Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

Intel recently found itself (once again) in hot water, mere months after many flaws were discovered in the firmware that enables all of their chips to do their job. This time, the issue could have potentially caused a permanent dip in the CPU’s capacity to function properly. This has come to be known as the Meltdown vulnerability.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Digital Specifications Server Superfish Outsourced IT Backup and Disaster Recovery Managed IT Cybercrime Cache Business Owner IT Support CIO Paperless Office Shortcut BDR Management Experience Bandwidth Users Halloween Time Management Collaboration Utility Computing Wearable Technology Solid State Drive Buisness Dark Data Facebook Mirgation Customer Service Cameras Wires Authentication Cost Management Mobile Computing Redundancy Budget communications Hacks Information Workplace Tips IP Address Data Management Safety Meetings Alert Data Recovery Customer Relationship Management Refrigeration Legal Smartphones Chromebook Settings Hard Drives Access Control Project Management Disaster Recovery Update Computers Gmail Monitors IT service Files Microsoft Computing Security Cameras Vulnerabilities Save Money Domains Work/Life Balance Trending Social Networking E-Commerce Alerts Botnet Apple Cloud Computing Small Business Wireless Passwords Windows 8 Virus Company Culture Enterprise Content Management Compliance Employee-Employer Relationship Avoiding Downtime Maintenance Hiring/Firing Favorites Health Gadgets Unsupported Software Software Tips Electronic Health Records Touchscreen Procurement Scary Stories Encryption User Business 5G Business Growth Processors Managing Stress Chatbots Storage Managed IT Services Physical Security IT Management Proactive IT IT Consulting Google Maps eWaste Managed IT Service Virtualization LiFi Search Digital Payment Smart Technology Screen Reader Instant Messaging Save Time Machine Learning Zero-Day Threat Tech Support CCTV Telephone Systems Mobile Security Address Mobile Device Windows 10 Samsung Browser Bookmarks Hotspot Windows 10 Windows Net Neutrality Saving Time Statistics Apps Information Technology PowerPoint Law Enforcement Tablet Crowdsourcing Office Tips Firefox Enterprise Resource Planning Windows 7 Mouse Sync Multi-Factor Security Notes Deep Learning Remote Monitoring and Management Printer GPS Applications Ransomware Internet of Things Emoji Lithium-ion Battery Recycling Cleaning Google Wallet Google SaaS iPhone Miscellaneous Fun Help Desk IT Budget Cloud Identity Document Management Current Events Professional Services Operating System Cookies Regulations Remote Computing Typing Fraud Mobile Devices IT Services HIPAA Android Healthcare Google Docs Going Green Unified Threat Management Legislation Entrepreneur Hosted Solution Smartphone Websites Bluetooth Competition History Drones Flexibility Human Error Permissions Motherboard Application Productivity OneNote Humor Techology Scam USB Lenovo Motion Sickness Consumers Connectivity Point of Sale Identity Theft Cybersecurity Environment 3D Printing Personal Information Patch Management Asset Tracking Data Warehousing Backups Hackers Heating/Cooling Innovation Wasting Time Network Assessment Business Management Office Managed Service Provider VoIP Administration Conferencing Money IT Support Piracy Virtual Private Network Social IoT BYOD Privacy How To Writing PDF Saving Money Computer Repair Computer Care SharePoint Upgrade Hard Drive Comparison Data Breach Cyberattacks Virtual Assistant Hacker Read Only Break Fix Remote Worker Technology Content Filtering Consultation Running Cable Unified Communications Language Web Server Downtime Features Presentation Outlook Disaster Business Computing Holiday Staffing Alt Codes IT Technicians Data loss Digital Signature Automation Vendor Management Modem Staff Remote Workers Internet Mobile Device Management Server Management Communication Recovery Google Calendar VPN Website Co-managed IT Private Cloud Tip of the Week Operations Government Managed Services Provider Relocation Tech Term Nanotechnology Downloads Internet Exlporer Tech Terms Business Continuity Mail Merge Hardware Black Friday Networking Public Speaking Computing Infrastructure Virtual Reality Printing Employees How To Database Mobile Office Managed Service Distributed Denial of Service Unified Threat Management G Suite Test Business Technology Dark Web Social Media Data Administrator WiFi Analytics Cooperation Education User Error Wi-Fi Productivity Fleet Tracking Two-factor Authentication VoIP Troubleshooting Hacking Documents Public Cloud Electronic Medical Records Microsoft Excel Migration WannaCry Antivirus Firewall MSP Supercomputer Bitcoin Laptop Network Security Cables Robot Geography RMM Display Microsoft Office Corporate Profile Twitter Blockchain Vulnerability Intranet Cyber Monday Identities Office 365 Star Wars ROI Google Drive Error Malware WPA3 Programming Politics Chrome Hard Disk Drive Technology Laws Travel Licensing Analyitcs Financial Notifications Big Data Black Market Network Management Network Congestion Data Backup Bring Your Own Device Gadget Router Software as a Service Augmented Reality Servers YouTube Security Smart Tech Marketing Remote Monitoring Data Security File Sharing User Tips Mobility Computer Telephony Development Mobile Virtual Desktop Phishing Automobile Artificial Intelligence Infrastructure Efficiency Business Intelligence Cortana Finance IT solutions Disaster Resistance Undo End of Support Spam Theft Best Practices Upgrades Password Employer-Employee Relationship Cryptocurrency Mobile Data App Email Social Engineering Word Training Spyware Wireless Technology Data storage IBM Quick Tips Retail Proactive Sports Phone System Voice over Internet Protocol The Internet of Things Best Practice Taxes Risk Management Consulting Tracking Cabling Uninterrupted Power Supply Monitoring Permission Knowledge Technology Tips Tip of the week Software Authorization Managed IT services Mobile Device Managment Webcam High-Speed Internet Backup Hosted Solutions IT Consultant

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code