Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Zero-Day

Tech Term: Zero-Day

You might hear the term “zero-day” when discussing security threats, but do you know what they actually are? A zero-day threat is arguably one of the most devastating and dangerous security issues your business could face, and if you’re not prepared, they could be the end of it.

Continue reading
0 Comments

WARNING: A New Zero-Day Threat is On the Loose

WARNING: A New Zero-Day Threat is On the Loose

Zero-day threats are some of the most dangerous ones out there. What we mean by “zero day” threats are those that have been discovered by hackers before an official patch has been released by the developers, giving them exactly zero days before they are actively exploited in the wild. One of the more dangerous zero-day threats out there at the moment is one that takes advantage of Internet Explorer.

Continue reading
0 Comments

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

Intel recently found itself (once again) in hot water, mere months after many flaws were discovered in the firmware that enables all of their chips to do their job. This time, the issue could have potentially caused a permanent dip in the CPU’s capacity to function properly. This has come to be known as the Meltdown vulnerability.

Continue reading
0 Comments

Your Search Bar Is Now More Secure

Your Search Bar Is Now More Secure

August saw yet another Patch Tuesday designed to resolve security issues in Microsoft products. Out of the 48 vulnerabilities resolved, 15 affected Windows, while 25 were rated as critical, 21 as important, and 27 that allowed for remote code execution. This might sound a little overwhelming, so we’ll try to simplify it a bit--a lot of flaws were fixed, and the majority of them can be considered dangerous for your organization.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

communications Tip of the week Recycling Analyitcs Public Speaking Social Engineering Network iPhone Application Private Cloud Co-managed IT Consumers Bluetooth Backups Data Recovery Cortana Business Technology Telephony Maintenance Avoiding Downtime Humor OneNote Computing Utility Computing Going Green Tech Term Upgrade Virus Asset Tracking Network Security Health Tracking Superfish Workplace Tips Hiring/Firing Company Culture WiFi IT Support Meetings PDF Politics Compliance Office Tips Motherboard Procurement Artificial Intelligence Phone System Cache Productivity Risk Management LiFi Identity Theft IP Address Undo Customer Relationship Management How To Sports SaaS Mobile Device Managment Relocation Passwords Alert Supercomputer Servers Bookmarks Remote Monitoring Training History Error Hosted Solutions Hacks Electronic Medical Records Managed IT Service Microsoft Office Data Warehousing IT Support Save Money Cybercrime Technology Tips Presentation Windows Tech Support Disaster Resistance Remote Workers Virtual Private Network Best Practices Unified Communications Cryptocurrency User Tips Digital Signature Software as a Service Cyber Monday Staff Big Data Competition Mobile Computing Productivity Solid State Drive Telephone Systems Consulting Wi-Fi Language Outsourced IT Blockchain Authorization Augmented Reality Employer-Employee Relationship Lithium-ion Battery Hosted Solution Business Intelligence Microsoft Automation Firefox Saving Money Network Management Safety Cabling Upgrades Microsoft Excel BDR Browser Documents Work/Life Balance User 5G Processors Firewall Virtual Reality Employees Address Travel Administration Alt Codes Authentication Update Alerts Apps Windows 10 Flexibility Distributed Denial of Service Entrepreneur IT Consulting Knowledge Cables Remote Worker Consultation Bring Your Own Device Buisness Infrastructure Staffing Samsung VoIP Applications Privacy Public Cloud Fraud IT service Laptop End of Support Collaboration Retail Office Website Email Nanotechnology Password Hard Disk Drive Virtual Desktop Hard Drives Sync Touchscreen Business Computing Heating/Cooling YouTube Financial Cybersecurity Software Tips Security RMM Gadget Saving Time Disaster Tablet Managed Service Cloud Computing IT Consultant Best Practice Troubleshooting Favorites Statistics Budget USB Security Cameras Google Calendar Hacker Disaster Recovery Project Management Monitoring Innovation Settings Cost Management Modem Emoji Specifications Computer Care IT Technicians Outlook Data loss WannaCry Business Owner Malware Dark Data Bandwidth Help Desk Redundancy Star Wars Business Botnet Data storage Data Software Cooperation Theft Chatbots Current Events Computer Repair Geography Mobile Security Internet of Things Law Enforcement Permissions Mobile Device Management IBM GPS Hackers Wireless Technology Wires Printing Search Patch Management Finance Gadgets Physical Security Cyberattacks High-Speed Internet Information Wearable Technology Digital Payment Identities Comparison Google Wallet Automobile Ransomware Bitcoin Electronic Health Records Legislation Encryption IT Management Monitors Read Only Typing Smartphones Server Identity Websites Refrigeration Downtime Fun Deep Learning Scam Mobile 3D Printing Licensing Customer Service Notifications How To Chrome Android Corporate Profile Social Technology Wireless IT solutions Files Webcam User Error SharePoint Managed IT Hotspot Smart Technology Enterprise Resource Planning Paperless Office Apple Programming Fleet Tracking Google Docs Tip of the Week Mobile Devices Quick Tips Mobile Device Digital Crowdsourcing Hard Drive IT Budget Networking Data Backup CIO HIPAA ROI VPN Managed IT services Google Maps Environment Mobility Internet Exlporer Windows 10 Analytics Managed Services Provider File Sharing BYOD Miscellaneous Mail Merge Connectivity Hacking Administrator VoIP Money Remote Monitoring and Management Enterprise Content Management Save Time Point of Sale App Black Market Mouse Break Fix Holiday Instant Messaging Windows 8 eWaste Legal Machine Learning Education Scary Stories Cameras Black Friday Shortcut Managing Stress Smartphone Smart Tech Domains Virtualization Management Managed Service Provider Migration Internet Vendor Management Lenovo Assessment Google Mobile Office Unsupported Software Vulnerabilities Facebook Access Control Google Drive Chromebook Antivirus The Internet of Things Web Server Human Error Employee-Employer Relationship Marketing Communication Intranet Gmail Cleaning Display Remote Computing Time Management Business Continuity Backup and Disaster Recovery Operations Motion Sickness Proactive IT Multi-Factor Security Data Security Efficiency Data Management Screen Reader Business Management Mirgation Unified Threat Management Document Management IoT Computers Running Cable CCTV Computer Spam Content Filtering Operating System Unified Threat Management Cookies Proactive Halloween WPA3 Vulnerability Computing Infrastructure Mobile Data Development Business Growth G Suite Net Neutrality Healthcare Spyware Twitter Downloads Features Regulations Taxes Writing Phishing Social Networking Data Breach Techology Government Office 365 Network Congestion Experience Printer Technology Laws Storage Word Router Users Small Business Social Media Tech Terms Uninterrupted Power Supply Information Technology Zero-Day Threat Cloud Dark Web Personal Information Drones E-Commerce Recovery Managed IT Services Backup Two-factor Authentication Test IT Services Server Management Permission Conferencing Hardware Trending Robot MSP PowerPoint Piracy

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code