Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

Intel recently found itself (once again) in hot water, mere months after many flaws were discovered in the firmware that enables all of their chips to do their job. This time, the issue could have potentially caused a permanent dip in the CPU’s capacity to function properly. This has come to be known as the Meltdown vulnerability.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Tech Terms Hosted Solutions Recycling Firewall Google Docs Operations Google Calendar Wireless Remote Monitoring and Management Shortcut VoIP Document Management Webcam Chatbots Superfish Mobile Security Sports Flexibility Consulting Competition IP Address Education Smart Technology 5G Technology Tips IoT Hacking Computing Infrastructure How To Windows 10 Downtime YouTube Vendor Management Gadget Politics Cyber Monday Automobile Techology Google Drive Backups Business Management Dark Data Servers Travel Printer Scam Healthcare VoIP Remote Worker Vulnerabilities Gadgets Compliance Training Samsung Identity Experience Settings Break Fix SharePoint Trending Test Instant Messaging Access Control Hard Disk Drive Electronic Medical Records Two-factor Authentication Enterprise Content Management Buisness Writing Personal Information Data storage Digital Business Computing Computer Care Miscellaneous Bitcoin Fraud Staffing Search ROI Human Error Time Management Information Point of Sale Wearable Technology Apps Browser Meetings Information Technology Social Networking Assessment Email Unsupported Software Employee-Employer Relationship How To Networking Bring Your Own Device LiFi Content Filtering Error G Suite Saving Money Modem Innovation Enterprise Resource Planning E-Commerce Unified Threat Management HIPAA Geography Virtual Desktop Nanotechnology Computer Repair Fun Legislation Tip of the Week Managed IT Botnet IT Consultant Collaboration Holiday Spyware Business Owner Staff Network Security Spam Employer-Employee Relationship Comparison Twitter Star Wars IT Support Motion Sickness Downloads Notifications Social Media Network Management Consumers Managed Services Provider Tracking IT solutions Identity Theft Social Computing Specifications Blockchain Monitors Avoiding Downtime Software as a Service Consultation Augmented Reality Scary Stories Windows 10 Migration Robot Big Data Fleet Tracking Remote Workers Cookies Cost Management Users Drones Office 365 Cloud Computing Cooperation Phishing Development Android Cache Identities Zero-Day Threat Budget Company Culture Halloween Financial Data Backup Theft Business Continuity Technology Laws VPN Router Permissions Address Hacker Managed IT Services Data Features Alert Disaster Recovery Google Productivity Hard Drive Tablet Firefox Data Security Digital Signature Employees Mobile Device Project Management Touchscreen Presentation Password User Black Friday Motherboard Office Tips Maintenance Privacy MSP Patch Management Black Market Smartphones Connectivity Artificial Intelligence App Storage Administration Mobile Device Management CCTV Hardware History PDF Hacks Managed Service Mouse IT Support Cybercrime Mobile Mobile Office Server Internet Exlporer Health Documents Cables Microsoft Excel Business IT Technicians Public Speaking Security Cameras User Error Microsoft Office Managed IT services Analyitcs Favorites Customer Service Web Server Undo Supercomputer Windows Wireless Technology Piracy Facebook Refrigeration Co-managed IT Statistics Data Warehousing Running Cable Going Green Productivity Best Practices Upgrades Efficiency Chrome Mirgation Emoji Retail Current Events IT service Antivirus Website Mobile Device Managment Computer Crowdsourcing Processors Conferencing Files Business Technology Utility Computing Administrator Proactive IT Mobile Data USB Remote Computing Monitoring Display Tech Support Saving Time Private Cloud PowerPoint Net Neutrality Hard Drives Proactive iPhone IBM IT Budget Language Cabling Internet IT Management Computers High-Speed Internet Technology Backup and Disaster Recovery Smartphone Outsourced IT Public Cloud CIO Wires Apple Smart Tech Best Practice Programming End of Support Mail Merge Word Websites Data loss WannaCry Cameras Entrepreneur Disaster Chromebook Help Desk Telephone Systems Distributed Denial of Service Troubleshooting Remote Monitoring Printing communications Telephony Alerts Solid State Drive Typing Business Intelligence Machine Learning Tech Term Hiring/Firing Safety SaaS Bookmarks Hosted Solution OneNote Save Money Security Money Cloud Digital Payment Environment Laptop Mobile Computing Managing Stress Business Growth Windows 8 Humor Wi-Fi BDR Regulations Physical Security Risk Management Cleaning GPS Bandwidth Electronic Health Records Law Enforcement Cybersecurity Sync Domains Software Tips Bluetooth RMM Legal Government Paperless Office Encryption Vulnerability Virtualization Licensing Unified Communications Applications BYOD Tip of the week Customer Relationship Management Upgrade Uninterrupted Power Supply WPA3 Server Management Managed Service Provider Cyberattacks Data Management Procurement Permission Hotspot Software Gmail Ransomware Automation Google Maps Finance File Sharing Hackers Save Time Quick Tips Social Engineering Lenovo Managed IT Service IT Consulting Authentication Analytics Network Mobile Devices Malware Cryptocurrency User Tips Heating/Cooling Mobility Virtual Reality Lithium-ion Battery Workplace Tips Microsoft Work/Life Balance Relocation Virus Google Wallet 3D Printing Screen Reader Recovery Deep Learning Redundancy Operating System Authorization IT Services Alt Codes Multi-Factor Security Data Recovery Communication Marketing Intranet Data Breach The Internet of Things Outlook Asset Tracking Network Congestion Infrastructure Disaster Resistance Office Virtual Private Network Application Backup Internet of Things Phone System Knowledge Unified Threat Management Update Cortana Dark Web Passwords Read Only Small Business Taxes eWaste WiFi Corporate Profile Management

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code