Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why You Need to Be Careful when Discarding Technology

Why You Need to Be Careful when Discarding Technology

Nothing lasts forever - especially your business’ technology. However, you shouldn’t just get rid of your old technology willy-nilly. This is mostly for two reasons: one, many of the components in our technology are really bad for the environment; two, carelessly disposing of technology is a great way to put your data at risk. In order to protect your data, you need to make sure that your old equipment is properly disposed of.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Lithium-ion Battery Web Server Geography Telephone Systems Alerts Government Redundancy Connectivity Apps USB Wireless Remote Workers Analytics Small Business Save Money Voice over Internet Protocol Privacy Twitter Maintenance Managed Service Provider Administrator Knowledge Google Drive Recycling Windows Windows 10 GPS Tech Terms Professional Services Data Management Network Sports Supercomputer IT solutions Scary Stories Business Black Friday Microsoft Office Cyberattacks Downtime Lenovo Data storage Blockchain Wireless Technology User Printer Passwords SaaS Monitoring Router Best Practices Website IT Support Internet Bluetooth G Suite Competition Information Technology CCTV Machine Learning Address Physical Security Internet of Things Hacking High-Speed Internet Safety Techology Gadgets Monitors Cabling Flexibility Holiday Business Computing Software as a Service Mobile Device Notifications Mobile Device Management Employee-Employer Relationship Spyware Dark Data Google Docs Statistics IT Consulting Bring Your Own Device Company Culture Comparison Communication Phone System Cloud Computing Infrastructure Fleet Tracking Black Market Google IoT Printing RMM Microsoft Excel IT Technicians Automobile Crowdsourcing Finance Big Data Mouse Virtualization Websites Windows 10 Virus Managed IT Mobile Smartphones Virtual Assistant Hosted Solutions IT service Upgrade Computer Care Health Cameras Hackers Consumers Theft Dark Web Solid State Drive How To Database User Error Motherboard Technology Tips Tip of the Week Unsupported Software IBM Save Time Environment Cloud Computing Recovery Virtual Reality Troubleshooting IT Management Security Cameras Authentication Computer Proactive WiFi Refrigeration Hacker IT Services Firefox Cooperation Backup and Disaster Recovery E-Commerce Business Growth Vendor Management IP Address Word Cybersecurity Managed IT services Hard Drive Storage Bitcoin Star Wars Downloads Malware Gadget End of Support Gmail Software Taxes Social Media Servers Licensing Data loss Work/Life Balance Financial Best Practice File Sharing Cables Application Password Managing Stress Vulnerability Multi-Factor Security Cyber Monday Corporate Profile Public Cloud BDR Security Mirgation Remote Computing Server Management Samsung Screen Reader Cost Management Personal Information Consulting Alert Browser Language Humor Administration LiFi Spam Firewall Error Hotspot Chatbots Server Marketing Tech Term Time Management Data Warehousing Experience Regulations Display Business Intelligence Access Control Virtual Desktop Trending Uninterrupted Power Supply Permission Virtual Private Network Content Filtering Information Superfish Mobile Data Emoji Phishing Upgrades User Tips Features Hacks Alt Codes MSP Legal SharePoint Customer Service Document Management Education Management Permissions Business Owner Cleaning Point of Sale Chromebook Test Undo Private Cloud Augmented Reality IT Budget Help Desk Google Maps Business Continuity VoIP Laptop VPN 3D Printing Intranet Applications Network Security Cache Business Technology Managed IT Service Internet Exlporer HIPAA Operating System Miscellaneous Money Documents Going Green Quick Tips Deep Learning Hard Disk Drive Meetings Presentation Unified Threat Management Network Congestion Mobile Device Managment Productivity Outsourced IT Electronic Health Records Computers Assessment Hard Drives Motion Sickness Drones Ransomware Business Management Entrepreneur Search Consultation Break Fix Shortcut Zero-Day Threat Project Management Paperless Office Update Network Management Fraud Processors Nanotechnology Digital Payment Modem Email Distributed Denial of Service Development Networking Disaster Resistance Android Piracy Collaboration Asset Tracking Buisness Mobile Security Data Breach Wasting Time Saving Money VoIP Managed IT Services Data Recovery Travel Windows 7 Chrome Mobility Tech Support Remote Worker Risk Management Software Tips Facebook Efficiency WPA3 Wearable Technology Identity Current Events Data Robot Legislation Sync Instant Messaging IT Support Productivity Unified Communications Enterprise Resource Planning Cookies 5G Hardware Running Cable Social Engineering Settings Digital Halloween Smartphone Bookmarks Net Neutrality Antivirus Enterprise Content Management Patch Management Employer-Employee Relationship Cryptocurrency Backups Office 365 Cortana Training Specifications CIO Remote Monitoring and Management Google Wallet Botnet Budget Smart Tech Co-managed IT Office Data Backup Politics Apple How To Smart Technology eWaste Compliance Avoiding Downtime Disaster Recovery Automation History PowerPoint Mobile Office Mobile Computing Managed Services Provider OneNote Proactive IT WannaCry Cybercrime Staffing Operations YouTube Hiring/Firing Windows 8 Outlook Digital Signature PDF BYOD Mail Merge The Internet of Things Social Networking Human Error Typing Migration Public Speaking iPhone Staff Technology Technology Laws Heating/Cooling Scam Programming Computing Vulnerabilities communications Infrastructure Relocation Office Tips Artificial Intelligence Wires Backup Utility Computing Social Computer Repair Law Enforcement App Workplace Tips Notes Healthcare Remote Monitoring IT Consultant Writing Telephony Fun Tablet Domains Users Conferencing Webcam Customer Relationship Management Two-factor Authentication Innovation Hosted Solution Mobile Devices Procurement Saving Time Encryption Identity Theft Bandwidth Microsoft Disaster Tip of the week Touchscreen Wi-Fi Identities Favorites Google Calendar Authorization Retail Files Electronic Medical Records Tracking Employees ROI Managed Service Read Only Data Security Unified Threat Management Analyitcs

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...