The Connection, Inc Blog

The Connection, Inc has been serving the New Jersey area since 1992, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

George's career in high technology systems began in 1985 at ESS in Atlantic Highlands, NJ, where he spent two years doing voice & data cabling, phone system installation, and service & maintenance. He then spent four years with Atlantic Telecom Services in Leonardo, NJ running their service and installation department, honing his skills in fiber optic lines, cabling, and phone systems.

In 1992, George drew on his years of experience and established The Connection, Inc.

As Owner, President and Senior Systems Engineer, George oversees all operations on a day-to-day basis. You might find him out in the field troubleshooting a telephone system, on a lift 30 feet in the air hanging fiber optic cable, or in the office helping with hardware or software issues. George is certified in a wide range of technologies and systems, including Microsoft, Sonic Wall, Mitel and Samsung.

George is a dedicated hands-on manager, ensuring every aspect of The Connection, Inc.’s operation runs smoothly. Whether it's 3 AM, or a Saturday afternoon, George is dedicated to helping their customers get connected and Stay Connected! His dedication to the community is clear, as he is a long-time volunteer member and President of the Leonardo First Aid Squad and a long-time volunteer member of the Community Fire Company of Middletown Township.

You can reach George at george@tconnection.com or 732-291-5938 ext. 500.

You Need to Think About Cloud Migration Today

You Need to Think About Cloud Migration Today

The cloud is one of those solutions that you’re either taking full advantage of or you have yet to experience the true benefits it can provide. If you’re still on the fence about cloud migration, we have news for you; this decision is actually costing you in the long term. We recommend you explore the possibility of cloud migration by considering why you’re so worried about it in the first place (and why that doesn’t make sense).

0 Comments
Continue reading

Unlock Your Business Potential with Data Democratization

Unlock Your Business Potential with Data Democratization

Is your business data hard to get to, like it's locked away and only a few people have the key? That can really hold your business back. Imagine if everyone on your team could easily use all the data you create and collect to make better decisions, faster. That's what data democratization is all about, and it’s a powerful tool. In today’s blog we briefly discuss how it works. 

Tags:
0 Comments
Continue reading

How Cybercriminals Rip You Off

How Cybercriminals Rip You Off

Cybercriminals are in the business of ripping you off, make no mistake about it. They’ll do what they can to trick you and steal your hard-earned cash. Thankfully, there are common and recurring trends you can look for that expose these fraudsters for what they really are.

0 Comments
Continue reading

Craft Professional Emails Faster with AI Assistance

Craft Professional Emails Faster with AI Assistance

If you’re like most professionals today, you know that writing emails can be a surprisingly time-consuming task. You want to sound professional but not stiff, friendly but not casual, clear but not robotic. What’s more, when your inbox is already overflowing, the last thing you want is to stare at a blinking cursor trying to craft the perfect response.

0 Comments
Continue reading

How Computers Power Our Favorite Media

How Computers Power Our Favorite Media

Entertainment has changed a lot over the past several decades. When not too long ago teams of trained professionals were using ultra sensitive film stock to shoot your favorite movies, flatbed editors in dark rooms to edit them, and elaborate film projectors to show them, today there are digital cameras that rely on digital storage, digital editing that you can do from a phone, and OLED screens that use thousands of pixels to provide the clearest picture possible.

0 Comments
Continue reading

How to Keep a Hidden Office Expense from Ballooning Uncontrollably

How to Keep a Hidden Office Expense from Ballooning Uncontrollably

Is the steady hum of your office printer the soundtrack to shrinking profits? For many businesses, the hidden costs associated with printing—paper, ink, toner, maintenance, and even the time employees spend managing physical documents—add up to a significant expense.

At The Connection, Inc, we specialize in proactive business technology support, and we often see companies bleeding money through unnecessary printing. There is a powerful solution: a Document Management System (DMS).

0 Comments
Continue reading

The Many Benefits of Implementing a Cloud Solution for Your SMB

The Many Benefits of Implementing a Cloud Solution for Your SMB

The cloud is an essential piece of technology for any modern business, but how much do you actually know about the cloud in 2025? Any business can leverage the cloud, from small businesses to large enterprises. Let’s discuss what the cloud is, what it does, and how it can help your business reimagine its operations.

0 Comments
Continue reading

Protecting Your Network from Hackers

Protecting Your Network from Hackers

Cyberattacks aren't just something that happens to other people, they’re a real-world threat to businesses, individuals, and even governments. Hackers are smart, sneaky, and persistent. The good news is that with a little strategic effort, you don't have to be helpless. Employing the right habits and strategies can help make it very hard for hackers to mess with you. In this month’s newsletter, we talk about how to get better at keeping hackers out of your network.

0 Comments
Continue reading

How Downtime Can Sink Your Business (And What to Do About It)

How Downtime Can Sink Your Business (And What to Do About It)

Nothing is more frustrating than when technology should work, but doesn’t for any number of reasons. Of course, it’s also expensive when your technology doesn’t work, which means you’re incurring costs during this downtime period. Today, we want to address the consequences of downtime and what you can do about it to minimize its impact on your business.

0 Comments
Continue reading

The Urgency of Upgrading from Windows 10

The Urgency of Upgrading from Windows 10

Support for the Microsoft Windows 10 operating system is coming to an end, so let's talk about something crucial for your business technology: upgrading as soon as possible. Microsoft has officially set the date: October 14, 2025. After this day, mainstream support for Windows 10 concludes. While that might seem like a comfortable distance away, in terms of IT planning and business operations, it's practically tomorrow. Waiting is not a strategy; planning is.

