Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Microsoft Fixes 27 Vulnerabilities in Latest Round of Patches

Alert: Microsoft Fixes 27 Vulnerabilities in Latest Round of Patches

In the latest round of security patches released by Microsoft, 27 vulnerabilities were fixed. Affected software includes major titles like Windows, Microsoft Office, Internet Explorer, and the new Edge browser. It’s imperative that you apply these security patches as soon as you can, or else your system will be exposed to some serious threats.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Analytics Productivity Software Tips Fun Tech Terms Network Security Financial Webcam Drones Apps Tip of the Week Customer Service Upgrades Halloween High-Speed Internet BDR Uninterrupted Power Supply Operations Motherboard Gadgets Samsung VoIP Quick Tips Email Connectivity Safety Network Management Virtual Private Network Private Cloud Firefox Licensing ROI Intranet Bluetooth Encryption Business Owner Google Maps Redundancy End of Support Best Practice Tech Term Antivirus Apple Compliance Google IT Support Unified Communications Environment Cleaning Consumers Black Market Google Docs eWaste Heating/Cooling Telephony Dark Data Disaster Information Technology LiFi Proactive IT Hacking Public Speaking User Error Gmail Malware Hosted Solution Health Social Networking SharePoint Government Business Asset Tracking Notifications Business Intelligence Competition Unified Threat Management Internet of Things History Travel Development Alert IT Support Taxes Innovation Virtual Desktop Administration Hotspot Bring Your Own Device Display Security Social Save Money E-Commerce Conferencing Entrepreneur Communication communications Computing Phone System Outlook IT Budget Multi-Factor Security Permissions IT service Save Time Management Outsourced IT Language Cyber Monday Utility Computing Two-factor Authentication Windows 10 IT Technicians Monitors Scam Troubleshooting Operating System Identity Theft Printing IT Management Experience Backups Motion Sickness Specifications Data Breach Electronic Health Records Technology Tips Comparison Assessment Cyberattacks Unsupported Software Automobile Cloud Hacks Crowdsourcing Mobile Computing Writing Address Emoji Browser Chrome PowerPoint Risk Management Help Desk Microsoft Office Techology Workplace Tips Mobile Office Data Small Business Migration Artificial Intelligence Avoiding Downtime Cloud Computing Instant Messaging Vulnerabilities Content Filtering Vendor Management Hardware Miscellaneous VoIP Flexibility Firewall Files Education Hard Drive Infrastructure Time Management Computer Care Internet Twitter Mirgation Search Wireless Technology IBM Mobile Security Router Downtime Software as a Service SaaS Wires Google Drive Social Engineering Password Business Growth Star Wars Humor WannaCry Domains Spam Cybercrime Cortana Shortcut Website Personal Information Analyitcs How To Corporate Profile IP Address Relocation Politics Microsoft Test Phishing Theft Digital Payment Computer Repair Sports Office Tips Big Data Documents Managed Service Cache Employer-Employee Relationship Piracy Tech Support Wearable Technology Mouse Proactive Data Management Cookies BYOD Server Management Consulting Chatbots Processors Electronic Medical Records Enterprise Content Management Co-managed IT Networking Network Congestion Applications Office 365 Finance User Tips Cost Management Wi-Fi Trending Windows Computers Employee-Employer Relationship Work/Life Balance IT solutions Identity Smartphone Recycling Managing Stress Identities Zero-Day Threat Hosted Solutions Google Wallet Superfish Running Cable Law Enforcement Facebook Virtual Reality Legislation Legal Servers Vulnerability Screen Reader Hard Drives Websites Chromebook IoT Sync WiFi Google Calendar Privacy Data Security Cooperation VPN Data Warehousing Hackers Scary Stories OneNote PDF Computer Web Server Best Practices Automation Touchscreen Backup CCTV Consultation Tip of the week Programming Buisness Managed IT services Unified Threat Management Mobile Device Management Business Technology Meetings Hiring/Firing IT Consultant Data Backup Error Laptop Marketing Data storage Spyware Managed Service Provider Dark Web Break Fix Patch Management Cables Tracking Knowledge Microsoft Excel Mobility Managed Services Provider Word Mobile Device Printer Managed IT Remote Monitoring and Management Retail Project Management Disaster Recovery Disaster Resistance 5G Saving Money Customer Relationship Management Virus Mobile HIPAA Training Current Events USB Botnet Technology Laws Downloads App YouTube Software Remote Workers Office The Internet of Things Cabling Wireless Net Neutrality File Sharing Smartphones Tablet Network Monitoring Company Culture Remote Monitoring Managed IT Service Digital Signature Human Error Backup and Disaster Recovery Lenovo Storage Document Management Staff Refrigeration Hard Disk Drive Windows 10 User Machine Learning Mobile Data Authentication Settings Application Access Control Fraud WPA3 Supercomputer Permission Collaboration Cameras Bandwidth Going Green Ransomware Remote Worker Fleet Tracking Mobile Device Managment Paperless Office Favorites Mobile Devices Internet Exlporer Smart Technology Recovery Robot Presentation Read Only Data loss Healthcare Public Cloud Geography Technology Enterprise Resource Planning Holiday Computing Infrastructure Users Administrator RMM Undo Typing Information Deep Learning Saving Time Money Blockchain Cryptocurrency Smart Tech Authorization MSP Nanotechnology Digital Gadget Modem IT Services Mail Merge IT Consulting Data Recovery Solid State Drive Bitcoin Hacker Server Features Upgrade CIO Managed IT Services Productivity Alerts Business Management Lithium-ion Battery GPS 3D Printing Android Regulations Physical Security Point of Sale Windows 8 Distributed Denial of Service Social Media Virtualization Staffing Employees Statistics Efficiency Budget Alt Codes Remote Computing How To Security Cameras G Suite iPhone Cybersecurity Bookmarks Update Business Continuity Maintenance Business Computing Procurement Black Friday Passwords Telephone Systems Augmented Reality

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code