Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Microsoft Fixes 27 Vulnerabilities in Latest Round of Patches

Alert: Microsoft Fixes 27 Vulnerabilities in Latest Round of Patches

In the latest round of security patches released by Microsoft, 27 vulnerabilities were fixed. Affected software includes major titles like Windows, Microsoft Office, Internet Explorer, and the new Edge browser. It’s imperative that you apply these security patches as soon as you can, or else your system will be exposed to some serious threats.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Smart Technology Best Practice 3D Printing Private Cloud Cabling Bandwidth GPS Enterprise Resource Planning Identities Company Culture Office Managed IT Service Innovation Smart Tech Malware Blockchain Outsourced IT Fraud Crowdsourcing Cleaning Security Cameras Cryptocurrency Technology Tips Virtual Reality Chrome Running Cable Unsupported Software Android Hosted Solutions Identity Theft Dark Data Staffing Address Uninterrupted Power Supply Programming Managed IT services Wasting Time Employee-Employer Relationship Error Relocation Emoji Access Control Mobile Office Connectivity Co-managed IT Motherboard Big Data Supercomputer Mouse Botnet History Break Fix Data Management Migration Privacy Unified Communications Mobile Device Applications IT service Collaboration Help Desk Word Retail Electronic Medical Records Tip of the Week Smartphones Modem WiFi Firewall Distributed Denial of Service Apps Gmail Network SharePoint Hacker Dark Web Software Administrator Processors Assessment Productivity Saving Money Two-factor Authentication Cables Politics Alt Codes Tablet Recovery G Suite Geography Unified Threat Management Communication Utility Computing Virtualization USB Business Management Vulnerability Hotspot Consumers Office Tips Business IT Support Licensing Analyitcs Gadget Website Information Technology Chromebook Personal Information Heating/Cooling Phishing Business Continuity Training IT Services Settings Superfish Mobile Data Google Maps Black Market Data Security Outlook Hacking Wires Humor Infrastructure Database Sports Money Automation Deep Learning Files Mail Merge Users IT Support Instant Messaging communications Technology Upgrade Mobile Device Management Unified Threat Management Mobile Security Digital Tech Terms Disaster Recovery VPN Computer Care Management Law Enforcement Technology Laws Miscellaneous Bluetooth Conferencing Router Efficiency Drones Internet of Things Zero-Day Threat Motion Sickness Alerts Backups Networking Software Tips IoT Tip of the week Cooperation Phone System Notes Holiday 5G Favorites Screen Reader Intranet IBM Backup Tech Support Samsung Statistics WPA3 Public Cloud Specifications Current Events Knowledge Virus Web Server Cyber Monday Business Owner Halloween Data loss Internet Exlporer Maintenance Hackers Microsoft Excel Virtual Private Network Windows 8 Patch Management Twitter Project Management Facebook IT Budget Antivirus Windows 10 Techology Marketing Scam Physical Security Content Filtering Data Warehousing Undo Education Network Security Microsoft Office Redundancy Time Management Hacks Google Calendar Saving Time Google Drive Proactive End of Support Fleet Tracking Notifications Productivity Virtual Assistant Employer-Employee Relationship Save Money Mobile Devices Cloud Computing Remote Monitoring and Management Finance Legal Going Green Buisness Data Recovery Business Growth Competition MSP Financial Lithium-ion Battery Social Meetings App User Error Server Management Bitcoin Network Management Multi-Factor Security Authentication Robot Ransomware Domains Data storage Wearable Technology Remote Workers Telephony Monitoring Permissions User Tips Procurement Remote Computing Cookies Downloads CCTV Hiring/Firing Test Websites Hard Drive Work/Life Balance Webcam Hosted Solution Comparison Upgrades SaaS Microsoft Wireless Technology CIO Government Legislation Gadgets Environment Identity Smartphone IT Consulting Mirgation Managed Service Browser Avoiding Downtime Automobile eWaste Documents Password Net Neutrality Writing Encryption Apple OneNote Chatbots Staff VoIP Google Docs Google Wallet Storage Analytics Solid State Drive User Entrepreneur Managing Stress Hard Drives Enterprise Content Management Computer Printing Theft Taxes Data Breach Healthcare IT Consultant Customer Service Wireless Display Operating System Windows 7 Social Media Remote Worker Server Search Machine Learning Business Technology Remote Monitoring Security Wi-Fi Tech Term Nanotechnology Business Intelligence Fun Asset Tracking Managed Service Provider Corporate Profile Customer Relationship Management Permission Passwords Computers Managed Services Provider Cyberattacks Social Networking YouTube Hardware Computing Infrastructure WannaCry Travel How To Vendor Management Quick Tips Bookmarks How To HIPAA Piracy Cache Small Business Shortcut Voice over Internet Protocol BDR Typing Regulations Consulting Cost Management Printer Internet Point of Sale Read Only Development Disaster Recycling Sync Mobility Document Management Professional Services IT Management Consultation RMM Features Black Friday Monitors Disaster Resistance Data Backup Windows 10 Flexibility Presentation Troubleshooting Spyware Backup and Disaster Recovery Health Budget File Sharing Compliance Hard Disk Drive Cloud Alert Laptop iPhone Language Augmented Reality Business Computing E-Commerce Google ROI Tracking Authorization Scary Stories LiFi Spam Computer Repair PDF Save Time Cybersecurity Touchscreen Digital Payment Mobile Device Managment Human Error Data Downtime Update Artificial Intelligence Network Congestion Information Email Telephone Systems Workplace Tips Safety Lenovo Electronic Health Records Firefox Employees Star Wars Managed IT Managed IT Services High-Speed Internet Office 365 Digital Signature Experience Proactive IT Mobile Mobile Computing BYOD Public Speaking IT Technicians Cortana Virtual Desktop Cybercrime IT solutions Vulnerabilities Operations Servers Paperless Office Risk Management The Internet of Things Software as a Service PowerPoint Windows Cameras Application VoIP IP Address Computing Social Engineering Refrigeration Trending Bring Your Own Device Administration Best Practices

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...