Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Excel-lent Keyboard Shortcuts

Tip of the Week: Excel-lent Keyboard Shortcuts

How well do you know Microsoft Excel, the premier spreadsheet building software? Depending on your proficiency with it, you may already be familiar with some of the various keyboard shortcuts associated with it. We’ll list off some of the most commonly used keyboard shortcuts, as well as what you can do to become a Microsoft Excel power user.

Continue reading
0 Comments

3 SharePoint Considerations Businesses Should Have

3 SharePoint Considerations Businesses Should Have

Businesses are always looking for a way to make their projects more successful. While many organizations have found success by integrating Microsoft SharePoint project collaboration software, some have found it to be a giant headache to manage, or even completely unnecessary. No matter where your business falls on this spectrum, there are some best practices in utilizing SharePoint to get the most out of the platform. Here are three considerations your team should make when you settle on SharePoint for project collaboration.

Continue reading
0 Comments

Tip of the Week: Four Microsoft Word Tricks You Didn’t Know You Missed

Tip of the Week: Four Microsoft Word Tricks You Didn’t Know You Missed

Microsoft Word is more or less synonymous with word processing, but with the right tricks, you can do so much more. For this week’s tip, we’ll go over four neat and useful capabilities that Microsoft Word has.

Continue reading
0 Comments

The Many Ways Your Business Can Benefit By Having a Productivity Suite

The Many Ways Your Business Can Benefit By Having a Productivity Suite

For the modern business it’s important to have software that is both simple to use and powerful enough to meet your needs. Nowadays, there are cloud-based platforms that come with storage, communication options, and many of the enterprise-level productivity applications that drive your organization’s productivity. Two of these, Microsoft’s Office 365 and Google’s G-Suite bring substantial value and flexibility to the table where there was once only expense.

Continue reading
0 Comments

4 Reasons Why You Should Give Office 365 a Try

4 Reasons Why You Should Give Office 365 a Try

It can be stressful to select the right technology for your business. To take some of this pressure off of your shoulders, we’d like to make a suggestion--look into Microsoft Office 365. It could be just the solution you need to make several of your responsibilities easier.

