Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Powerful Physical Security Options

Powerful Physical Security Options

Data security isn’t the easiest thing in the world to plan for, especially if your organization doesn’t have any dedicated security professionals on-hand. While protecting your data with traditional methods, like passwords, firewalls, and antivirus, is important, what measures are you taking to make sure a thief or hacker isn’t just walking into your office and making off with your technology?

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Domains Computer WPA3 Instant Messaging Spam Knowledge Redundancy Collaboration Two-factor Authentication Servers Mouse Entrepreneur Operating System Operations Virtual Private Network Best Practice Network Running Cable Digital Social Engineering Test Retail Firefox Dark Web SharePoint IT Services Cookies Mobile Device Management Time Management IP Address Printer User Error Cache Disaster Black Friday App Public Speaking Compliance Files Competition Fleet Tracking Miscellaneous Unsupported Software Analyitcs Education Administration Healthcare Chromebook Word Help Desk Google Calendar Display Gadget IoT Regulations iPhone Scary Stories Processors Employer-Employee Relationship Hiring/Firing Saving Money Bandwidth Cost Management Virtual Reality Current Events Tip of the Week Technology Laws Geography Experience Unified Threat Management Documents Access Control Google Wallet Refrigeration Zero-Day Threat WiFi Project Management Wireless Customer Service Machine Learning Staff Black Market Gmail Network Security Productivity Money VoIP Twitter Privacy Customer Relationship Management Finance MSP Physical Security Vulnerability Chrome Webcam Technology Laptop Antivirus Hacking communications Drones Firewall Telephony Connectivity Content Filtering Social BDR Development Outsourced IT Office Public Cloud Cortana Storage Mobile Device Data Management Mobile Security Wearable Technology Mobility Managed IT services Statistics Notifications Data Warehousing Productivity Remote Computing Emoji Screen Reader Consumers Lenovo Google Drive Remote Worker Undo Proactive Mobile Data Data loss Software Tips Migration IT Management Managed IT Service Botnet Solid State Drive Flexibility Browser Computers USB Hardware Remote Monitoring and Management Hard Drive Error Authorization Software as a Service Quick Tips Typing Point of Sale Hard Drives Motion Sickness Cooperation Touchscreen Mirgation Intranet Vendor Management Best Practices Software SaaS Data Recovery Network Management Hard Disk Drive Legal Smart Tech Utility Computing Document Management Backups IBM Ransomware Crowdsourcing Information Application Upgrades IT Consultant Fraud Backup End of Support Network Congestion Disaster Resistance E-Commerce Internet of Things Holiday Business Owner IT Technicians Business Intelligence Server Management eWaste Modem Cyberattacks Favorites Tip of the week Phone System Samsung Environment Troubleshooting Writing Office Tips Wires Hosted Solutions Server Virtualization Company Culture Health IT Consulting Maintenance Windows Robot Innovation File Sharing Permission Programming Cleaning Business Computing IT Support Alt Codes Cryptocurrency Office 365 Lithium-ion Battery Gadgets Break Fix Humor Taxes Licensing Cybercrime Web Server Safety Social Media Enterprise Resource Planning CIO Internet Cybersecurity Mobile Devices Android IT solutions Bitcoin Mobile Device Managment Marketing Business Management Business Technology Address Managed IT Services Management Data Security Avoiding Downtime Enterprise Content Management Bring Your Own Device Apps Superfish 5G Risk Management ROI Mobile Artificial Intelligence Networking Outlook Tech Term Work/Life Balance Efficiency Smart Technology Personal Information Employees Cyber Monday Deep Learning Managed Services Provider Tablet Training Identity Internet Exlporer Nanotechnology History Small Business Features Distributed Denial of Service IT service User Tips Managed Service Provider Infrastructure Hackers Encryption Net Neutrality Data Backup Computer Care Private Cloud Spyware Smartphones Technology Tips Mobile Computing Applications Identities IT Support Electronic Medical Records Hosted Solution Tracking Security Cameras Human Error Buisness Mail Merge Google YouTube Managed IT Users Search PDF OneNote Hacks Business Continuity PowerPoint Sports Administrator The Internet of Things Communication Consulting Read Only BYOD Remote Workers Virus Chatbots Fun Co-managed IT Data Breach Remote Monitoring Update Meetings Social Networking Shortcut Router Telephone Systems Facebook Hacker Cabling Patch Management Assessment RMM IT Budget Microsoft Office Supercomputer Paperless Office Computing Specifications Halloween Augmented Reality Unified Threat Management Cloud Computing Dark Data Google Maps Websites GPS Bookmarks Workplace Tips Consultation Microsoft Analytics Legislation Star Wars Settings Password Data Automobile Hotspot Monitors Malware Passwords Identity Theft User Wireless Technology Trending Save Time Windows 10 Comparison Electronic Health Records Monitoring Multi-Factor Security Cameras Uninterrupted Power Supply Conferencing Windows 8 Heating/Cooling Blockchain Alert Mobile Office Corporate Profile Motherboard CCTV Backup and Disaster Recovery Wi-Fi Procurement Microsoft Excel Digital Signature Virtual Desktop How To Recovery Budget High-Speed Internet Managing Stress Smartphone Business Financial Theft LiFi Windows 10 Vulnerabilities Big Data Security Upgrade Email Data storage Presentation Permissions Cables How To Downloads Scam HIPAA Piracy Managed Service Techology Politics VPN VoIP Save Money Unified Communications Information Technology Automation Law Enforcement Employee-Employer Relationship Going Green Digital Payment Google Docs Relocation Government Disaster Recovery Authentication Phishing Saving Time Sync Tech Support Apple Language Asset Tracking Tech Terms Alerts Proactive IT Staffing Bluetooth G Suite Cloud Computer Repair Business Growth Computing Infrastructure Recycling 3D Printing Travel Printing WannaCry Downtime Website

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...