Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What Can You Do to Prevent Lightning From Frying Your Technology?

What Can You Do to Prevent Lightning From Frying Your Technology?

It doesn’t matter where your business is located--chances are you’re susceptible to thunderstorms. Lightning storms are very unforgiving, and they can lead to all sorts of problems for unprepared businesses. We’ll discuss some of the ways that your organization could be affected by a lightning storm, as well as how you can take measures to mitigate these dangers in the future.

Continue reading

You Need More Than a Power Strip to Protect Your Company’s Equipment

You Need More Than a Power Strip to Protect Your Company’s Equipment

What would happen if you were in the middle of typing a report or performing some task, and the office suddenly lost power? Too many would find themselves staring blankly at an equally blank screen as their infrastructure suddenly ceased operations. However, there is a device that can help save you from the worst effects of sudden power loss.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Applications Hard Drive Tablet Websites Data Backup Development Halloween Hard Drives Digital Payment Database Mirgation Crowdsourcing The Internet of Things Mobile Data Vulnerabilities Uninterrupted Power Supply Travel Going Green Tech Support Technology Tips Backup and Disaster Recovery Relocation Cloud Computing Consulting Big Data Mobile Office Information Technology Voice over Internet Protocol Comparison Mobile Security Alt Codes Address Chatbots VoIP Cost Management Sports Antivirus Taxes Business Computing Remote Workers Managed Services Provider Read Only Passwords How To Zero-Day Threat Refrigeration Break Fix Current Events Windows 10 Best Practice Error Geography Computer Care Solid State Drive Electronic Medical Records Humor Innovation Budget Regulations Deep Learning Tip of the Week Microsoft Excel RMM Distributed Denial of Service ROI 3D Printing IT service Managed Service Settings Education Internet Google Drive Scam Government Experience End of Support Gadget Business Growth Two-factor Authentication Fun IT Services Wireless Technology Unified Threat Management Word Notifications Mobile Device Management Consultation Workplace Tips IT Management Permission Professional Services Best Practices Network Congestion Healthcare Monitoring Printing Mouse Health Identity Bring Your Own Device Undo iPhone Cybersecurity Asset Tracking Botnet Paperless Office Entrepreneur Social Migration Downtime Blockchain User Tips Windows 7 Mobile Meetings Language Cookies Risk Management Documents Small Business Miscellaneous Bitcoin YouTube Staff Password Marketing USB Net Neutrality Connectivity IT Support Business Technology Heating/Cooling MSP Employee-Employer Relationship Ransomware Remote Computing Google PowerPoint Competition Google Docs Wearable Technology Cleaning Productivity Remote Worker Authorization Hard Disk Drive Firefox Authentication Disaster Resistance Infrastructure CIO Hosted Solutions Motherboard Permissions Licensing Theft Hosted Solution Privacy Piracy Shortcut Cabling Favorites Outsourced IT Storage Statistics Operations VPN Digital Signature Chromebook Automation Google Calendar Communication Operating System Spam Recovery Lenovo Data Warehousing Data Hackers Co-managed IT G Suite Users Backup Patch Management Printer Politics Maintenance Mail Merge Computing Infrastructure Tech Term Computer Computer Repair Business Intelligence Tip of the week Outlook Utility Computing Touchscreen Superfish Emoji Data Recovery Trending Windows 8 Training Security Cameras Display Office 365 Unsupported Software Management Cameras Mobile Computing Dark Web Social Media Windows 10 Business Continuity Redundancy Black Market Virtual Assistant WannaCry Analyitcs Browser Content Filtering IBM Data Security Managed Service Provider Data Breach Project Management Motion Sickness Virtual Reality Managed IT Services Security Screen Reader Customer Service Internet Exlporer Cryptocurrency Alert History OneNote Information Augmented Reality Employees Business Management Programming Office Nanotechnology Search Enterprise Content Management Assessment Disaster Intranet Access Control Cables SharePoint Office Tips Vendor Management Social Engineering Notes Downloads Virtualization Server Tracking User Error Holiday Smart Technology Google Maps Microsoft Cyberattacks Hacker Electronic Health Records Finance Money Domains Network IT Consulting Hacks Smartphones Technology Laws Laptop Identity Theft Google Wallet Save Time WPA3 Windows IT Consultant Employer-Employee Relationship Technology Vulnerability Supercomputer Wireless File Sharing Knowledge Proactive IT Telephone Systems IT Budget IT Support Specifications VoIP Quick Tips Managed IT services Web Server Managed IT Law Enforcement Work/Life Balance E-Commerce Scary Stories Techology IT Technicians Tech Terms Mobile Devices Retail Collaboration Mobile Device Staffing Remote Monitoring Productivity Gmail Company Culture Cooperation Fleet Tracking Wasting Time Efficiency Bluetooth Recycling Remote Monitoring and Management Hacking IoT Servers Managing Stress IP Address Corporate Profile Fraud BDR Smart Tech Buisness Monitors Safety Malware PDF Instant Messaging User BYOD Business Apps Backups Application Hardware Public Speaking Modem Consumers Android Server Management Help Desk Cyber Monday Sync Saving Time Managed IT Service How To communications Upgrades Star Wars WiFi Multi-Factor Security Bookmarks Flexibility Black Friday Administration Writing Firewall Virtual Private Network Automobile Virus Analytics Environment Data Management HIPAA Wires Phishing Facebook Phone System Cybercrime Network Management Dark Data Presentation Cloud Procurement Software Tips Legislation LiFi Email 5G Networking Point of Sale Machine Learning Telephony Troubleshooting Microsoft Office Software Drones CCTV Running Cable Saving Money Computers Mobility Smartphone Public Cloud Typing Financial Alerts Physical Security Robot Personal Information Samsung Data loss Digital Chrome SaaS Mobile Device Managment Features Administrator Unified Communications Software as a Service App Identities Enterprise Resource Planning Processors Files Computing Cortana Network Security Test Social Networking Disaster Recovery Private Cloud Document Management Data storage Website Cache Virtual Desktop Update Spyware High-Speed Internet Artificial Intelligence Apple Internet of Things Save Money Legal Human Error Bandwidth Avoiding Downtime Compliance Business Owner Wi-Fi Customer Relationship Management eWaste GPS IT solutions Lithium-ion Battery Upgrade Webcam Conferencing Hotspot Hiring/Firing Unified Threat Management Encryption Router Time Management Twitter Gadgets Proactive

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...