Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Change Your Mouse Pointer in Windows 10

b2ap3_thumbnail_mouse_pointers_400.jpgThe mouse is a critical part of navigating your workstation. Without it, you’d struggle to open applications, move around Office documents, create images, and countless other functions. Just like many other features in Windows 10, you can customize how your mouse pointer looks and functions, making it much easier to maneuver around your system.

Continue reading

Tip of the Week: View Your Current Google Sessions for Optimal Security

b2ap3_thumbnail_google_sessions_400.jpgLogging into an account only to find out that you’ve been hacked can be a real hassle. If you’re wondering why and how this could have happened, you’re in luck; some accounts, like Google, record when and how the account is accessed, and finding out how is as easy as checking out your security settings. Here’s how you can see who is accessing your account, and how.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Chatbots Sync Public Cloud Malware Technology Laws Mirgation Mobile Devices Notes Electronic Health Records Break Fix Wearable Technology Knowledge App Automation Troubleshooting Operating System Encryption Private Cloud Fraud Buisness Wires Google Docs Environment Backup Tip of the week Vulnerability Recycling Data storage Virtual Reality Travel Utility Computing Spyware Financial Facebook Tablet Windows Business Management Website Network Security Techology Wireless Technology YouTube Unified Threat Management Proactive Human Error Office Tips Cortana Password Deep Learning CIO Geography Undo Language Social Networking Black Friday Entrepreneur Hiring/Firing Motion Sickness Telephony Customer Service Bring Your Own Device eWaste Avoiding Downtime Refrigeration Corporate Profile Productivity Outsourced IT Printer Permissions Marketing Flexibility Files Safety Windows 10 Mobile Device Notifications Employees Managed Services Provider Money Authorization Unified Threat Management Hackers Connectivity Fleet Tracking BYOD Remote Worker Finance Superfish Consultation Technology communications Monitoring PDF Mouse IT Management Taxes Recovery Hotspot Software Machine Learning Miscellaneous Word Specifications Operations Cloud Enterprise Resource Planning Solid State Drive Regulations Internet Google Maps History WiFi Printing Authentication Disaster Resistance Trending Upgrades Infrastructure Unsupported Software Software as a Service Mobile Statistics Collaboration Favorites Microsoft Office 5G Bluetooth Processors Remote Monitoring Hard Drives Legislation How To Co-managed IT Network Management BDR Professional Services Features Cleaning Hardware Staffing Telephone Systems Sports Digital Signature Lenovo IT Budget Small Business Star Wars Websites Business Computing Presentation Company Culture Gmail Laptop Business Continuity Test Current Events Social Computer Repair Mobile Device Managment Windows 8 Database Passwords Cybersecurity Shortcut Virtual Assistant Applications Save Time Modem Fun HIPAA Saving Time Holiday Licensing Data Backup Conferencing Disaster Botnet Search Heating/Cooling Permission Backup and Disaster Recovery Digital G Suite Tracking Identity Administration Network Error Consulting Black Market Data Breach Patch Management Identities Project Management Consumers IT solutions Staff WPA3 SharePoint Automobile Samsung Business Growth Browser Zero-Day Threat Scary Stories IBM Emoji Cybercrime Asset Tracking Dark Web Unified Communications Networking Typing Information Managed IT services Touchscreen Social Media Google Calendar VoIP Customer Relationship Management Productivity Security Cameras Update Remote Computing Uninterrupted Power Supply Application Digital Payment Halloween Meetings Servers IT Consulting Monitors Data Security Government Apps Hard Drive Vulnerabilities Employee-Employer Relationship Remote Workers Blockchain Google Drive Data Recovery Mobile Security IT Consultant Healthcare Downloads Spam Dark Data Internet Exlporer Screen Reader Innovation Enterprise Content Management Chromebook SaaS Budget High-Speed Internet Assessment Data loss Cameras Law Enforcement Procurement Users Workplace Tips Running Cable Wireless Data Management Upgrade Document Management Windows 10 Comparison Relocation Data GPS Piracy Compliance Phone System Gadgets Business Intelligence Storage Internet of Things Work/Life Balance Apple Disaster Recovery Vendor Management Cooperation Mobility Hacker Voice over Internet Protocol Office 365 Display RMM Twitter Bandwidth Redundancy Training Business Crowdsourcing Outlook Humor 3D Printing Efficiency Documents Network Congestion Legal WannaCry Router Time Management E-Commerce Personal Information Cryptocurrency Computer Experience Analyitcs Saving Money Management Data Warehousing Programming Virtualization Tech Terms Downtime Hacks Computing Big Data Robot Windows 7 IT Support Education Mail Merge Mobile Office Nanotechnology Address Managed IT Services File Sharing Smartphone End of Support Cables Alert Hosted Solutions Security MSP VoIP Motherboard Identity Theft Managed Service Provider CCTV Maintenance Business Owner Web Server Scam Development Artificial Intelligence PowerPoint Supercomputer Mobile Computing IT Technicians Analytics IoT Point of Sale Google Server Cabling Cyberattacks Politics Webcam iPhone How To Hard Disk Drive Net Neutrality Competition Save Money ROI Computers Employer-Employee Relationship Firewall Tech Support Wasting Time Android Managed Service Intranet Cache Technology Tips Distributed Denial of Service Physical Security Hosted Solution Virtual Desktop Antivirus Phishing Smart Technology Information Technology User Error Server Management Two-factor Authentication User Managing Stress Augmented Reality Business Technology Cloud Computing Instant Messaging Settings Office Backups Software Tips Communication Theft Tech Term Google Wallet Electronic Medical Records Wi-Fi Microsoft Excel Drones Retail Health LiFi Risk Management Smartphones Computing Infrastructure Smart Tech Computer Care Migration Ransomware Microsoft OneNote Domains Quick Tips Alerts Hacking Read Only Bookmarks VPN Virus User Tips The Internet of Things Cyber Monday Managed IT IT Support Alt Codes Bitcoin Writing Administrator Content Filtering Access Control Paperless Office Going Green Virtual Private Network IT service Social Engineering Best Practices Multi-Factor Security Remote Monitoring and Management IT Services Best Practice Public Speaking Chrome USB Lithium-ion Battery Gadget Privacy Help Desk Managed IT Service Email Cookies IP Address Mobile Device Management Proactive IT Mobile Data Cost Management Firefox Tip of the Week

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...