Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Closed a Tab Accidentally? Here’s How to Restore It

Tip of the Week: Closed a Tab Accidentally? Here’s How to Restore It

Everyone has accidentally closed an important web browser tab before they were finished with it. What can you really do about it, though? You might expect that you have to search for the page again, but there’s a much easier way to do it. In your Google Chrome browser on a PC or smartphone, you can reopen closed tabs relatively easily.

Continue reading
0 Comments

Tip of the Week: 3 More Useful Microsoft Word Features

Tip of the Week: 3 More Useful Microsoft Word Features

Microsoft Word has long since established itself as the primary word processing software in the business world, but even some power users don’t necessarily know about all of the hidden features that exist in it. Here are three of the best Word capabilities that you’ll be sure to use next time you’re in a pinch.

Continue reading
0 Comments

Tip of the Week: Ransomware Is Exploding… Is Your Business Ready For The Blast?

Tip of the Week: Ransomware Is Exploding… Is Your Business Ready For The Blast?

When it comes to Internet threats, ransomware is the one that causes the most fear, especially for small and medium-sized businesses, as it should. According to the Cisco 2017 Annual Cybersecurity Report, ransomware is growing at a yearly rate of 350%. It’s time to make sure that you’re doing what you can to stop your business from becoming another ransomware statistic. Here’s five very good tips that will help you avoid becoming a victim of the next big ransomware attack!

Continue reading
0 Comments

Tip of the Week: Touch Keyboard Capabilities in All Windows 10 Devices

Tip of the Week: Touch Keyboard Capabilities in All Windows 10 Devices

Special text characters are an integral part of typing. For the most part, however, they are not something that your normal, run-of-the-mill keyboard or laptop keypad is able to access easily. Luckily, for Windows 10 users, there is a shortcut that allows you to access all sorts of special characters.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Managed IT Proactive IT Remote Monitoring and Management Files Processors Applications Regulations Cyberattacks Travel Mobility Wireless Technology Infrastructure Alt Codes Data Management USB Server Websites Browser OneNote Favorites Wasting Time Gadgets Writing Black Market WiFi Social Media Multi-Factor Security IBM Small Business Physical Security Management Apple Network Management Mail Merge Passwords User Hiring/Firing Tech Terms Remote Workers Server Management Microsoft Excel Sports Software Tips Office Tips Star Wars History Cryptocurrency Digital Signature PowerPoint Printer Saving Time Cyber Monday Technology Laws Geography Relocation How To Cloud Application Windows Buisness Access Control Marketing VoIP Virtual Desktop Environment Windows 7 Mobile Data Human Error Smartphone Phishing Point of Sale IP Address Help Desk Experience Dark Data Search Document Management Authentication Wires Data loss Electronic Medical Records Flexibility Crowdsourcing Compliance Business Intelligence Managed Service G Suite Remote Monitoring Recovery Mobile Device 3D Printing Data Software as a Service Government Router Digital Payment SharePoint User Tips Paperless Office Mobile Computing Blockchain Innovation E-Commerce Virus Save Money Managed Service Provider Features The Internet of Things Unsupported Software Techology Cabling YouTube Instant Messaging Safety Vulnerability Data Recovery Managed IT services Data Security Staffing Corporate Profile Laptop Remote Worker Email CIO Information Politics Internet of Things Training Facebook Users Recycling WannaCry Cybercrime communications Language Google Calendar Dark Web Augmented Reality High-Speed Internet Hosted Solutions Lithium-ion Battery Downloads Authorization App BYOD IT Services Mobile Device Management Entrepreneur Upgrades Operations Downtime Theft End of Support Shortcut Windows 10 Spam Employee-Employer Relationship MSP Project Management Windows 8 Operating System Ransomware Company Culture Cortana Customer Relationship Management Comparison Tablet Backup Hard Drives Gadget Mobile Electronic Health Records SaaS Security Cameras Hard Drive Utility Computing Network Password User Error Personal Information Mobile Security Communication Budget Business Continuity Cache Professional Services Fleet Tracking Encryption Mobile Device Managment Hacker IT Consultant Botnet Data Warehousing Identity Business Migration Unified Threat Management Deep Learning ROI Business Management Vulnerabilities Presentation Business Growth Financial Miscellaneous IT service Finance Social Engineering Customer Service Computing Identity Theft Distributed Denial of Service Administrator Virtualization Fun Business Technology Cleaning Work/Life Balance Firewall Patch Management IT Support Licensing Administration Webcam Google Wallet Retail Technology Tips Robot Managed IT Service Best Practice Firefox Mirgation Hacking 5G Uninterrupted Power Supply LiFi Spyware Conferencing Competition IT Management Refrigeration Alert Saving Money Domains Hotspot IoT Wireless Solid State Drive Screen Reader Mobile Office Remote Computing Internet Exlporer Lenovo Security BDR IT Budget Bluetooth Assessment Update Content Filtering Vendor Management Outlook Managing Stress Legislation Programming Privacy Cost Management Settings Bookmarks Wi-Fi Collaboration eWaste Touchscreen Voice over Internet Protocol Storage Virtual Reality Public Speaking Taxes IT solutions Google Docs Productivity Enterprise Resource Planning Time Management Quick Tips Bandwidth Word Internet Artificial Intelligence IT Consulting Computing Infrastructure Backup and Disaster Recovery Antivirus Heating/Cooling Social Technology Automation Business Owner Drones Cooperation Computers File Sharing Specifications Alerts Bring Your Own Device Private Cloud Automobile Upgrade Efficiency Notes Backups Error Running Cable Managed Services Provider Law Enforcement Printing Digital CCTV Network Congestion IT Technicians Supercomputer Nanotechnology Telephone Systems Information Technology Unified Threat Management Meetings Net Neutrality Modem Chrome Connectivity Trending Analytics IT Support Tech Term How To Windows 10 Money Data Breach Workplace Tips Machine Learning Hosted Solution Mobile Devices Samsung Public Cloud Chatbots Productivity Social Networking Virtual Assistant Google Drive Smartphones Cables Permissions Procurement Superfish Emoji Scam Tech Support Chromebook Undo Permission Enterprise Content Management Servers PDF Hard Disk Drive Typing Phone System Notifications Test Database Tip of the Week Knowledge Sync Office Disaster Apps Android Health Statistics Computer Repair Motherboard Proactive Microsoft Web Server VoIP Bitcoin Website Microsoft Office Going Green Google Maps Redundancy Software Consultation Tracking Maintenance Break Fix Consulting Disaster Resistance Hackers iPhone Address Read Only Risk Management Cloud Computing Data Backup Office 365 Co-managed IT Gmail Asset Tracking Staff Troubleshooting Halloween RMM Smart Technology Piracy Telephony Employer-Employee Relationship Save Time HIPAA Healthcare Computer Fraud Legal Humor Google Unified Communications Outsourced IT Development Consumers Cybersecurity Networking Disaster Recovery Scary Stories Network Security Hacks Smart Tech Analyitcs Display Tip of the week Business Computing Cookies Education Hardware Managed IT Services VPN Holiday Avoiding Downtime Cameras WPA3 GPS Zero-Day Threat Employees Wearable Technology Big Data Monitors Data storage Motion Sickness Monitoring Malware Black Friday Twitter Identities Current Events Documents Intranet Virtual Private Network Mouse Computer Care Two-factor Authentication Best Practices

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...
QR-Code