Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why You Need to Be Careful when Discarding Technology

Why You Need to Be Careful when Discarding Technology

Nothing lasts forever - especially your business’ technology. However, you shouldn’t just get rid of your old technology willy-nilly. This is mostly for two reasons: one, many of the components in our technology are really bad for the environment; two, carelessly disposing of technology is a great way to put your data at risk. In order to protect your data, you need to make sure that your old equipment is properly disposed of.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Save Money Facebook Mobile Security Mobile Device Managment Machine Learning App Legal Assessment Remote Worker Virtual Reality Data Warehousing Public Cloud Big Data Apple Techology Experience Access Control Automation Computers Social Finance Legislation Computer Care Blockchain How To Tip of the week RMM Miscellaneous Writing Recovery Compliance Notifications Business Technology Augmented Reality Presentation Cameras Business Computing Business Continuity Read Only Bitcoin Spyware Managed IT Software Saving Time Data Backup Crowdsourcing Mouse Migration Law Enforcement Wires Cryptocurrency Licensing Work/Life Balance Language Troubleshooting Scam Budget Google Drive Twitter Digital Signature Cache Networking Comparison Healthcare Microsoft Excel Theft Financial Vulnerabilities Authorization Vendor Management Chromebook Managed Service Provider Utility Computing Google Docs Education Virtual Desktop Retail Humor Bring Your Own Device IT service Outlook Maintenance Bandwidth Taxes Staffing Co-managed IT Browser Technology Tips IP Address Development Router Mobile Office VoIP Black Friday Hotspot Modem User Error PowerPoint Uninterrupted Power Supply Best Practice Information Technology Hard Drive Computing Remote Workers OneNote High-Speed Internet Private Cloud Paperless Office Hosted Solution Cyberattacks Business Growth Microsoft Office HIPAA Enterprise Content Management Gadgets Management Quick Tips Business Management Outsourced IT Tip of the Week Update Safety Health Security Cameras Motherboard Meetings IT Consulting Lenovo User Tips Heating/Cooling Motion Sickness Supercomputer Artificial Intelligence Disaster Internet of Things Screen Reader IT Budget VoIP Android Break Fix Social Media 5G Documents Geography IoT Two-factor Authentication Fun Technology Document Management Cables Bluetooth Robot Efficiency Risk Management Human Error Digital IT Management Software as a Service Managed IT services Firewall CIO Identities Time Management Analytics Holiday Cloud Server Management Solid State Drive Business Marketing Disaster Recovery BDR Display Windows 10 Mobile Samsung Settings Money File Sharing Permissions MSP Environment Star Wars Internet Exlporer Avoiding Downtime Website Travel GPS Search Virtual Private Network Hardware Administrator Antivirus Employer-Employee Relationship Flexibility Intranet End of Support Knowledge Dark Web PDF Administration Error Deep Learning Email Telephone Systems Typing Google Maps Cortana Network Processors Smart Technology Hacks Cybercrime Wi-Fi Current Events Customer Service Google Calendar Consultation Google Lithium-ion Battery Chatbots Websites Social Engineering Webcam Unified Threat Management Specifications Data Management The Internet of Things Applications BYOD Backup G Suite Hosted Solutions How To Gadget Unified Communications Monitoring Mobile Devices History Printing Password SaaS Saving Money Mobile Computing Patch Management Company Culture eWaste Bookmarks Cyber Monday Buisness Hard Disk Drive Mobility Remote Computing Gmail Office 365 Alerts Virus Phone System Tech Terms Politics Mirgation Virtualization Procurement E-Commerce Wireless Drones Cost Management Application Consumers Government Tech Support Best Practices Cookies Conferencing IT Support Computing Infrastructure Programming Laptop ROI Hard Drives Hackers Instant Messaging Hacker Project Management Computer Firefox Vulnerability Business Intelligence Monitors Small Business Information Emoji Analyitcs Relocation Upgrades Managing Stress Cleaning Chrome IT Support Mail Merge Proactive Office Tips 3D Printing Competition Recycling Cooperation Statistics Mobile Data Dark Data Touchscreen Unified Threat Management Multi-Factor Security Downloads Piracy Internet Data Security Trending Mobile Device Privacy Zero-Day Threat Permission Smartphones Passwords Microsoft Training Content Filtering Test iPhone LiFi Refrigeration Automobile Superfish Authentication Electronic Medical Records Upgrade Security Cybersecurity Employees Cabling Wireless Technology Digital Payment Computer Repair Downtime Tracking IT Consultant Sports VPN Identity Theft Windows 8 Sync Physical Security Operating System Fleet Tracking Distributed Denial of Service Files Cloud Computing Tablet Users Domains Unsupported Software Web Server Favorites Features Enterprise Resource Planning Storage Hacking Google Wallet Managed IT Service Office Nanotechnology SharePoint IT Technicians Redundancy CCTV communications Wearable Technology Managed Services Provider Network Congestion Workplace Tips Electronic Health Records Social Networking Alt Codes Shortcut USB Going Green Employee-Employer Relationship Remote Monitoring and Management Asset Tracking Identity Hiring/Firing Phishing User Operations Alert Collaboration Business Owner Spam Encryption Server Public Speaking WiFi Smartphone Net Neutrality Disaster Resistance Consulting IBM Printer IT Services Save Time IT solutions Halloween Botnet Infrastructure WannaCry Telephony Point of Sale Smart Tech Remote Monitoring Entrepreneur Servers Innovation Proactive IT Help Desk Technology Laws Ransomware Scary Stories Regulations Address Data Breach Malware Backups Word Windows Software Tips Customer Relationship Management Personal Information Tech Term Data storage Data Windows 10 Staff Productivity Network Management Undo Communication Corporate Profile WPA3 Managed Service Network Security Fraud Mobile Device Management Managed IT Services Connectivity Data loss YouTube Apps Productivity Running Cable Data Recovery Backup and Disaster Recovery Black Market

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...