Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

Intel recently found itself (once again) in hot water, mere months after many flaws were discovered in the firmware that enables all of their chips to do their job. This time, the issue could have potentially caused a permanent dip in the CPU’s capacity to function properly. This has come to be known as the Meltdown vulnerability.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Hackers Saving Time Managed IT services Current Events Star Wars Processors Wi-Fi Chatbots Save Time Buisness Data Artificial Intelligence Going Green Scary Stories Chrome Shortcut Nanotechnology IT Support Samsung Mobile Device Management Cables Specifications Alt Codes Android Human Error Consulting Business IP Address Customer Service User Tips IT Budget Data Management Wireless Black Market Phishing Asset Tracking Storage Computer Care Display Office 365 IT Management Cortana Technology Google Wallet Hard Drives Technology Laws Administrator Instant Messaging Financial Halloween Website Distributed Denial of Service Best Practice Users Documents 5G Risk Management Automation Hosted Solutions Taxes Efficiency Electronic Medical Records GPS MSP Wires Mouse Geography Techology Wireless Technology Identity Project Management Unified Threat Management Management Identities Tracking Malware Data Recovery PDF Spyware Communication Law Enforcement Company Culture Printing Break Fix Programming Word SaaS Internet Avoiding Downtime Antivirus E-Commerce Backups Windows 10 Motion Sickness Software as a Service Remote Workers IBM Browser Customer Relationship Management Trending Black Friday Authorization Augmented Reality Help Desk Network Security Mobile Security Content Filtering Staffing Staff Marketing IT service Mobility Big Data Fun Hard Drive Comparison Google Maps Cleaning Social Engineering Error IT Technicians Analyitcs Assessment IT Support Favorites Consultation Server Management VPN Managed IT Service Monitoring eWaste Social Update Business Growth Education Security Data Security Proactive IT Mirgation Managed Service Domains Identity Theft Screen Reader Supercomputer Tech Support High-Speed Internet Smartphones Botnet Procurement Cloud Hard Disk Drive 3D Printing Server Hacks Chromebook Employee-Employer Relationship How To Compliance Microsoft Networking Knowledge Piracy Settings VoIP Travel OneNote communications Bookmarks Public Speaking Cost Management Bitcoin Cache Business Technology Maintenance Tablet Proactive Managed IT Software Tips RMM Best Practices Intranet Health Managed IT Services Authentication Wearable Technology Business Continuity Firewall Hotspot Finance Enterprise Content Management Router Network Recycling Remote Monitoring Data Backup Hardware Connectivity Cooperation Information Hacker PowerPoint Internet of Things History Entrepreneur Modem Utility Computing Point of Sale User Error Disaster Analytics Tech Terms Flexibility Tech Term Small Business Microsoft Excel Vulnerability Recovery Unified Communications Bluetooth Security Cameras Cloud Computing Environment Experience Microsoft Office Productivity SharePoint Mobile Data Two-factor Authentication Zero-Day Threat IT solutions Bring Your Own Device Mobile Office Humor Cyber Monday Infrastructure Mobile Government HIPAA Cyberattacks IT Consultant Spam Read Only Cybercrime Alerts Employees Smart Tech Operations Multi-Factor Security Personal Information Test File Sharing Tip of the Week Robot Digital Signature Network Congestion Computer Repair Typing Downtime Software Uninterrupted Power Supply Network Management Mobile Device Managment Bandwidth iPhone Lithium-ion Battery Servers Remote Computing Sports Training Motherboard Data Warehousing Internet Exlporer Data loss Google Vendor Management Computer Virtual Desktop Regulations Refrigeration Backup and Disaster Recovery Operating System Hiring/Firing Email Statistics BDR Passwords Licensing Notifications Co-managed IT Websites Cabling Innovation Vulnerabilities Cookies Mobile Device Drones WPA3 Backup Twitter Search Smart Technology Consumers Telephone Systems Lenovo BYOD Automobile Virus Unsupported Software Cryptocurrency Money Dark Data Data Breach Document Management Laptop Windows 10 ROI Hosted Solution LiFi Fraud Computing Infrastructure Collaboration Remote Worker Remote Monitoring and Management Safety Office Tips Mobile Computing Sync Work/Life Balance Retail USB WiFi Save Money Monitors Heating/Cooling Virtual Private Network Language Relocation Features Corporate Profile Administration Social Media CIO Presentation Enterprise Resource Planning Quick Tips Apps Productivity Google Drive Upgrades Technology Tips Business Computing Healthcare Physical Security Running Cable Patch Management Google Docs Public Cloud Web Server Unified Threat Management Miscellaneous Touchscreen Files Competition Legislation Data storage Password Conferencing Permissions Alert VoIP App Gadget Cybersecurity Saving Money Information Technology Downloads Social Networking Disaster Resistance Meetings Employer-Employee Relationship Business Intelligence Managed Services Provider Webcam Fleet Tracking How To Disaster Recovery Solid State Drive Electronic Health Records Access Control Time Management Legal Crowdsourcing Holiday Applications Digital Business Owner Cameras Troubleshooting Managing Stress User Migration Undo Gadgets Budget End of Support Hacking Politics Application Phone System IT Services Tip of the week Permission Mail Merge Development Office Google Calendar IoT Telephony Outsourced IT YouTube Printer Writing Paperless Office Net Neutrality Computers Workplace Tips Theft Virtual Reality Dark Web Deep Learning Facebook Redundancy Computing Privacy IT Consulting Business Management CCTV Private Cloud Ransomware Superfish Encryption Digital Payment Emoji Windows 8 Gmail Blockchain Address Upgrade Mobile Devices WannaCry Apple Virtualization Managed Service Provider Smartphone G Suite Firefox Windows Outlook The Internet of Things Machine Learning Scam

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...