Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Move By Google Spells Doom for Adobe Flash

This Move By Google Spells Doom for Adobe Flash

In light of a recent zero-day vulnerability discovered with Adobe Flash, along with the wide adoption of the alternative rich media player HTML5, Google has put into motion plans to stop supporting Flash for its popular web browser, Google Chrome. By all accounts, this move may be the final nail in the coffin for the Internet stalwart, which means that your business should cease using it.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Google Drive IP Address Relocation Bluetooth Techology Vulnerabilities Malware IoT IT Consulting Read Only Operations PowerPoint Windows Google Docs Computer Care Files Content Filtering Disaster Recovery Data Breach Mobile Device Procurement Augmented Reality Undo Networking Motion Sickness Managing Stress Data loss Display Servers High-Speed Internet Company Culture Big Data Email Internet Mobile Computing Superfish Application Social Media Quick Tips Data Backup Search Remote Computing Managed IT Services Virus Employer-Employee Relationship Legislation Running Cable Documents MSP Websites Risk Management SaaS Operating System Managed IT services G Suite communications Apps Utility Computing Best Practice Tip of the Week Computer IT Budget BYOD Alert VPN Human Error Word Cybercrime Workplace Tips Specifications The Internet of Things Wires Laptop WPA3 Modem Technology Laws Best Practices Update Domains Solid State Drive Supercomputer Entrepreneur iPhone Smartphone Telephone Systems Data Security User Vulnerability Office 365 Chromebook Migration HIPAA 5G Assessment Break Fix Customer Relationship Management Sports Gmail Black Friday Monitors Virtual Private Network Software Processors Bookmarks Mobile Security Work/Life Balance Comparison Network Security Going Green Touchscreen IT Services Recycling Efficiency Computing GPS Digital Data Recovery Asset Tracking Legal Refrigeration Computer Repair Regulations Website Vendor Management Encryption Development Wi-Fi Mobile Devices Cleaning Technology Cookies Maintenance Technology Tips Hardware Unified Communications Router Mobile Device Managment End of Support Mouse Business Computing Address Humor Ransomware Digital Payment Antivirus Proactive Cost Management Business Growth Privacy Save Time Telephony Uninterrupted Power Supply Project Management Cameras File Sharing Consumers Storage Google Wallet Staff Private Cloud Social Networking Password Managed IT Statistics Motherboard Google Maps How To Data storage Managed Service Provider Disaster Resistance Twitter USB Retail Printing Social Engineering Lithium-ion Battery Business Technology Current Events Mobile Consulting Internet Exlporer VoIP Upgrades Robot Tech Term Managed Services Provider Politics Chrome Virtual Reality Fleet Tracking Scary Stories Alerts Test Upgrade Wireless Typing Cloud Analyitcs SharePoint Cables Writing History Buisness Firefox Net Neutrality Digital Signature Sync Budget Data Management Android Error Hard Disk Drive Halloween Artificial Intelligence LiFi Scam Monitoring Small Business Automation Paperless Office Public Cloud Information Redundancy Taxes Office Google Hiring/Firing Chatbots Remote Workers Outsourced IT Browser Law Enforcement Tip of the week Drones Gadgets Electronic Medical Records Nanotechnology Spam Wearable Technology Hosted Solutions RMM Employees Patch Management Mirgation Disaster Finance Network Tech Terms Programming Mobility Authentication Document Management Hosted Solution Time Management Instant Messaging Shortcut Notifications Server Cryptocurrency Personal Information Information Technology Permission Avoiding Downtime Emoji Identity Theft Physical Security Education Zero-Day Threat Hard Drive Virtualization Training Multi-Factor Security Heating/Cooling Mobile Device Management Fun Intranet Mail Merge Firewall Managed Service Tech Support Mobile Data Health Enterprise Resource Planning Cabling Infrastructure Outlook Microsoft Office Recovery CCTV Safety Data Warehousing Experience Computers Smart Technology Star Wars Hacking How To Bring Your Own Device Phone System Apple IT solutions Saving Money Unsupported Software Security Cameras Blockchain Printer Cyber Monday Phishing Fraud Hackers Employee-Employer Relationship Business Continuity Productivity Smartphones Windows 10 Backups Downloads Healthcare Access Control Favorites Customer Service OneNote Hard Drives Electronic Health Records Smart Tech Enterprise Content Management User Error Unified Threat Management Administrator Settings Corporate Profile YouTube Tablet Virtual Desktop Saving Time WannaCry Mobile Office Trending Automobile Management Google Calendar Downtime CIO Connectivity Analytics Co-managed IT Bitcoin Dark Web Geography Knowledge Cache Two-factor Authentication Proactive IT Botnet Consultation Cyberattacks Backup Remote Monitoring Presentation Internet of Things Alt Codes Save Money eWaste IT Management IBM Licensing Distributed Denial of Service Miscellaneous Competition Data Permissions E-Commerce IT Support Government Server Management Office Tips Business Owner Identities Users Conferencing Productivity Network Congestion IT Support IT service Flexibility App Facebook Theft Money Bandwidth Machine Learning Help Desk Network Management Wireless Technology Travel Cortana Web Server Dark Data Software Tips Tracking PDF Administration IT Consultant Crowdsourcing Language WiFi Meetings Piracy Social Lenovo 3D Printing Managed IT Service Holiday Cooperation User Tips Black Market Identity Backup and Disaster Recovery Samsung Features Business Intelligence Staffing Computing Infrastructure Gadget Remote Monitoring and Management Hacks IT Technicians Innovation ROI Software as a Service BDR Remote Worker Spyware Cybersecurity Applications Business Windows 8 Hotspot Security Troubleshooting Environment Authorization Screen Reader Point of Sale Communication Passwords Windows 10 Unified Threat Management Collaboration Compliance Cloud Computing Microsoft Excel VoIP Deep Learning Webcam Marketing Microsoft Hacker Financial Public Speaking Business Management

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...