0 Comments
Continue reading

Essential IT Practices Your SMB Can't Afford to Ignore

Essential IT Practices Your SMB Can't Afford to Ignore

There are a lot of regulations out there that businesses need to follow, both for their own good and that of their clients, customers, and associates. Many of these regulations—like the Health Insurance Portability and Accountability Act (HIPAA), the Sarbanes-Oxley Act (SOX), and the Payment Card Industry Data Security Standard (PCI DSS)—are relatively well known and critical to follow.

That said, these regulations dictate many basic practices that, to be completely frank, should already be a priority for every business that cares about its security and efficiency.

0 Comments
Continue reading

Cook Up Custom Emojis in Emoji Kitchen

Cook Up Custom Emojis in Emoji Kitchen

With so many emojis out there, you’d think there would always be one that says exactly what you mean in any given situation. Well, Google wants to make this a reality, and with their new Gboard mobile keyboard Emoji Kitchen, you’ll get to take advantage of emojis in fun and exciting new ways, like, for example, blending two emojis together. Let’s go over how you can use Emoji Kitchen.

0 Comments
Continue reading

Protecting Your Business from Cybercriminals

Protecting Your Business from Cybercriminals

The methods criminals use to access money and sensitive information have evolved dramatically. That official-looking email requesting an urgent payment, or a sudden system lockdown demanding a ransom; these are no longer rare occurrences but calculated tactics by modern cyber thieves. 

Cybertheft isn't a one-size-fits-all problem; it's sophisticated, and the types of techniques are designed to exploit vulnerabilities and deceive unsuspecting individuals and businesses. Let’s explore some of the primary ways these digital adversaries operate.

0 Comments
Continue reading

Why You Shouldn’t Force Remote Employees Back to the Office

Why You Shouldn’t Force Remote Employees Back to the Office

Google has started to implement policies pushing remote staff back to the office, some of which have consequences for noncompliance. This feels like a step in the wrong direction, especially in regards to flexible workplaces and scheduling. Sure, in-person collaboration is great, but it’s hard to argue with the increasing body of proof showcasing the benefits of remote work, especially for SMBs.

0 Comments
Continue reading

3 Ways to Make Technology More Effective and Safe While Traveling

3 Ways to Make Technology More Effective and Safe While Traveling

This summer, do you plan on getting away from the office for a bit? If so, we have some technology tips for you to help you stay safe and secure while on the go. Here are three ways you can prepare for travel with the right technology.

0 Comments
Continue reading

Break-Fix IT is Stunningly Insufficient for Modern Businesses

Break-Fix IT is Stunningly Insufficient for Modern Businesses

Remember the days of watching a loading bar slowly crawl across the screen? Or maybe that distinct screech of a dial-up modem connecting? While technology has rocketed forward since then, some businesses still cling to an outdated approach when it comes to managing their IT: the break-fix method.

This means waiting for something to go wrong—a server crash, a software glitch, a security breach—before calling for help. It might seem cost-effective initially, but this reactive stance is becoming increasingly risky and wasteful.

0 Comments
Continue reading

Technology's Role in Modern Professional Services

Technology's Role in Modern Professional Services

In any professional services firm—whether advising on law, managing finances, designing structures, or developing business strategies—the core value lies in specialized knowledge and trusted expertise. Delivering this value effectively for these types of organizations relies heavily on a powerful technology.

0 Comments
Continue reading

Cultivating a Cybersecurity Culture That Goes Beyond Checkboxes

Cultivating a Cybersecurity Culture That Goes Beyond Checkboxes

Cybersecurity is non-negotiable for protecting your business. While your awareness as a business owner is key, your employees are your first line of defense. Implementing effective cybersecurity training is crucial, but how do you make it stick?

0 Comments
Continue reading

Why Proactive IT Support is Your Business' Best Move

Why Proactive IT Support is Your Business' Best Move

Throughout the workday, you’re likely juggling a multitude of responsibilities, from strategic planning to ensuring smooth day-to-day operations. Let’s face facts here: technology underpins nearly every aspect of your business… but what happens when that technology falters? 

Reactive fixes can be costly, disruptive, and ultimately hinder your growth. This is where the power of proactive business technology support truly shines.

0 Comments
Continue reading

Cape Seguridad, Episode One - Zero-Day Threats

Cape Seguridad, Episode One - Zero-Day Threats

We’ve taken it upon ourselves to change tack a little bit and approach some of our warnings against cybersecurity issues a little differently… namely, by using the format of a daytime soap opera. We hope these occasional blogs will help contextualize how dangerous such threats can be. As such, we encourage you to picture the following in the most melodramatic tone possible, while also remembering how serious these issues are in real life.

For decades, the quiet city of Oak Falls has enjoyed a largely peaceful time, hearing the relaxing waves that lap against the nearby coastline. However, new waves are now being created, with cybersecurity threats emerging every day. Come with us and observe how these threats make life more difficult for those who live and love at Cape Seguridad.

0 Comments
Continue reading

Blog Archive

Mobile? Grab this Article

QR Code

Free Consultation

team work

Interested in seeing what we can do for your business? Contact us to see how we can help you!

Sign Up Today!

News & Updates

The Connection, Inc. Celebrates 32 Years as a Trusted Technology Provider!   Since our founding in 1992, technology and the way we operate and do business has changed a lot. Companies that have adapted and aligned themselves with ...

Contact us

Learn more about what The Connection, Inc can do for your business.

The Connection, Inc
51 Village CT
Hazlet, New Jersey 07730