Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Reexamining Meltdown and Spectre

Reexamining Meltdown and Spectre

It’s been about a year and a half since the Meltdown and Spectre exploits became publicly known. While patches and updates were administered to reduce their threat, they continue to linger on in a less serious capacity. Of course, this doesn’t mean that the threat has entirely been neutered--you still want to know what these threats do and whether or not you’re safe from them.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Drones Hackers Business Continuity Remote Worker Net Neutrality Vendor Management Virus Hacker Microsoft Office Current Events Tablet Professional Services IoT Distributed Denial of Service Alert Mouse Wireless Website Chrome Remote Computing Disaster Mobile Office Business Technology Storage Saving Time Mobile Data Consumers Electronic Health Records Analyitcs Employees VoIP Lenovo IT Support Project Management Wasting Time Automation History Managed IT services Internet GPS Phishing Users Virtual Assistant Permissions Business Notes Operating System Buisness Presentation Address PDF Google Maps Education Productivity Test Virtual Reality Spyware Computer Company Culture Smart Tech Google Calendar Office 365 BDR Hard Drive Mobile Devices Content Filtering Computer Repair Spam Knowledge Chromebook Windows Customer Service Google Docs Deep Learning Hard Disk Drive File Sharing 3D Printing Personal Information Star Wars Cortana WPA3 Upgrades OneNote Relocation Intranet Business Intelligence Websites CIO Machine Learning Hard Drives Ransomware Alerts Proactive IT Unified Communications Conferencing Patch Management Competition Settings Identity Two-factor Authentication Workplace Tips Outlook Redundancy Tech Term Save Time Government Small Business Techology CCTV Data Warehousing Telephony Business Computing Vulnerability Point of Sale Lithium-ion Battery Money Bring Your Own Device Augmented Reality Encryption WiFi Google Wallet Downtime Supercomputer Virtualization IBM Entrepreneur Apple Google IT Consulting Privacy Upgrade Vulnerabilities Legal Data loss Multi-Factor Security Web Server User Unsupported Software Remote Workers Backups Authorization Disaster Recovery Printing Cybercrime Read Only Productivity Heating/Cooling How To Motherboard Word Physical Security ROI Crowdsourcing Smart Technology Android Microsoft Excel SharePoint Refrigeration Networking Health Mobile Device Management Black Market High-Speed Internet Cameras Collaboration Administration Management Remote Monitoring Law Enforcement Managed IT Services iPhone Voice over Internet Protocol Employee-Employer Relationship Computing Infrastructure Gadget Technology Laws Wires Theft Cloud Computing Server Motion Sickness How To Microsoft Infrastructure Cache Regulations VPN Taxes Application Remote Monitoring and Management Tracking Typing Comparison Virtual Desktop Sync Malware Licensing Zero-Day Threat Uninterrupted Power Supply Scary Stories Shortcut Staff Cyberattacks communications Computing Mobile Device Language Mobile Device Managment Network Management Financial Communication Writing Smartphones Business Owner Cloud Security IT Technicians Software Tips Technology Authentication Hotspot Computer Care Finance IT Management Specifications Network Security Email Flexibility Experience Mobile Security Managed Service Provider Robot Windows 10 Document Management Data Breach Tip of the week Nanotechnology App Humor Servers IT Services Marketing IT solutions BYOD Identities Social Media Samsung Fun Scam Monitors Password Social Engineering Software Hosted Solution Features Hosted Solutions IT Consultant Data Downloads Hiring/Firing Access Control PowerPoint Hacking Quick Tips Instant Messaging Cookies Mobile Server Management Mirgation Backup Customer Relationship Management Travel YouTube Tech Support Corporate Profile Cabling Data Security Piracy Running Cable Digital Tip of the Week Programming Browser Best Practices Cost Management Enterprise Content Management Risk Management Emoji Employer-Employee Relationship Innovation Windows 10 Big Data Data Recovery Undo Bluetooth Router Applications Blockchain Time Management Data storage Firewall Documents Alt Codes Black Friday Search Wireless Technology Digital Payment Mobility Technology Tips Google Drive Asset Tracking Break Fix VoIP WannaCry Solid State Drive Halloween Backup and Disaster Recovery Data Management Managing Stress Permission Superfish Webcam Development Botnet Help Desk Healthcare MSP Domains Artificial Intelligence Meetings Display User Error Business Management Mail Merge Public Speaking Environment SaaS Troubleshooting Saving Money Wearable Technology Procurement Monitoring Cybersecurity Dark Data Cooperation Work/Life Balance Legislation Bookmarks Passwords Holiday eWaste Managed Service Cryptocurrency E-Commerce Automobile Internet Exlporer Internet of Things Analytics Staffing Migration Files Fraud Recycling Mobile Computing Statistics Printer Network Congestion LiFi Chatbots Budget Safety The Internet of Things Compliance Windows 8 Digital Signature Antivirus IT service Gadgets Trending Proactive Retail Twitter Utility Computing Miscellaneous Modem Disaster Resistance End of Support Enterprise Resource Planning Operations Outsourced IT Phone System Bandwidth Office Tips Data Backup Assessment Network Training Information Technology Error Gmail Efficiency Screen Reader Virtual Private Network Managed IT Service Maintenance Telephone Systems 5G Best Practice Administrator Hardware Paperless Office Office Social Networking Social Dark Web User Tips Notifications Identity Theft Wi-Fi G Suite Cyber Monday Politics Managed Services Provider Facebook Tech Terms IT Support Unified Threat Management Save Money Business Growth Touchscreen Update Smartphone Sports Recovery Information Connectivity Private Cloud Software as a Service Going Green Public Cloud Computers IP Address Firefox Hacks Unified Threat Management Cables Bitcoin Managed IT Windows 7 Fleet Tracking Consultation IT Budget Consulting RMM Human Error USB Geography Avoiding Downtime Electronic Medical Records Apps Laptop HIPAA Security Cameras Favorites Processors Database Cleaning Co-managed IT

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...