Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

Intel recently found itself (once again) in hot water, mere months after many flaws were discovered in the firmware that enables all of their chips to do their job. This time, the issue could have potentially caused a permanent dip in the CPU’s capacity to function properly. This has come to be known as the Meltdown vulnerability.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Managed IT services Management Password Finance Cache Quick Tips Software Mobile Device Managment Typing Twitter iPhone Data Warehousing Backups Halloween Recovery IT Technicians Tracking Laptop Consultation Technology Laws Programming CCTV Chatbots Servers Dark Web Licensing Printer Cortana Virus Public Cloud Star Wars Facebook Mobile Network Security VoIP Work/Life Balance Physical Security Favorites Browser Budget Chrome Meetings Financial Hard Drive Multi-Factor Security Administrator Managed IT Service Computing Security Cameras Hotspot Spyware Miscellaneous Net Neutrality Development Google Wallet Trending Data Security Managed IT Services Procurement Scary Stories Consumers Buisness Settings Applications Enterprise Resource Planning Corporate Profile Monitoring Comparison Current Events Permission Firefox Sync User Cloud Remote Monitoring Virtual Desktop Consulting 5G Windows 10 Shortcut Permissions Email Big Data Sports Google Docs Remote Workers Break Fix Hardware Computers Personal Information Humor Best Practices Word Document Management Social Media Downloads Supercomputer Statistics Microsoft Public Speaking Mobile Device Management Firewall Mail Merge Social Engineering Time Management Cloud Computing High-Speed Internet User Error Managing Stress USB Education Data Business Computing Computer Repair Motherboard HIPAA Patch Management Security Tech Term Hard Drives IT Services Software Tips Artificial Intelligence ROI Help Desk Cabling IP Address Notifications Knowledge Automobile Collaboration Hard Disk Drive Employees Augmented Reality Connectivity Disaster Windows 7 eWaste Electronic Health Records Bookmarks Tech Terms Healthcare Downtime Remote Monitoring and Management Black Market PowerPoint Black Friday PDF Uninterrupted Power Supply Fleet Tracking Productivity GPS Writing Outsourced IT Taxes Specifications Money Technology Information Technology Spam Social Networking Regulations 3D Printing Google Running Cable Data Recovery Remote Worker WPA3 Unified Threat Management Migration Proactive IT Flexibility Application Hosted Solution IT solutions Monitors Save Money Redundancy Managed Service Best Practice G Suite Router Co-managed IT Data Management Marketing Health Bandwidth Telephony Mobile Devices LiFi IT Management Retail Training Legislation Data loss Mouse Language Operating System Internet Exlporer Recycling Staff Professional Services Business Continuity IoT Backup and Disaster Recovery Staffing Alerts Gmail Voice over Internet Protocol Cooperation YouTube Piracy Save Time Android Politics Identities Project Management Apple Read Only Tech Support Gadgets Features Unsupported Software Efficiency Websites Office 365 Virtual Reality VPN WiFi Theft SaaS Office Tips Distributed Denial of Service Law Enforcement Innovation Processors Notes Scam Wireless Technology Wi-Fi Server Cybercrime Employee-Employer Relationship Modem Website Nanotechnology Small Business Microsoft Office IT Support Conferencing IT Consultant Holiday WannaCry Motion Sickness Apps Cybersecurity Assessment Windows 8 Deep Learning Electronic Medical Records Business Growth Mobile Security Two-factor Authentication Tip of the Week Samsung Telephone Systems Business Technology Bluetooth CIO Cost Management Dark Data Human Error Saving Money Environment Google Drive Superfish Network Congestion Computer Care Smart Tech Enterprise Content Management Vulnerabilities App Heating/Cooling Saving Time Bitcoin Business Intelligence Authentication IT Consulting Cyber Monday Disaster Recovery Entrepreneur Asset Tracking Internet Digital Payment Blockchain Windows Display Safety Customer Service Managed Service Provider File Sharing Instant Messaging Tablet Authorization Ransomware Search Mobility Phone System Smartphone Mirgation BYOD Company Culture How To Competition Virtual Private Network Antivirus Test Virtualization Domains Upgrade Workplace Tips RMM Business Gadget Solid State Drive Proactive Legal User Tips Content Filtering Productivity Social Data storage Business Management Technology Tips Compliance Unified Threat Management Access Control Hacker Point of Sale Web Server Screen Reader Information Relocation Wireless Storage Presentation Identity Paperless Office Managed Services Provider Hosted Solutions Address Office Drones Bring Your Own Device Backup Network Management Machine Learning Utility Computing Administration Wearable Technology Fraud History Alt Codes Cables Windows 10 Digital Signature Travel Managed IT Troubleshooting Vendor Management Tip of the week Experience Undo Users Smart Technology The Internet of Things BDR Cyberattacks Computer MSP Mobile Data Virtual Assistant VoIP Hacking IT Budget Robot Disaster Resistance Analyitcs Wires Crowdsourcing Webcam IT Support Outlook Phishing Smartphones Hackers Internet of Things Business Owner Touchscreen Hiring/Firing Google Maps Digital Error Botnet Mobile Computing Mobile Office Customer Relationship Management Vulnerability Server Management Employer-Employee Relationship Cryptocurrency Lenovo Encryption Networking Identity Theft Network Private Cloud Zero-Day Threat SharePoint Documents Hacks Chromebook Database Avoiding Downtime Malware Geography Risk Management IBM Analytics Computing Infrastructure Cameras Operations Software as a Service Fun How To Techology Data Breach Communication Upgrades Google Calendar Privacy Cleaning Mobile Device Data Backup Lithium-ion Battery Intranet Alert OneNote Automation communications E-Commerce Going Green Microsoft Excel IT service Passwords Unified Communications Maintenance Remote Computing Wasting Time End of Support Printing Update Emoji Cookies Refrigeration Government Files Infrastructure

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code