Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Visiting Useful Windows 10 Features

Tip of the Week: Visiting Useful Windows 10 Features

Windows 10 isn’t just a great operating system for getting things done--it’s also jam-packed with features that you might not even have known about. This week’s tip is all about some of the handy features that Windows 10 can provide for your office.

Continue reading
0 Comments

66% of Organizations Will Wait for Their Operating Systems to “Expire” Before Upgrading

b2ap3_thumbnail_upgrade_your_os_400.jpgWhen it comes to technology, upgrading is part of the package. Despite this being a well-established fact, some business owners will delay upgrading for as long as possible, while others will upgrade as soon as the latest product is released. What’s behind a company’s motivation to upgrade or not? We can better understand this by looking at a study on why businesses upgrade their operating systems.

Continue reading
0 Comments

Windows Server 2003’s End of Support Date is Fast-Approaching

b2ap3_thumbnail_windows_server_2003_400.jpgLast year, Microsoft pulled the plug on Windows XP’s support. Now, one year later, Windows Server 2003 is scheduled to meet its demise. If your servers are still running Windows Server 2003 as their operating system, it’s important to upgrade before the end of support date of July 14th. Otherwise, you could be running a server operating system without necessary patches and security updates.

Continue reading
0 Comments

Tip of the Week: 4 Android Device Lock Settings

b2ap3_thumbnail_android_security_400.jpgThe busy business owner keeps sensitive work-related information stored on their mobile device. If he lost the device, it could have disastrous results, especially if the device were to fall into the hands of an experienced hacker or competitor. Just in case, it’s a best practice to always lock your mobile devices. How do you choose the Android lock feature which is right for your unique needs?

Continue reading
0 Comments

What do CIOs Really Think of Windows 10?

b2ap3_thumbnail_opinions_of_windows_10_400.jpgWindows 10, the next big Microsoft’s Windows operating system, has a lot to live up to, and enterprises have had the chance to experiment with the technical preview for the past month. While the operating system will still be in development for the better part of next year, some professionals are forming opinions of what to expect from it. From the technical preview, what do businesses think of Windows 10 so far?

Continue reading
0 Comments

Why Did Microsoft Skip Windows 9? Because Seven Eight Nine! (Get it?)

