Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Zero-Day

Tech Term: Zero-Day

You might hear the term “zero-day” when discussing security threats, but do you know what they actually are? A zero-day threat is arguably one of the most devastating and dangerous security issues your business could face, and if you’re not prepared, they could be the end of it.

Continue reading
0 Comments

WARNING: A New Zero-Day Threat is On the Loose

WARNING: A New Zero-Day Threat is On the Loose

Zero-day threats are some of the most dangerous ones out there. What we mean by “zero day” threats are those that have been discovered by hackers before an official patch has been released by the developers, giving them exactly zero days before they are actively exploited in the wild. One of the more dangerous zero-day threats out there at the moment is one that takes advantage of Internet Explorer.

Continue reading
0 Comments

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

Intel recently found itself (once again) in hot water, mere months after many flaws were discovered in the firmware that enables all of their chips to do their job. This time, the issue could have potentially caused a permanent dip in the CPU’s capacity to function properly. This has come to be known as the Meltdown vulnerability.

Continue reading
0 Comments

Your Search Bar Is Now More Secure

Your Search Bar Is Now More Secure

August saw yet another Patch Tuesday designed to resolve security issues in Microsoft products. Out of the 48 vulnerabilities resolved, 15 affected Windows, while 25 were rated as critical, 21 as important, and 27 that allowed for remote code execution. This might sound a little overwhelming, so we’ll try to simplify it a bit--a lot of flaws were fixed, and the majority of them can be considered dangerous for your organization.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Computing Black Friday Techology Features Refrigeration Office Tips Healthcare Typing Staff Apps Bring Your Own Device Private Cloud IBM Cooperation Cameras Help Desk Wires Processors Mobile Devices Smart Technology Health Mobile Paperless Office Files Identities Notes Knowledge Finance Operations PDF Antivirus SharePoint Disaster Recovery Digital Signature Compliance Data Warehousing Saving Time Mobile Computing Tech Support Instant Messaging Virus How To Authorization Mobility IT service Infrastructure Gmail IT solutions IT Support Cleaning RMM Halloween Data Breach Theft Wireless Content Filtering Company Culture Robot Vendor Management Taxes Virtualization Technology Laws BDR Consulting Customer Service Augmented Reality Risk Management GPS Drones Personal Information Customer Relationship Management MSP YouTube Environment Remote Worker Holiday Read Only Zero-Day Threat Network Congestion Computers User Data Backup IT Consultant Hiring/Firing Wireless Technology Cybersecurity 5G The Internet of Things Hotspot VoIP eWaste Display Managed IT Services Artificial Intelligence Permissions How To App Web Server Solid State Drive Server Alerts Managed IT Identity Professional Services Travel Law Enforcement Cables Browser Windows 10 Social Media Work/Life Balance BYOD Writing Experience Retail Motion Sickness Workplace Tips Google Wallet Government Digital Consultation Flexibility Black Market Troubleshooting Managed Service Emoji Corporate Profile Relocation Data Entrepreneur Hackers Time Management Tip of the Week Webcam Disaster Ransomware Communication Cryptocurrency Data Recovery CIO Best Practice Staffing Phishing Computer Word Business Management IT Support G Suite Software Tips Mobile Device Phone System Windows 10 Physical Security Wasting Time Remote Monitoring Vulnerability Voice over Internet Protocol Microsoft Excel Search Samsung Programming Windows 7 Licensing Humor Star Wars Miscellaneous Information Cloud Smartphones Managed IT services Lenovo Gadget Public Cloud Microsoft Comparison Google Maps Mobile Security Automation Redundancy Hard Disk Drive WiFi Remote Workers Blockchain Fraud Telephone Systems Productivity Nanotechnology Virtual Assistant Outsourced IT Bitcoin Data loss Collaboration Firefox Employees Tablet Break Fix Conferencing Laptop Dark Data Saving Money Multi-Factor Security Hacking Websites VoIP Avoiding Downtime Two-factor Authentication User Error Automobile Undo Network Assessment Small Business Tip of the week Cybercrime Operating System Internet Exlporer Software as a Service Save Time Statistics Proactive IT Machine Learning Mirgation Buisness Social Training Hardware Regulations Enterprise Resource Planning Trending Business Growth Human Error Alt Codes Computer Care Screen Reader iPhone Chromebook Mail Merge Tracking LiFi Cortana Mobile Device Managment Crowdsourcing Unsupported Software Cabling Administration Identity Theft End of Support Administrator Downtime Running Cable communications Innovation Financial Recovery Networking Social Networking Electronic Medical Records Windows Passwords Monitors Virtual Reality Productivity User Tips Privacy Co-managed IT Computing Infrastructure IT Services Marketing Microsoft Office Patch Management Address CCTV Internet of Things IoT Internet Printing Bookmarks Business Computing Heating/Cooling Geography 3D Printing Supercomputer Google Docs Electronic Health Records Email Language Tech Terms Windows 8 Business Intelligence Office Presentation Utility Computing Encryption Network Security Mobile Office Efficiency Proactive Smartphone Server Management Business Technology Procurement Wi-Fi Legal Politics Hosted Solution Business Cache Error OneNote Modem Distributed Denial of Service Unified Communications IT Consulting Servers Security Net Neutrality Motherboard Gadgets Social Engineering Deep Learning Hosted Solutions Storage Uninterrupted Power Supply Google Save Money Monitoring Vulnerabilities Employee-Employer Relationship Budget Backup and Disaster Recovery Touchscreen Android IT Budget Google Drive Twitter Settings Smart Tech Business Continuity WPA3 Migration Virtual Private Network Safety Hard Drives Cyberattacks Remote Monitoring and Management Botnet USB Current Events SaaS Password Scam Managing Stress Project Management Google Calendar Sports Chatbots Fun Shortcut Management Bandwidth Going Green Software Sync Lithium-ion Battery Data Security History Bluetooth Mobile Data Chrome Technology Dark Web Telephony Superfish Hacks Permission High-Speed Internet Firewall Hacker Meetings Cyber Monday Technology Tips Access Control Big Data Development Apple Network Management Backup Managed Service Provider Downloads Cost Management Public Speaking Fleet Tracking Virtual Desktop Legislation Analyitcs Upgrades Money Unified Threat Management Favorites WannaCry Malware Security Cameras Specifications Router Connectivity Education Wearable Technology Backups Mouse Best Practices Unified Threat Management VPN Remote Computing Users Competition Outlook Recycling PowerPoint Tech Term Consumers Cloud Computing Office 365 File Sharing Hard Drive Business Owner Documents Notifications IT Management Printer Mobile Device Management IP Address Test Spam Piracy Digital Payment Scary Stories Asset Tracking Cookies Managed IT Service Facebook Enterprise Content Management Database E-Commerce ROI Point of Sale Disaster Resistance Applications Analytics Website IT Technicians Application Alert Update Managed Services Provider Document Management Data Management Domains HIPAA Intranet Information Technology Computer Repair Employer-Employee Relationship Upgrade Data storage Quick Tips Spyware Maintenance Authentication

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code