Thinking of hiring a Managed Service Provider (MSP), but not sure how to go about it? Here are a few things to do before you zero in on one. Continue reading
So, what do you get with VoIP (Voice over IP) technology that you can’t get from a PBX (Private Branch Exchange)? Quite a bit, but we will just focus on the productivity aspect of VoIP – ways to turn your office phones into better and more flexible tools to make...
While setting up a Work from Home (WFH) Initiative is a vital part of making your office more resilient – or, in some cases, sustainable such as COVID-19 or during natural disasters. However, there can be significant security, IT, and compliance issues that can arise if you’re just sending employees...
Contact centers – the modern-day version of call centers that handle email, texting and chat, and other app communication alongside calling – are a critical part of customer relations, marketing, and sales for many businesses and organizations. Due to the amount of information they have on individuals, from contact information...
When it comes to ransomware, this cyberattack scheme isn't new, but it has become increasingly common over the past several years. Many of the viruses lurking out there steal data to be used for nefarious purposes, with the goal having long been to access important financial and personal data that...
Ransomware is a type of computer virus that kidnaps your data and holds it hostage for money. It has become increasingly common, attacking governments and all manner of business as well as non-for profit institutions. If you are unfortunate enough to be the victim of a ransomware attack, there are...
Disaster recovery is a fundamental element of good business continuity planning. Business continuity planning refers to the broad range of plans created so that a business can continue to be operational no matter what negative event might occur. Business continuity planning addresses catastrophic events, from loss of a CEO, director,...
We have been working with the hospitality industry for quite some time. We've taken what we've learned and applied it to an industry we feel has been under-secured. Rightfully so. Now ransomware is targeting hospitality clients, from small privately-owned hotels and resorts to the biggest chains and names in the...
As many know, Triton Technologies is a Sophos partner, and we are very happy to be one. From the firewalls, endpoint encryption, and more, we found the Sophos firewall to be the best solution for currently all of our clients' problems. Continue reading
Why cyber insurance is keeping the ransomware industry in business. As all good managed IT companies and manage security providers do, we are in constant training. From daily check-ins, weekly trainings and monthly seminars, we are kept apprised of the latest trends, threats and how to mitigate them. For us,...
roomMaster is stopping all support for Windows 7Windows 7 officially sunsets on January 14, 2020. We have known this for quite some time and have written about it previously. We have instilled in as many clients as possible the urgency to upgrade. We know some of you do not want...
Custom images are now available. Over the last couple of years, we have been improving our own internal infrastructure. With that comes great advantages to our clients. One such advantage is custom machine images. What am I talking about? Continue reading
An increasing trend in our client infrastructure sales as costs plunge. We've said it before and will say it again: everything is going in the cloud. Servers, workstations, environments, virtual private networks are all heading into the cloud. It is very rare for us right now to sell an actual...
Get the hardware needed to upgrade to Windows 10 before it’s too late. The retirement of Windows 7 is going full bore this January 2020. Microsoft has advised multiple times to upgrade to Windows 10. Here at Triton, we have advised clients multiple times to go to Windows 10 as...
The Internet Explorer vulnerability (CVE-2019-1367) is a critical zero-day bug. I mean now, right now, uninstall it – every version of Internet Explorer needs to be removed. On Monday, September 23, Microsoft made an announcement and immediately deployed out-of-band updates for Internet Explorer. This update prevents a script from executing...
It's been some time since I made a post, but it needs to be made. There is a war going on. Let me backtrack a bit. At Triton Technologies, we are the gatekeepers, the guardians at the gate, the Heimdall to the kingdoms of our clients. We control all the...
For years, people have trusted the SSL certificate green lock on their Google, Firefox, Internet Explorer, edge browser for safety and security.I hate to break it to you, but SSL certificates are broke. The Story of Symantec Security CertificatesIn the early 90s, a famous company called Symantec was handing out security...
The Critical Risks of Port Forwarding in Network Security As a leader in managed IT solutions, Triton Technologies emphasizes the grave dangers of port forwarding within network security frameworks. Our mission is to ensure the utmost protection of our clients' networks, but the security risks associated with port forwarding present...
As you may be aware, we are a very AWS oriented shop when it comes to our cloud services. We provision servers, workspaces, EC2 instances, etc., all day long. With our certifications as an AWS Partner, it allows us to concentrate on this single dynamic, powerful platform and perform our...
Welcome to hurricane season 2018! As many of you are aware, hurricane season for 2018 begins June 1 and ends November 30. What does this mean for businesses? Outages, Internet interruptions, server, network, and computer downtime, all of which can translate into a loss of profits. But there are ways...
As we go into the weekend, we would like to introduce you to something in the IT world known as Read-Only Fridays.Read-only Fridays is a term that the IT industry uses for no major changes to any infrastructure when approaching the weekend. The reason why a simple: support hours from...
What better way to beat your competition than to know what they are working on and then steal it? What am I talking about? Corporate espionage. Corporate Espionage and Data Breaches Corporate espionage takes many forms, but what we are seeing recently is a tremendous amount of businesses sending in...
Since we became a Cloudflare partner, we’ve been asked multiple times: What is a DDoS? The Rundown on DDoS Attacks A DDoS is a distributed denial of service attack. Years ago when a business needed to get online, they purchased web hosting services through many web hosting companies. It was...
Why do we recommend a VPN when you have nothing to hide? With the end of net neutrality, ISPs and Internet providers have now free reign to do as they please with on how you receive your data. We’ve already seen it with our commercial clients on how to access...
A lot of businesses – good or bad – sometimes just shoot from the hip. They make up ideas, policies, and methodologies to suit the immediate need. Sounds good in theory but has very bad scalability. Why IT Policy and Procedure is So Important A Triton technologies we have ex-military for the...
From time to time, we get clients who wish to purchase their own hardware but have us implement the solution. Most of the time we have no issue with this, but when we encounter a computer that was specifically purchased to save money, knowing that it will alienate the client...
Why terms and conditions matter. It has been proven time and time again that people and companies do not read the terms and conditions when accepting the installation or the acceptance of services from vendors. There are many notable cases including some software companies and vetting the fact that they...
I am literally writing this blog on January 4, 2018, during what is known as the bomb cyclone. My offices have no power, no Internet; backup batteries have been expended; cellular towers are down. So why am I talking about this on a business blog? Keeping Your Servers Up When...
Good vendors are hard to come by. In 16 years of business, we have dealt with literally hundreds of different vendors. From computer manufacturers, network hardware manufacturers, software, physical developers of infrastructure and more, we can say with certainty that good vendors are very hard to come by. Why We...
Not Even Once. In the last couple months a wireless vulnerability known as KRACK (Key Reinstallation Attack) was discovered. Basically, this exploit takes advantage of how the devices hand off each other’s encryption keys. Most major brands of wireless providers such as like one we use called Ubiquiti were patched...