Blogs
Knowledge, advice and opinion on IT.

Do Your Homework: 3 Things To Do When Looking for an MSP
Managed IT

Do Your Homework: 3 Things To Do When Looking for an MSP

Thinking of hiring a Managed Service Provider (MSP), but not sure how to go about it? Here are a few things to do before you zero in on one. Continue reading
Read More
VoIP: Three Productivity Advantages
VOIP

VoIP: Three Productivity Advantages

So, what do you get with VoIP (Voice over IP) technology that you can’t get from a PBX (Private Branch Exchange)? Quite a bit, but we will just focus on the productivity aspect of VoIP – ways to turn your office phones into better and more flexible tools to make...
Read More
4 Things to Consider Before Starting a WFH Initiative
Work From Home

4 Things to Consider Before Starting a WFH Initiative

While setting up a Work from Home (WFH) Initiative is a vital part of making your office more resilient – or, in some cases, sustainable such as COVID-19 or during natural disasters. However, there can be significant security, IT, and compliance issues that can arise if you’re just sending employees...
Read More
Contact Centers: How to Avoid Falling Victim to Ransomware
Data Privacy Data Security

Contact Centers: How to Avoid Falling Victim to Ransomware

Contact centers – the modern-day version of call centers that handle email, texting and chat, and other app communication alongside calling – are a critical part of customer relations, marketing, and sales for many businesses and organizations. Due to the amount of information they have on individuals, from contact information...
Read More
Ransomware Attacks are Increasing Against Established Organizations
Data Privacy Data Security

Ransomware Attacks are Increasing Against Established Organizations

When it comes to ransomware, this cyberattack scheme isn't new, but it has become increasingly common over the past several years. Many of the viruses lurking out there steal data to be used for nefarious purposes, with the goal having long been to access important financial and personal data that...
Read More
Three Responses After a Ransomware Attack
Data Privacy Data Security

Three Responses After a Ransomware Attack

Ransomware is a type of computer virus that kidnaps your data and holds it hostage for money. It has become increasingly common, attacking governments and all manner of business as well as non-for profit institutions. If you are unfortunate enough to be the victim of a ransomware attack, there are...
Read More
Ransomware and Disaster Recovery Plans
Back Up and Recovery Data Security

Ransomware and Disaster Recovery Plans

Disaster recovery is a fundamental element of good business continuity planning. Business continuity planning refers to the broad range of plans created so that a business can continue to be operational no matter what negative event might occur. Business continuity planning addresses catastrophic events, from loss of a CEO, director,...
Read More
Hotels are Now The Hottest Ransomware Target
Data Privacy Data Security

Hotels are Now The Hottest Ransomware Target

We have been working with the hospitality industry for quite some time. We've taken what we've learned and applied it to an industry we feel has been under-secured. Rightfully so. Now ransomware is targeting hospitality clients, from small privately-owned hotels and resorts to the biggest chains and names in the...
Read More
Sophos, AT&T and Peplink: Just in Time for the Holidays
Managed IT

Sophos, AT&T and Peplink: Just in Time for the Holidays

As many know, Triton Technologies is a Sophos partner, and we are very happy to be one. From the firewalls, endpoint encryption, and more, we found the Sophos firewall to be the best solution for currently all of our clients' problems. Continue reading
Read More
Ransomware Insurance is Fueling Ransomware
Data Privacy Data Security

Ransomware Insurance is Fueling Ransomware

Why cyber insurance is keeping the ransomware industry in business. As all good managed IT companies and manage security providers do, we are in constant training. From daily check-ins, weekly trainings and monthly seminars, we are kept apprised of the latest trends, threats and how to mitigate them. For us,...
Read More
roomMaster from innQuest Ends Windows 7 Support
Managed IT

roomMaster from innQuest Ends Windows 7 Support

roomMaster is stopping all support for Windows 7Windows 7 officially sunsets on January 14, 2020. We have known this for quite some time and have written about it previously. We have instilled in as many clients as possible the urgency to upgrade. We know some of you do not want...
Read More
New Managed Software Service: Custom Machine Images
Managed IT

New Managed Software Service: Custom Machine Images

Custom images are now available. Over the last couple of years, we have been improving our own internal infrastructure. With that comes great advantages to our clients. One such advantage is custom machine images. What am I talking about? Continue reading
Read More
Cloud, Cloud, Cloud: Why Infrastructure is Going Virtual
Cloud IT

Cloud, Cloud, Cloud: Why Infrastructure is Going Virtual

An increasing trend in our client infrastructure sales as costs plunge. We've said it before and will say it again: everything is going in the cloud. Servers, workstations, environments, virtual private networks are all heading into the cloud. It is very rare for us right now to sell an actual...
Read More
Windows 10: Nothing Like a Last-Minute Upgrade
Managed IT

Windows 10: Nothing Like a Last-Minute Upgrade

Get the hardware needed to upgrade to Windows 10 before it’s too late. The retirement of Windows 7 is going full bore this January 2020. Microsoft has advised multiple times to upgrade to Windows 10. Here at Triton, we have advised clients multiple times to go to Windows 10 as...
Read More
Stop Using Internet Explorer Immediately
Data Security Managed IT

Stop Using Internet Explorer Immediately

The Internet Explorer vulnerability (CVE-2019-1367) is a critical zero-day bug. I mean now, right now, uninstall it – every version of Internet Explorer needs to be removed. On Monday, September 23, Microsoft made an announcement and immediately deployed out-of-band updates for Internet Explorer. This update prevents a script from executing...
Read More
It’s War: How MSPs are Being Targeted
Data Security Managed IT

