Blog - Triton Technologies
217
blog,,qode-title-hidden,vss_responsive_adv,vss_width_768,hide_top_bar_on_mobile_header,qode-content-sidebar-responsive,transparent_content,qode-theme-ver-14.3,qode-theme-bridge,et-pb-theme-bridge,et_minified_js,et_minified_css,et_divi_builder

You may have heard of compensation agreements for new employees, but for signing up with an IT firm? Triton Technologies prides itself on its many different types of clients, entities, and governmental bodies in which we do work for. Sometimes we are approached with questions or requirements for "compensation agreements"...

Since we became a Cloudflare partner, we’ve been asked multiple times: What is a DDoS? The Rundown on DDoS Attacks A DDoS is a distributed denial of service attack. Years ago when a business needed to get online, they purchased web hosting services through many web hosting companies. It was usually on a...

Why do we recommend a VPN when you have nothing to hide? With the end of net neutrality, ISPs and Internet providers have now free reign to do as they please with on how you receive your data. We’ve already seen it with our commercial clients on how to access their...

A lot of businesses – good or bad – sometimes just shoot from the hip. They make up ideas, policies, and methodologies to suit the immediate need. Sounds good in theory but has very bad scalability. Why IT Policy and Procedure is So Important A Triton technologies we have ex-military for the majority of our...

From time to time, we get clients who wish to purchase their own hardware but have us implement the solution. Most of the time we have no issue with this, but when we encounter a computer that was specifically purchased to save money, knowing that it will alienate the client...

Why terms and conditions matter. It has been proven time and time again that people and companies do not read the terms and conditions when accepting the installation or the acceptance of services from vendors. There are many notable cases including some software companies and vetting the fact that they now...

I am literally writing this blog on January 4, 2018, during what is known as the bomb cyclone. My offices have no power, no Internet; backup batteries have been expended; cellular towers are down. So why am I talking about this on a business blog? Keeping Your Servers Up When the Power...

Good vendors are hard to come by. In 16 years of business, we have dealt with literally hundreds of different vendors. From computer manufacturers, network hardware manufacturers, software, physical developers of infrastructure and more, we can say with certainty that good vendors are very hard to come by. Why We Do Vendor...

Not Even Once. In the last couple months a wireless vulnerability known as KRACK (Key Reinstallation Attack) was discovered. Basically, this exploit takes advantage of how the devices hand off each other’s encryption keys. Most major brands of wireless providers such as like one we use called Ubiquiti were patched within...

Traditionally for many decades computers utilized hard drives that physically moved. Round platters would store our information and read heads would move back and forth to access that information. When it came out, it was revolutionary. But like all good things, time moves on. In the last decade, we have...