Continue reading
0 Comments

Tip of the Week: How to Set Up Multi-Factor Authentication for Office 365

b2ap3_thumbnail_office_365_multi_factor_400.jpgHackers are growing bolder by the day, taking on huge organizations like the IRS and Sony Entertainment, and forcing businesses to stay on the defensive at all times. In spite of this, what can the average small business do to keep themselves safe? For starters, you can integrate multi-factor authentication, a solution designed to make it extra difficult for hackers to access online accounts.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Private Cloud IT Budget Running Cable Spam Cloud Computing Address Avoiding Downtime Remote Workers Development Password Monitors Staff Information Cabling Notifications Managed Service Provider Wires Employer-Employee Relationship Meetings Machine Learning Smartphone Facebook Identities Internet Screen Reader Social Media Motion Sickness Project Management Mirgation Managing Stress communications Experience Dark Data Application IT solutions How To Employee-Employer Relationship Analyitcs Customer Service IT Consultant Domains Mail Merge Unified Threat Management Social Networking Sync Backup Law Enforcement Time Management Management ROI The Internet of Things Computing Disaster Recovery WPA3 Finance Backup and Disaster Recovery Processors Network Security Troubleshooting Telephony Writing Remote Monitoring and Management Hard Drives Enterprise Resource Planning Legislation Data Recovery Computer Repair Cables Automobile Mobile Devices Windows 8 Business Management Cameras Blockchain Identity Theft Augmented Reality Specifications Virtual Private Network Office Undo Consultation Upgrade Black Friday Multi-Factor Security Current Events End of Support Education Smart Tech Printer SaaS Encryption Managed IT services Paperless Office Technology Tips iPhone PDF User Error Microsoft Excel Physical Security Network Management Hardware Computing Infrastructure Analytics Public Speaking Help Desk Storage Remote Computing Safety Microsoft Office Productivity Cloud Downloads Knowledge Display Social Engineering Save Money Artificial Intelligence Microsoft Break Fix Hacker Productivity Business Compliance Nanotechnology Administration Save Time Business Growth Google Gadget LiFi Typing Bandwidth Point of Sale Net Neutrality Cryptocurrency IT Consulting Instant Messaging Content Filtering Customer Relationship Management Collaboration Superfish Data Warehousing PowerPoint Lenovo Managed IT Services Vulnerabilities Redundancy Travel Recycling Theft Mobile Device Managment Data Breach Consumers Tech Support Identity Government Recovery Financial Laptop USB Alerts Politics Environment IT Management Computer Care Social G Suite Flexibility Assessment Outlook Antivirus Shortcut Hiring/Firing Chromebook Monitoring Chatbots Cooperation Phone System Wireless Technology Legal WiFi WannaCry Google Drive Internet of Things Refrigeration Consulting Firewall Error Best Practice Mobile Proactive Dark Web History Backups Settings Uninterrupted Power Supply Passwords Holiday Document Management Word VoIP Web Server Wearable Technology Computers Managed Service MSP Google Wallet Cookies Read Only Taxes Mobile Device Management Android Saving Time Two-factor Authentication Lithium-ion Battery Tracking Marketing Privacy IP Address Infrastructure Telephone Systems Disaster Resistance Big Data User Star Wars How To Distributed Denial of Service Data loss Trending Samsung Data Management Google Docs Favorites RMM Bitcoin Botnet Utility Computing Internet Exlporer Vendor Management YouTube Managed Services Provider Bluetooth Supercomputer Buisness Windows GPS Documents Cleaning CIO Zero-Day Threat Digital Signature Virtual Reality Cybercrime Competition Downtime Small Business Hacks Gmail IT service Bring Your Own Device Cyber Monday Patch Management Windows 10 Gadgets Hacking VPN CCTV Communication Cache Enterprise Content Management Budget Procurement Security Cameras Tip of the week Operating System Scary Stories Website Business Technology BDR Corporate Profile Applications Bookmarks Fraud Quick Tips 3D Printing Robot Electronic Medical Records Chrome Tech Term Public Cloud Drones Smart Technology Smartphones Electronic Health Records Alt Codes Data storage Workplace Tips File Sharing HIPAA Update Hackers Human Error Files Software Tips Outsourced IT Remote Worker User Tips Business Owner Regulations Permission Mouse Modem Mobile Office Disaster Employees Users Touchscreen Techology Efficiency Healthcare Health Administrator IT Support Digital Payment Mobile Data Malware Hard Disk Drive Test Proactive IT Websites Network Email Networking Operations Business Intelligence Automation VoIP Google Calendar Migration Virus Risk Management Server IT Support Business Computing Training Staffing Licensing Motherboard Router Office Tips Mobile Computing Tablet Information Technology Phishing Security Managed IT Service Search Authentication Unsupported Software Money Crowdsourcing Best Practices Features Programming App Upgrades Relocation Fleet Tracking Geography Fun Cortana Windows 10 OneNote Wi-Fi Solid State Drive Mobility Mobile Device Remote Monitoring Permissions SharePoint Spyware Hosted Solutions High-Speed Internet Work/Life Balance Hard Drive Language Heating/Cooling Unified Threat Management Scam Wireless Virtualization Cybersecurity Digital Servers BYOD Piracy Company Culture E-Commerce Personal Information Webcam Technology Laws Apple Entrepreneur Miscellaneous Technology Presentation Data eWaste Emoji Google Maps Comparison Network Congestion Maintenance Conferencing Hotspot Printing Statistics Deep Learning Software Business Continuity IBM Humor Innovation Authorization IT Services Cyberattacks Managed IT Halloween Access Control Data Security Computer Firefox Retail Vulnerability Browser 5G Office 365 Server Management Unified Communications Black Market Ransomware Hosted Solution IT Technicians Asset Tracking Alert Twitter Going Green IoT Software as a Service Mobile Security Tip of the Week Cost Management Co-managed IT Sports Tech Terms Apps Saving Money Connectivity Intranet Virtual Desktop Data Backup

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code