It’s War: How MSPs are Being Targeted

It's been some time since I made a post, but it needs to be made. There is a war going on. Let me backtrack a bit. At Triton Technologies, we are the gatekeepers, the guardians at the gate, the Heimdall to the kingdoms of our clients. We control all the...
Read More
Website Security: Not all SSL Certificates are Created Equal
Cloud IT Data Security Uncategorized

Website Security: Not all SSL Certificates are Created Equal

For years, people have trusted the SSL certificate green lock on their Google, Firefox, Internet Explorer, edge browser for safety and security.I hate to break it to you, but SSL certificates are broke. The Story of Symantec Security CertificatesIn the early 90s, a famous company called Symantec was handing out security...
Read More
Network Firewall Security: Stop Port Forwarding
Managed IT

Network Firewall Security: Stop Port Forwarding

The Critical Risks of Port Forwarding in Network Security As a leader in managed IT solutions, Triton Technologies emphasizes the grave dangers of port forwarding within network security frameworks. Our mission is to ensure the utmost protection of our clients' networks, but the security risks associated with port forwarding present...
Read More
AWS vs. Azure: Why to Look Beyond the Price Tag
Cloud IT

AWS vs. Azure: Why to Look Beyond the Price Tag

As you may be aware, we are a very AWS oriented shop when it comes to our cloud services. We provision servers, workspaces, EC2 instances, etc., all day long. With our certifications as an AWS Partner, it allows us to concentrate on this single dynamic, powerful platform and perform our...
Read More
6 Ways to Keep Your Business Online in Hurricane Season 2018
Back Up and Recovery Data Security

6 Ways to Keep Your Business Online in Hurricane Season 2018

Welcome to hurricane season 2018! As many of you are aware, hurricane season for 2018 begins June 1 and ends November 30. What does this mean for businesses? Outages, Internet interruptions, server, network, and computer downtime, all of which can translate into a loss of profits. But there are ways...
Read More
Read-Only Fridays: Avoiding Weekend Infrastructure Issues
IT Support Managed IT

Read-Only Fridays: Avoiding Weekend Infrastructure Issues

As we go into the weekend, we would like to introduce you to something in the IT world known as Read-Only Fridays.Read-only Fridays is a term that the IT industry uses for no major changes to any infrastructure when approaching the weekend. The reason why a simple: support hours from...
Read More
How We Deal with Corporate Espionage and Data Breaches
Back Up and Recovery Data Privacy Data Security

How We Deal with Corporate Espionage and Data Breaches

What better way to beat your competition than to know what they are working on and then steal it? What am I talking about? Corporate espionage. Corporate Espionage and Data Breaches Corporate espionage takes many forms, but what we are seeing recently is a tremendous amount of businesses sending in...
Read More
What is DDoS? The Problem and Solutions
Data Privacy Data Security

What is DDoS? The Problem and Solutions

Since we became a Cloudflare partner, we’ve been asked multiple times: What is a DDoS? The Rundown on DDoS Attacks A DDoS is a distributed denial of service attack. Years ago when a business needed to get online, they purchased web hosting services through many web hosting companies. It was...
Read More
Business VPNs and Why You Need One
Data Privacy Data Security

Business VPNs and Why You Need One

Why do we recommend a VPN when you have nothing to hide? With the end of net neutrality, ISPs and Internet providers have now free reign to do as they please with on how you receive your data. We’ve already seen it with our commercial clients on how to access...
Read More
The Methodology Behind IT Policy and Procedure
IT Support

The Methodology Behind IT Policy and Procedure

A lot of businesses – good or bad – sometimes just shoot from the hip. They make up ideas, policies, and methodologies to suit the immediate need. Sounds good in theory but has very bad scalability. Why IT Policy and Procedure is So Important A Triton technologies we have ex-military for the...
Read More
Home Computers Versus Business Computers
Managed IT

Home Computers Versus Business Computers

From time to time, we get clients who wish to purchase their own hardware but have us implement the solution. Most of the time we have no issue with this, but when we encounter a computer that was specifically purchased to save money, knowing that it will alienate the client...
Read More
The Importance of Reading IT Terms and Conditions
IT Support

The Importance of Reading IT Terms and Conditions

Why terms and conditions matter. It has been proven time and time again that people and companies do not read the terms and conditions when accepting the installation or the acceptance of services from vendors. There are many notable cases including some software companies and vetting the fact that they...
Read More
Bomb Cyclone 2018: Cloud Services and Mother Nature
Back Up and Recovery Data Security

Bomb Cyclone 2018: Cloud Services and Mother Nature

I am literally writing this blog on January 4, 2018, during what is known as the bomb cyclone. My offices have no power, no Internet; backup batteries have been expended; cellular towers are down. So why am I talking about this on a business blog? Keeping Your Servers Up When...
Read More
Vendor Management: Good Vendors are Hard to Find
IT Support

Vendor Management: Good Vendors are Hard to Find

Good vendors are hard to come by. In 16 years of business, we have dealt with literally hundreds of different vendors. From computer manufacturers, network hardware manufacturers, software, physical developers of infrastructure and more, we can say with certainty that good vendors are very hard to come by. Why We...
Read More
Don’t Do KRACK: Dealing With WiFi Security Attacks
Data Privacy Data Security

Don’t Do KRACK: Dealing With WiFi Security Attacks

Not Even Once. In the last couple months a wireless vulnerability known as KRACK (Key Reinstallation Attack) was discovered. Basically, this exploit takes advantage of how the devices hand off each other’s encryption keys. Most major brands of wireless providers such as like one we use called Ubiquiti were patched...
Read More