Over a month ago, Triton Technologies was given a challenge. The challenge was simple: break our wireless network and you have our security contract. Sounds great in theory, but in reality white hat hacking is a quite complex method and time-consuming. Security Penetration: Break Their Wireless Network We had been trying to acquire this company for years and we knew their shortcomings, insecurity...

Read More

We have received a lot of requests for this and it’s a scorcher. “How do I protect my corporate privacy this day in age?”Let’s Get Right to the Answer: You Can’tAt least not easily. What do we mean? Quite simply this, every company in every country cooperates with the government of that country. From China, to France, UK, Russia and...

Read More

Dropbox over 4 years ago had a data breach which exposed over 86 million users to hackers. The hackers could have access to the passwords for the accounts, encrypted and unencrypted. We look at data breaches and Dropbox, namely their failure on handling it.  It was 4 years ago. They are just making available the data now. That is a...

Read More
HIPAA Keyboard

HIPAA Mastery for Small Healthcare Firms In the last couple months due to governmental pressures for state and local charities and nonprofits, small medical businesses have been asked to fully comply with HIPAA compliance even if a single machine might one day encounter that information. We are currently working with many translation services, small doctor offices, dentists, and branch offices of hospitals...

Read More

Ransomware is the new underground economy. In the last few years, a new breed of exploit has arrived on the scene, called Ransomware. Basically, what it does is encrypts all your files, demands bitcoins or some other crypto currency and waits. It usually has a timer giving you a couple of days to setup an account, transfer the funds and when...

Read More