Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What Can You Do to Prevent Lightning From Frying Your Technology?

What Can You Do to Prevent Lightning From Frying Your Technology?

It doesn’t matter where your business is located--chances are you’re susceptible to thunderstorms. Lightning storms are very unforgiving, and they can lead to all sorts of problems for unprepared businesses. We’ll discuss some of the ways that your organization could be affected by a lightning storm, as well as how you can take measures to mitigate these dangers in the future.

Continue reading
0 Comments

You Need More Than a Power Strip to Protect Your Company’s Equipment

You Need More Than a Power Strip to Protect Your Company’s Equipment

What would happen if you were in the middle of typing a report or performing some task, and the office suddenly lost power? Too many would find themselves staring blankly at an equally blank screen as their infrastructure suddenly ceased operations. However, there is a device that can help save you from the worst effects of sudden power loss.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Employee-Employer Relationship Privacy Machine Learning Web Server Point of Sale Halloween Virus Corporate Profile Redundancy Writing Instant Messaging Dark Web Connectivity Hard Disk Drive Webcam Cleaning Help Desk Google Wallet Running Cable Electronic Health Records Computer Repair Tip of the week Twitter Google Calendar Authentication Smartphone Customer Service Unified Threat Management Knowledge Security Cameras Zero-Day Threat Processors Motherboard GPS End of Support Virtual Reality IoT Hiring/Firing Backup Competition Tip of the Week Software as a Service Gadgets Remote Worker User Customer Relationship Management Cloud Computing Data loss Recovery Relocation Refrigeration Google Maps Network Security Cache Analyitcs Spyware Password Statistics High-Speed Internet Network Management Scary Stories RMM Best Practices How To Staffing Authorization Artificial Intelligence Microsoft Lithium-ion Battery Hacker Storage Social Engineering Employees The Internet of Things Augmented Reality Vulnerabilities Cooperation Website Managed IT Service Applications Paperless Office Recycling Tech Terms Government Office Management BDR Solid State Drive Cryptocurrency Managed Service Firefox Browser Quick Tips Motion Sickness Business Continuity Virtual Desktop Disaster Managing Stress Domains Cookies Chromebook Computers Buisness Laptop Tech Term Specifications Sports Lenovo Patch Management Save Time Chatbots Network Identity Theft Nanotechnology Computing Infrastructure VoIP Mobility Piracy Data Backup Work/Life Balance Enterprise Resource Planning Superfish Programming Websites Healthcare Notifications Users Development HIPAA App Android Printer Current Events Co-managed IT Virtual Private Network Retail IT Technicians Troubleshooting Miscellaneous Holiday Smart Tech IT Support Money Mobile Permissions Break Fix Politics communications IT service Data Warehousing Avoiding Downtime Information Technology Productivity Wi-Fi Display Software Test Technology Tips Regulations Consumers Project Management Company Culture Business Technology Hacking Outsourced IT Tech Support Virtualization Google Files Security Mouse Disaster Resistance Physical Security Monitors Network Congestion Bluetooth Heating/Cooling Chrome Infrastructure 5G Spam Crowdsourcing Wearable Technology Flexibility MSP Maintenance Wires Supercomputer Experience Mirgation SharePoint Alerts Error Fleet Tracking Managed IT Services Health History Apps Hacks Windows Communication Remote Monitoring and Management Humor Data Breach Efficiency IP Address Law Enforcement Wireless Human Error VoIP Language Typing Managed IT Upgrade Google Drive Windows 8 Cyberattacks Distributed Denial of Service USB Mobile Office Innovation Productivity Mobile Security Antivirus Tablet Gadget Cybersecurity Facebook Collaboration CIO Intranet Firewall Black Market Smart Technology Business Owner Cameras Ransomware How To Proactive VPN Shortcut Features Remote Computing 3D Printing Outlook IT Consulting eWaste Cybercrime OneNote Administrator Two-factor Authentication Permission Mobile Device Management G Suite Disaster Recovery Bookmarks Downtime Remote Monitoring Hosted Solutions Cost Management Small Business Hard Drive Printing Telephony Backup and Disaster Recovery Comparison IBM Business Growth Hotspot Robot Encryption Cortana Finance Fraud Operating System Internet Exlporer Phone System Servers Business Management Training Administration Microsoft Excel Data storage iPhone Social Media Uninterrupted Power Supply Utility Computing WPA3 Business Scam ROI Meetings Malware Hard Drives Black Friday Data Safety Alert Passwords Financial Unified Communications Digital Payment Staff Public Cloud Upgrades Blockchain Sync Office 365 Operations Router Cloud Bring Your Own Device Digital Computing Business Computing Techology Unsupported Software Windows 10 Going Green Employer-Employee Relationship IT solutions Drones BYOD Technology Laws Saving Time Microsoft Office PDF Data Recovery Asset Tracking User Error Update Dark Data Theft Fun Telephone Systems Presentation LiFi E-Commerce Gmail Environment Technology Enterprise Content Management Content Filtering Hardware Emoji Consultation Mobile Device Managment Remote Workers Automobile Net Neutrality Managed Service Provider Private Cloud Marketing Alt Codes Server Software Tips Analytics Identities Saving Money Application Trending Read Only Screen Reader Hosted Solution Settings Compliance Wireless Technology Google Docs Managed IT services Social Networking IT Management Favorites Backups Multi-Factor Security Internet Computer Unified Threat Management SaaS Computer Care Proactive IT Cyber Monday Hackers Social Conferencing Touchscreen Public Speaking PowerPoint Cables Travel Word Documents Education Licensing Search IT Support Downloads Bandwidth Server Management Samsung Digital Signature Cabling Consulting WannaCry Geography Smartphones Star Wars Legal Email Mail Merge Access Control Business Intelligence IT Services Automation Botnet IT Consultant Entrepreneur Vulnerability Mobile Computing Procurement Vendor Management Legislation Deep Learning Undo Tracking Apple Electronic Medical Records Time Management Save Money Taxes Mobile Data Office Tips File Sharing Personal Information Address Risk Management User Tips Best Practice Migration Big Data Budget Document Management Information IT Budget Data Security Data Management WiFi Assessment Phishing Identity Bitcoin Monitoring Mobile Devices YouTube Modem Workplace Tips Mobile Device CCTV Windows 10 Managed Services Provider Internet of Things Networking

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code