web Artificial Intelligence Avoiding Downtime Saving Money Social Media Development Sports Twitter Trending Employee-Employer Relationship Unsupported Software Identities Mobile Data Marketing Managed IT Service Regulations Mirgation Collaboration Staff Business Continuity Consultation Bring Your Own Device Consulting Operating System Data Innovation Cybersecurity Cyber Monday Mouse Software as a Service Access Control Encryption Software Tips Automation Cameras Update Tracking Politics BDR Customer Relationship Management Hard Drive Gmail PowerPoint ROI Managed Services Provider Virtualization Processors Comparison Safety Vendor Management Private Cloud Notifications Financial Downloads Public Speaking Healthcare Antivirus Server RMM Cleaning IoT Scam Tech Terms Downtime Web Server Specifications File Sharing Social Networking Employees Google Business Intelligence Enterprise Content Management Computer Tech Support Wires Smartphones IP Address Compliance Cookies Entrepreneur Apple Virtual Reality Presentation Settings Password Information Technology Efficiency Data loss Crowdsourcing Tip of the week Mobile Device Management Managed IT Business Refrigeration How To Virtual Desktop Halloween Word Personal Information The Internet of Things CIO Automobile Motion Sickness Project Management iPhone Alert Education Hotspot Budget Big Data Test Staffing Applications Bitcoin Hosted Solution Data storage Operations Facebook Mail Merge Virtual Private Network Disaster Running Cable Gadgets Employer-Employee Relationship Solid State Drive Address Business Computing Professional Services Writing Hard Drives Disaster Resistance Multi-Factor Security Data Security Hardware Computing Infrastructure E-Commerce Google Maps Passwords Computer Repair Fleet Tracking Travel Remote Workers IBM Servers Security Cameras Cloud Computing Mobile Security Authentication Vulnerability Hiring/Firing Internet of Things Managing Stress 3D Printing Telephone Systems WiFi Remote Monitoring and Management Screen Reader Remote Monitoring Smartphone Redundancy Hacks G Suite Experience Mobile Office Printer Unified Communications 5G BYOD Managed Service Smart Technology Cost Management PDF Touchscreen Voice over Internet Protocol Hackers High-Speed Internet Recycling Unified Threat Management communications VoIP Technology Best Practice Typing Digital Data Backup Read Only Patch Management Firefox Nanotechnology IT solutions Best Practices Google Calendar Wearable Technology Fun Networking Black Market Windows Buisness Mobile Computing Computer Care Analytics Deep Learning eWaste Database Time Management Star Wars Unified Threat Management Quick Tips Mobile Devices Administration Android Managed IT services Mobile Motherboard Migration YouTube Technology Tips Spam Instant Messaging Office Productivity Hacking Gadget Training Business Technology Corporate Profile Display Identity USB Point of Sale Wasting Time Going Green User Troubleshooting Maintenance Website Undo Virus Customer Service Public Cloud Managed IT Services Phishing Google Wallet Internet Exlporer Techology Cables Zero-Day Threat Mobility Firewall Digital Payment Bandwidth Electronic Health Records IT Support Cache How To Remote Worker Procurement IT Services IT Consulting Two-factor Authentication Permissions Data Warehousing Security Computing Software Vulnerabilities Backup CCTV Business Growth Ransomware Alerts Humor Office 365 Business Management Proactive Document Management HIPAA Modem Money Flexibility Network Congestion Information Asset Tracking IT Support Black Friday Save Time Smart Tech Lenovo Save Money Data Breach IT Management Outlook Domains Proactive IT Licensing Miscellaneous OneNote Cabling Notes Telephony IT Budget Alt Codes Management Administrator End of Support User Tips SharePoint Theft App Email Piracy Identity Theft Bluetooth Relocation Windows 7 Data Recovery Network Management Phone System Health Consumers WannaCry Risk Management Language Superfish Google Docs Augmented Reality Retail Utility Computing Network Security Supercomputer Mobile Device Windows 8 Government Electronic Medical Records Privacy Favorites Mobile Device Managment Cryptocurrency Holiday Physical Security Websites Human Error Server Management IT Consultant Virtual Assistant Help Desk Scary Stories Fraud Finance Wireless Technology MSP Social Engineering Uninterrupted Power Supply Samsung Current Events Tip of the Week Tablet SaaS Machine Learning Communication Intranet Drones Legislation Microsoft Excel Monitors Paperless Office Assessment Hacker Social Taxes Law Enforcement Windows 10 Backups Content Filtering Webcam Cyberattacks Digital Signature Chromebook

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...