b2ap3_thumbnail_windows_10_400.jpgThe news is out; what was previously thought to be Windows 9, codenamed “Threshold,” has been revealed to be Windows 10. While leaks have already shown us quite a bit of what the latest installment of Windows can do, the official reveal goes into more detail about the nature of Windows 10 for enterprises and even common users. First, let’s go over what we already know about the enigmatic new operating system, then we’ll get into the juicy new details.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Downtime Users Remote Workers Business Growth Wireless Time Management Communication Black Market Security Utility Computing Laptop Touchscreen Data loss Blockchain Computer Care Settings Business Owner Windows 8 Employees IT Support User Windows 10 VoIP Vendor Management Licensing Zero-Day Threat Managed IT services Gmail Halloween iPhone BYOD Applications Mobile Devices Money Statistics Social Networking Browser Managed Service Provider Remote Worker Display Unified Threat Management Computing Infrastructure Lithium-ion Battery Content Filtering Phone System VPN Procurement ROI Black Friday Managing Stress Google Wallet Hard Drives Disaster History Authorization Office Tips Mirgation Tip of the Week YouTube Remote Monitoring Privacy Router Vulnerability Telephony Private Cloud Passwords Computing Computers Bring Your Own Device Education Windows Corporate Profile WiFi Virtual Private Network Regulations Professional Services Sports Migration Permissions IT Technicians Competition MSP IT service Experience Legislation Network Application Company Culture Undo Mail Merge Conferencing Mobility GPS The Internet of Things Password Comparison Malware Two-factor Authentication Meetings Social Media Productivity Security Cameras Small Business Holiday IP Address Specifications Information IT Services Data Warehousing Spyware Smartphones Scam Error Android Microsoft Office Refrigeration App Cybercrime WannaCry Automobile Consultation Recycling Cleaning PDF Cache SaaS E-Commerce Virus How To Avoiding Downtime Managed Service Cortana Identity Theft Crowdsourcing Taxes Hosted Solution Budget Language 5G Wasting Time Help Desk Human Error Geography Government Saving Time Hacker Alt Codes Read Only Techology End of Support Outsourced IT Cables Search Best Practice Bookmarks Chatbots Network Security Public Speaking Chrome Productivity Solid State Drive Google Maps USB Trending Office Permission Smartphone Maintenance Supercomputer Phishing Mobile IT Management Save Money Administrator Troubleshooting Digital Payment Address WPA3 Physical Security Chromebook Best Practices Lenovo Downloads Google Unsupported Software Bluetooth Cyberattacks Relocation Managed IT Services Internet Exlporer Update Net Neutrality Windows 7 Servers Botnet Enterprise Content Management Network Congestion Unified Communications Healthcare OneNote Patch Management G Suite Dark Web Analytics Dark Data Modem Deep Learning Firewall Recovery Printer Gadget IT Consultant Risk Management IT Consulting Wires Cloud Computing Law Enforcement Tip of the week Documents Apps Business Technology Analyitcs User Error Theft Retail Spam Artificial Intelligence eWaste Database Encryption Cameras Managed IT Service Motherboard Data Breach Website Windows 10 Business Samsung Collaboration Infrastructure Drones Sync Employer-Employee Relationship Electronic Health Records Voice over Internet Protocol Electronic Medical Records Digital Signature Travel Mobile Security Wearable Technology Work/Life Balance Health Motion Sickness Vulnerabilities Tracking Digital Typing Consulting Entrepreneur Backups Project Management Backup Remote Monitoring and Management Customer Relationship Management Hacking Quick Tips Enterprise Resource Planning Outlook RMM Piracy Managed IT Domains Presentation Test Social Engineering IT solutions Identity Smart Tech Compliance Internet of Things Marketing Distributed Denial of Service Redundancy Break Fix Hotspot Cost Management Virtual Reality Hosted Solutions Telephone Systems Disaster Recovery Antivirus Business Management Networking Automation Saving Money Efficiency Emoji Cloud Notes Connectivity Information Technology Tech Terms Ransomware Server Training Data Management Hardware Co-managed IT Star Wars Hacks Robot Management Data Security Computer Disaster Resistance Virtual Desktop Superfish Social Running Cable Document Management HIPAA Mobile Device Management Processors How To Internet Facebook Identities Alerts Cryptocurrency BDR Server Management Bandwidth Word Cooperation Data IT Budget Webcam Technology Laws Printing Point of Sale Current Events communications Business Continuity Legal Fraud Data Backup Customer Service Unified Threat Management Computer Repair Apple Data storage Virtualization User Tips Assessment Mobile Device Managment Operations LiFi IBM Google Drive Asset Tracking Buisness Cookies Operating System Public Cloud Hackers Notifications Data Recovery Proactive IT Upgrades Paperless Office Twitter High-Speed Internet Machine Learning Business Computing Microsoft Excel Fun Mobile Computing Multi-Factor Security Managed Services Provider Humor Staff Software as a Service Staffing Network Management CCTV Mobile Office Favorites Access Control Authentication Instant Messaging Monitoring Tech Term Technology Tips Tech Support Backup and Disaster Recovery Hard Disk Drive Going Green Business Intelligence Gadgets Virtual Assistant Personal Information Smart Technology Features Heating/Cooling Screen Reader Mouse Remote Computing Uninterrupted Power Supply Hiring/Firing Bitcoin Finance Software Tips Shortcut Employee-Employer Relationship Cyber Monday Programming Politics Knowledge Flexibility Augmented Reality IT Support Save Time PowerPoint Software CIO VoIP Technology Websites Alert Mobile Device Monitors Workplace Tips Nanotechnology SharePoint Tablet Wi-Fi Financial Wireless Technology Google Docs Proactive File Sharing Big Data Hard Drive Office 365 Storage Intranet Firefox Consumers Web Server Writing Innovation Upgrade Cabling Environment Email Files IoT 3D Printing Fleet Tracking Cybersecurity Safety Mobile Data Development Administration Google Calendar Miscellaneous Scary Stories Microsoft

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...
QR-Code