Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Managing Your Software Requires Three Actions

Managing Your Software Requires Three Actions

It’s imperative that your organization’s software is managed properly. If you can’t do this, then your operations can suffer in the long run. While this might sound like a lot of work, software management isn’t as difficult as it sounds if you break it down into compartmentalized tasks. Ultimately, you can group it into three major steps: leveraging available assets, testing strategies, and understanding the software.

Continue reading

Your Search Bar Is Now More Secure

Your Search Bar Is Now More Secure

August saw yet another Patch Tuesday designed to resolve security issues in Microsoft products. Out of the 48 vulnerabilities resolved, 15 affected Windows, while 25 were rated as critical, 21 as important, and 27 that allowed for remote code execution. This might sound a little overwhelming, so we’ll try to simplify it a bit--a lot of flaws were fixed, and the majority of them can be considered dangerous for your organization.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Social Networking Avoiding Downtime Physical Security Fleet Tracking Recovery Apple Display Best Practices Public Speaking Language OneNote Wires Disaster Recovery Smart Technology Writing Going Green Undo Analytics Vulnerabilities Travel Virtual Desktop Authorization Identities Tablet Taxes Applications Computing Budget Data Breach CCTV Knowledge Theft Marketing Government Customer Relationship Management Network Congestion Word Websites Meetings Alt Codes USB Remote Monitoring and Management Private Cloud Virtual Reality IT Management Running Cable Cybercrime Robot Favorites Save Money Mobile Device Management Environment Cybersecurity Hard Disk Drive Consumers Gadget Phishing Cloud Computing Administration Monitoring Heating/Cooling Intranet Competition How To Remote Workers Email G Suite Chromebook Tech Term Human Error The Internet of Things BDR Google Calendar Business Intelligence Deep Learning Hotspot Application Antivirus Windows 10 Financial Comparison Dark Data File Sharing Office 365 IT Support Wi-Fi Refrigeration Digital Retail Current Events Emoji Health Net Neutrality PowerPoint Machine Learning Utility Computing App Google Docs Flexibility Webcam Permissions Software Vendor Management Shortcut Productivity Data Security Lenovo Automobile Upgrades Google Holiday Virtualization Blockchain Mobile Device Managment Server Management Browser 5G Notifications PDF Security Business Owner Legislation Technology Laws Business Management Managed IT Services Analyitcs User Tips Compliance Mobile Office Website Password Experience Printer Supercomputer Asset Tracking Public Cloud Fun Migration Wireless Technology Computer Care ROI Alerts Finance Staff Consulting Scam Enterprise Resource Planning Downtime E-Commerce Processors VoIP History Mobile Device Efficiency Managed IT services Mobile Data Server Regulations WiFi Bluetooth Update IT service Procurement Typing Google Drive Hackers Cyberattacks Money IT Budget Cost Management Redundancy Co-managed IT Bitcoin Wearable Technology Employer-Employee Relationship Computers Crowdsourcing Superfish Botnet Cache Office Identity Black Market Microsoft Office Bookmarks Break Fix Healthcare Operating System Cleaning Help Desk Users Bandwidth Education Social Engineering IP Address Software Tips Telephony Employees Drones Point of Sale Spam Firefox IT Technicians Microsoft Test Conferencing Windows 8 Technology Tips Managed IT Service Scary Stories Malware Disaster Resistance Social Media Project Management MSP Risk Management Smartphone Laptop Samsung GPS Productivity IT solutions Two-factor Authentication Content Filtering IT Services Big Data Specifications SharePoint Apps Chrome Proactive Passwords Law Enforcement Web Server Internet Data Warehousing Domains communications Geography Save Time Unified Threat Management Remote Computing Employee-Employer Relationship Hard Drives Buisness Vulnerability Google Wallet Staffing User Error Hardware Information Technology Storage Work/Life Balance Software as a Service Saving Money Data loss Company Culture VPN Trending Mirgation Access Control Managed Service Consultation Cloud Augmented Reality Maintenance Document Management Screen Reader Personal Information Network Management Cyber Monday Politics Phone System Managed Services Provider Development Chatbots Search Microsoft Excel Motherboard Computing Infrastructure Data storage Features Wireless Enterprise Content Management Network Cortana Cookies WPA3 Solid State Drive Innovation Managing Stress Hiring/Firing End of Support HIPAA Hacks Cooperation Unsupported Software Infrastructure Statistics Permission Remote Worker Hosted Solution Recycling Mouse Office Tips Operations Address Quick Tips Proactive IT Entrepreneur Safety Files Administrator Twitter Connectivity Gmail IoT Sports Backup Tech Terms VoIP Windows Business Continuity Business Technology Small Business Ransomware Managed IT Star Wars Best Practice Automation Error Customer Service iPhone Managed Service Provider Computer Repair Electronic Health Records Hacking BYOD Security Cameras Settings IT Support WannaCry Servers Smart Tech Relocation Miscellaneous Paperless Office Patch Management Outlook Nanotechnology Google Maps LiFi Privacy Technology Authentication Workplace Tips Mobile Security Read Only Internet of Things Saving Time Hacker Networking Cameras Smartphones Programming Motion Sickness Business Computing Digital Signature Remote Monitoring High-Speed Internet Techology Hosted Solutions Tip of the Week Business Growth Cryptocurrency Presentation Backup and Disaster Recovery Tech Support Uninterrupted Power Supply Zero-Day Threat Cables Computer Mobile Devices Corporate Profile IT Consultant Hard Drive Mail Merge Social User Alert Communication IT Consulting Mobile Computing Collaboration Upgrade 3D Printing Distributed Denial of Service Facebook Gadgets Android Downloads Legal Firewall Humor YouTube Monitors RMM Data Information Licensing Black Friday Cabling Mobility Piracy Business Network Security Artificial Intelligence Unified Threat Management Spyware Training Data Backup Dark Web Outsourced IT Assessment SaaS Halloween Management CIO Sync Router Mobile Windows 10 Touchscreen Fraud Troubleshooting Disaster Data Management Virtual Private Network Unified Communications Internet Exlporer Multi-Factor Security How To Tracking IBM Bring Your Own Device Printing Documents Time Management Identity Theft Lithium-ion Battery Telephone Systems Electronic Medical Records Modem Data Recovery Backups Virus eWaste Tip of the week Instant Messaging Encryption Digital Payment

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...