Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Things That Go Bump in the Server Closet

b2ap3_thumbnail_spooky_technology_400.jpgHalloween is a time to conjure up things that give people the creeps. Scary sounds are just one way to send shivers up the spine. Sounds like, howling werewolves, zombie groans, chainsaws, and bloodcurdling screams are enough to make you want to run and hide. Yet, there’s one sound that’s the most terrifying of them all, and it’s coming from your server room!

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Identity Theft Computer Repair Paperless Office Patch Management Windows 8 Touchscreen Government Best Practice Enterprise Content Management Mobile Devices Downtime Hackers Public Cloud Net Neutrality Miscellaneous Lithium-ion Battery Google Calendar Ransomware Project Management Documents Point of Sale Cooperation Monitors PDF Managed IT services Technology Wires Chatbots Solid State Drive IT Technicians Computer Care Gmail Business Technology IT Consultant Tracking Domains Hacking Trending The Internet of Things Office 365 Comparison Competition Computing Cloud Computing Phishing Shortcut Error Bring Your Own Device Business Growth Backup and Disaster Recovery BYOD Web Server Storage Backups Website Spam Asset Tracking Address Fun Fleet Tracking Hard Disk Drive Cache Legal Cost Management Drones Wi-Fi Healthcare Training Computers Apps Passwords Distributed Denial of Service RMM Bandwidth Managed IT Services Office Social Engineering Botnet VoIP Administrator Budget Webcam Internet of Things Server Administration Holiday Time Management Undo Utility Computing Telephony Data loss Identities Mirgation Virtual Desktop Work/Life Balance Cameras Internet Exlporer Processors Firefox Consultation Data Recovery Scary Stories Twitter Managed Services Provider Users Software Tips Electronic Health Records Smart Technology Employer-Employee Relationship Software as a Service VoIP Customer Relationship Management SharePoint Proactive IT Vendor Management Save Money Buisness Black Market Features Content Filtering Smartphones Business Management Computing Infrastructure Motion Sickness Display Safety Marketing Gadgets Email Network Security Cleaning Consulting User Tips Unified Communications Internet Data Security Security Cameras Personal Information High-Speed Internet Infrastructure Websites Vulnerabilities Windows 10 BDR Typing LiFi Taxes Firewall Cortana Test Alerts Travel USB Social Networking Cookies Backup Google Wallet Hacker Phone System Unsupported Software Hard Drive Apple Best Practices Remote Monitoring Retail iPhone Tech Terms Hosted Solutions Mobile Security G Suite Employees Deep Learning Data Management Assessment Conferencing End of Support Running Cable Theft Application GPS Specifications Mobility Outlook Samsung Blockchain Managed Service Networking Office Tips Data Breach Alt Codes Search Chrome Data Warehousing Employee-Employer Relationship Analytics Quick Tips Remote Workers Black Friday Mobile Device Mobile Device Management Presentation Bluetooth Social Media Hardware Current Events Settings Business Owner Operating System Maintenance Regulations Break Fix Law Enforcement Mobile Office Saving Time Spyware Small Business Chromebook Techology Telephone Systems Document Management Innovation Disaster Network Management Communication Android Star Wars Read Only Data storage Hacks Fraud Business Computing Health Intranet Business Intelligence eWaste Bitcoin Tip of the Week Robot Bookmarks Software Cyberattacks Upgrades Printer Public Speaking Wearable Technology Managed IT Service Education Windows 10 IBM Files Avoiding Downtime Cloud YouTube IoT Mail Merge Information Technology Saving Money Password Money Zero-Day Threat Identity Instant Messaging Update Antivirus Wireless Technology Managing Stress Productivity Notifications Servers Development 3D Printing Risk Management Smart Tech Google Drive Private Cloud File Sharing Help Desk Technology Laws Favorites Piracy Server Management Word Artificial Intelligence Microsoft Office Physical Security Tech Support WannaCry Cybersecurity Superfish Permission Efficiency Unified Threat Management Tech Term Gadget Automation Financial Social Dark Web Workplace Tips Tablet VPN E-Commerce Laptop Licensing Cables Disaster Resistance Heating/Cooling Staffing Technology Tips Applications Migration IT Consulting Management Mobile Browser Hosted Solution Finance Microsoft Troubleshooting Remote Computing Humor Sports Halloween Sync Security Geography IT Budget PowerPoint Microsoft Excel Google Docs Consumers Business Malware Privacy Modem Monitoring WPA3 Big Data Recovery Managed IT Digital Payment Mouse Co-managed IT Politics Computer Disaster Recovery Smartphone Information Mobile Computing Analyitcs Wireless App Virus IT Services WiFi IP Address Network Router Cabling Motherboard Recycling Remote Worker Screen Reader Writing Virtualization User Error Managed Service Provider Automobile Knowledge Statistics How To Experience Uninterrupted Power Supply Connectivity Compliance Meetings ROI Augmented Reality Collaboration Outsourced IT OneNote communications Digital Virtual Reality Nanotechnology Emoji IT service Going Green Hiring/Firing Data Procurement IT Support Flexibility SaaS Staff Electronic Medical Records Language HIPAA Hotspot Redundancy Environment Customer Service Operations Google Virtual Private Network Corporate Profile CCTV Supercomputer Relocation Refrigeration Windows MSP Machine Learning Upgrade Encryption Company Culture IT Management Alert Remote Monitoring and Management Scam Hard Drives Authentication Save Time Business Continuity Printing Facebook Authorization Cybercrime 5G Google Maps Enterprise Resource Planning Entrepreneur Lenovo Cryptocurrency Permissions Cyber Monday Data Backup User Unified Threat Management IT solutions Programming Mobile Data Two-factor Authentication Human Error Dark Data Digital Signature Proactive Crowdsourcing Multi-Factor Security Vulnerability Downloads How To CIO Tip of the week History Productivity Network Congestion Legislation Access Control Mobile Device Managment IT Support

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...