Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Properly Store a Hard Drive

b2ap3_thumbnail_frozen_hard_drive_400.jpgWhat’s the best way to preserve your important files for years to come? Questions like this are being asked more frequently in our data-driven society. Here are some best practices when it comes to long-term data storage.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Education Browser Identity Infrastructure Internet of Things Maintenance Artificial Intelligence Application Alerts Features Augmented Reality Software as a Service Bring Your Own Device Smart Technology WannaCry Patch Management Finance Motherboard iPhone Mobility Antivirus Computer Remote Workers Piracy Professional Services Cortana Internet Exlporer Address Laptop Fun Permission Distributed Denial of Service Cookies Android GPS Retail Google Maps Law Enforcement Refrigeration Security Cameras Consumers RMM Internet Downtime Workplace Tips Travel Star Wars Hiring/Firing Hacks Hackers Information History Deep Learning Big Data Saving Time Computing Infrastructure Consulting Shortcut Document Management Heating/Cooling Administration Analytics Hard Disk Drive User Error Electronic Health Records Technology Tips Social Media eWaste Compliance BYOD Error Connectivity Cryptocurrency Budget Upgrades Public Cloud Solid State Drive Training Windows 10 Personal Information Analyitcs How To Telephony Managed IT Services Taxes Automation Current Events Bandwidth Scam Passwords Employer-Employee Relationship Marketing Windows Statistics WiFi Unified Threat Management Favorites Break Fix Tech Term Data Security Robot Password Outlook Avoiding Downtime Human Error Mobile Documents Halloween Two-factor Authentication Hard Drives Cabling Access Control Windows 7 Wearable Technology Network Management Web Server Windows 10 Miscellaneous Remote Monitoring Virtualization Ransomware Going Green Lithium-ion Battery Business Intelligence SharePoint Identities Cost Management Hosted Solutions Authorization Encryption Update IT Support ROI Programming Software Technology Laws Modem Hardware Trending Enterprise Resource Planning Office 365 Scary Stories Cleaning OneNote Applications Managing Stress Mirgation Bluetooth Uninterrupted Power Supply Outsourced IT Troubleshooting VoIP HIPAA Legal Social Black Friday Bitcoin Operations Information Technology Vulnerability Social Engineering Privacy Unsupported Software Customer Service Computing Hacker Recovery CIO 3D Printing Touchscreen Google Data Backup The Internet of Things Hard Drive Google Wallet IT solutions Employees Government Data Security Migration Electronic Medical Records App Cooperation Lenovo Save Money Gadgets Paperless Office Google Docs Licensing Politics Public Speaking CCTV WPA3 IT Services Specifications Holiday Mobile Office Business Owner Smart Tech Saving Money Writing Virtual Assistant Virtual Reality Content Filtering Cybercrime VPN Relocation Google Calendar Asset Tracking Hacking Financial MSP Business Computing Data Warehousing Save Time File Sharing Printing Wireless Technology Corporate Profile IT Consultant Storage Microsoft Office Cameras Procurement Chrome Work/Life Balance Black Market Unified Threat Management Help Desk Digital Payment Alert Router Firefox Backup and Disaster Recovery Proactive IT Employee-Employer Relationship Crowdsourcing Search Cloud Mobile Device Management Apple Managed Service Knowledge Customer Relationship Management Botnet Software Tips Utility Computing Permissions Machine Learning Staff Spam Management Settings Remote Worker Mobile Devices Gmail Productivity End of Support 5G Business Backup Managed IT Nanotechnology Cloud Computing Small Business Network Security Tech Terms Mobile Security Vendor Management Healthcare Twitter Phishing Time Management Innovation Display Hotspot Cables Data Recovery Enterprise Content Management Data Breach Wireless Phone System Samsung Tech Support Digital IP Address Meetings Experience IBM IT service Risk Management Typing Techology Sports PowerPoint Consultation Flexibility Computer Repair Efficiency Technology Downloads Development Network Humor Wasting Time Test Wi-Fi Monitors Multi-Factor Security USB IT Budget Best Practices Mobile Computing Health Automobile Running Cable Vulnerabilities Mobile Device High-Speed Internet Disaster Resistance Cybersecurity Computer Care Operating System IoT Undo SaaS Facebook Entrepreneur Firewall Drones Motion Sickness Data Management VoIP Business Management Business Technology Servers Office Blockchain Chatbots Redundancy Safety Project Management Hosted Solution LiFi Collaboration IT Management Digital Signature Regulations Mobile Device Managment Smartphone Identity Theft Best Practice YouTube Staffing Read Only Malware IT Support Microsoft Excel Alt Codes Communication Notes Server Management Emoji Authentication Cyber Monday Monitoring Dark Data Data loss Fraud BDR Computers Intranet Remote Computing Voice over Internet Protocol Buisness Google Drive Office Tips Assessment Printer Company Culture Money Cyberattacks Networking Gadget Disaster Superfish IT Consulting Managed IT services Files Apps Website Instant Messaging Legislation Proactive Point of Sale Chromebook Tip of the Week Mouse Managed Service Provider Email Microsoft Unified Communications Sync Competition Zero-Day Threat communications Recycling Wires Quick Tips Productivity Bookmarks User Server Upgrade Network Congestion How To Tip of the week Managed Services Provider Webcam G Suite Social Networking Private Cloud Word Data storage Spyware Windows 8 Presentation Environment Virtual Private Network Physical Security User Tips Virtual Desktop Cache Comparison Conferencing Language Managed IT Service Domains Disaster Recovery PDF Fleet Tracking Websites Dark Web Remote Monitoring and Management Tracking Database IT Technicians Processors Virus Tablet Business Growth Smartphones Co-managed IT Telephone Systems Mobile Data Geography Users Screen Reader Backups Business Continuity E-Commerce Net Neutrality Theft Notifications Administrator Supercomputer Mail Merge

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...