Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Give Your Server Units Some TLC

Give Your Server Units Some TLC

Servers are a critical part of any business or organization’s IT infrastructure, as they are the backbone of data distribution. This could include access to applications such as your productivity suite, or even the storage of vital data that’s necessary for day-to-day operations. Unfortunately, this critical hardware must be continuously maintained. The question becomes: Is your business responsible for keeping your server infrastructure in proper working order?

Continue reading

Be the Life of the Party: Server Hosting

b2ap3_thumbnail_server_host_400.jpgWhen it comes to hosting a party, it can be exhausting – it's a matter of space, cost, and responsibility, among other things. If you're too busy trying to organize everything, nobody will get to see the best side of you. Wouldn't it be so much easier to just hire someone to take care of the details? You would actually be able to enjoy your party!

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Microsoft Office Instant Messaging Best Practices Touchscreen Smartphone Multi-Factor Security Wi-Fi Statistics Websites Typing Domains Productivity Cybersecurity Intranet WPA3 Tech Terms Hard Drives Cortana Automation Hackers Migration Telephone Systems How To Innovation Smart Technology Server Management Point of Sale User Technology Digital Payment Alert Internet Exlporer Proactive Social Engineering Chrome Miscellaneous Botnet Staff Computing Permissions Legislation Scary Stories Bookmarks Antivirus BYOD Notifications Gmail LiFi Managed IT Services Bandwidth 5G Distributed Denial of Service Company Culture Search End of Support Public Speaking Business Growth Smartphones Tip of the week Network Motion Sickness Vulnerability Cameras Presentation Microsoft Uninterrupted Power Supply Tablet Technology Laws Administration Professional Services Humor Virtual Desktop Software Downloads Gadgets Vulnerabilities Encryption Time Management Remote Monitoring and Management CIO Piracy Vendor Management Office Screen Reader Best Practice Finance Save Time Application History Settings Save Money Risk Management Legal Staffing Two-factor Authentication Disaster Recovery PDF Tech Support Hacker Big Data Administrator Website Alt Codes Break Fix Solid State Drive Hard Drive Scam Managed IT Hacking Buisness Deep Learning Wearable Technology Information Robot Hosted Solution Quick Tips Halloween Development RMM Telephony Downtime Employee-Employer Relationship Programming Cooperation Test Current Events Managed Service Provider OneNote Business Computing Upgrades Work/Life Balance Net Neutrality IBM Project Management Public Cloud Samsung Tracking Physical Security Enterprise Resource Planning GPS Zero-Day Threat Chromebook Address CCTV Remote Workers Voice over Internet Protocol Black Friday Authentication File Sharing Human Error Black Market Monitors Geography Data Crowdsourcing Trending Managed Service Mail Merge Apple Word E-Commerce Malware Proactive IT VPN Monitoring Regulations Hiring/Firing Operating System Ransomware Data Management Windows Wires Unified Threat Management Cache Android Relocation Communication Computer Care Cyber Monday Cloud Identities Electronic Medical Records Flexibility Bitcoin Personal Information Mobile Office Data Backup Hosted Solutions Redundancy Files Lenovo IT Technicians Conferencing Applications Unified Communications Productivity Knowledge Wireless Phishing Error Computers Phone System Customer Relationship Management Money Software as a Service Google Drive Analyitcs Google Hard Disk Drive Network Security Network Management Managed IT services Procurement Windows 10 Education Star Wars Efficiency Mouse Data Warehousing Customer Service Firefox Business Technology Backup and Disaster Recovery Database Mobile Device Managment Techology Machine Learning Collaboration PowerPoint Social Media Privacy Backup Utility Computing Workplace Tips Asset Tracking Read Only Unified Threat Management Going Green Unsupported Software Cabling Printer Windows 8 Outlook IT Management User Error Drones Recycling Router Licensing IT Support Spyware Cryptocurrency Specifications IT Services Content Filtering Undo SaaS Electronic Health Records Cookies Processors Supercomputer Management Cost Management Compliance Meetings Budget Information Technology MSP Social Networking Analytics Virtual Assistant Storage Favorites IT Support Mobile Device Management Password Running Cable Mobile Device Bluetooth Mobile Computing Business Continuity Permission IP Address Consultation How To Mobility Office 365 Update Virtual Reality Remote Computing Network Congestion Data Security Environment Data storage Hacks 3D Printing Cleaning Emoji Mobile Managed IT Service USB Email Chatbots Office Tips IT Consulting Windows 7 Access Control Google Wallet Saving Money Augmented Reality Wireless Technology Automobile Data loss Connectivity Corporate Profile Twitter Browser Business Intelligence Holiday Dark Data Small Business Bring Your Own Device Authorization VoIP Server Patch Management IT Budget Troubleshooting Experience Facebook Law Enforcement Windows 10 Retail Security Cameras HIPAA communications Business Owner Mobile Devices Fun Cyberattacks Writing Remote Monitoring Lithium-ion Battery Technology Tips Security Recovery Notes Language Remote Worker Mirgation Spam Shortcut Entrepreneur Outsourced IT Hardware Maintenance Artificial Intelligence G Suite Mobile Data Virtualization Google Docs Virus ROI Business Management Business Financial Smart Tech Managed Services Provider Modem Software Tips Cloud Computing Apps App Disaster Resistance Cybercrime Motherboard Help Desk Co-managed IT Sync Assessment Data Breach Paperless Office Refrigeration Competition Consumers Avoiding Downtime Upgrade Tip of the Week iPhone Digital Signature Taxes Identity Mobile Security Enterprise Content Management Comparison Internet Travel Dark Web Digital Documents Servers Managing Stress Webcam Infrastructure Microsoft Excel Theft Fraud Operations Consulting Wasting Time Employees VoIP Healthcare Cables Marketing Alerts Google Maps IT Consultant Printing Government Internet of Things IoT Computing Infrastructure eWaste Social IT solutions Employer-Employee Relationship Features Google Calendar Display Hotspot Gadget Passwords Networking Disaster Backups Computer Data Recovery Firewall Computer Repair Safety Fleet Tracking WannaCry Identity Theft Document Management User Tips Sports WiFi BDR Superfish Laptop Virtual Private Network Training Heating/Cooling Health Private Cloud Users IT service High-Speed Internet YouTube Web Server Tech Term Nanotechnology The Internet of Things SharePoint Blockchain Saving Time Politics

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...