Stop Using Internet Explorer Immediately

The Internet Explorer vulnerability (CVE-2019-1367) is a critical zero-day bug.

I mean now, right now, uninstall it – every version of Internet Explorer needs to be removed. On Monday, September 23, Microsoft made an announcement and immediately deployed out-of-band updates for Internet Explorer. This update prevents a script from executing without any interaction by the user. A simple visit to a website can compromise your computer. Continue reading Stop Using Internet Explorer Immediately

It’s War: How MSPs are Being Targeted

It’s been some time since I made a post, but it needs to be made.

There is a war going on.

Let me backtrack a bit. At Triton Technologies, we are the gatekeepers, the guardians at the gate, the Heimdall to the kingdoms of our clients. We control all the keys, passwords, access, controls, etc. We are entrusted to protect and defend our client’s networks as their managed service provider (MSP) under contract.

Someone has taken notice. Continue reading It’s War: How MSPs are Being Targeted

Network Firewall Security: Stop Port Forwarding

As a Massachusetts-based company, and as a managed IT provider, we look out for our clients’ best interests all the time. By giving them the best firewall, antivirus, defenses, and technology, we make sure their networks are safely secured and keeping their intellectual property in their control. It’s all part of our managed IT support. However, we can only keep secure what our clients don’t open up intentionally. Hence this blog and its straightforward plea. Continue reading Network Firewall Security: Stop Port Forwarding

AWS vs. Azure: Why to Look Beyond the Price Tag

As you may be aware, we are a very AWS oriented shop when it comes to our cloud services. We provision servers, workspaces, EC2 instances, etc., all day long. With our certifications as an AWS Partner, it allows us to concentrate on this single dynamic, powerful platform and perform our jobs extremely well. Below is a story of “you get what you pay for” and how a slight increase in cost can lead to a lot of savings when it comes to dealing with issues. Continue reading AWS vs. Azure: Why to Look Beyond the Price Tag

6 Ways to Keep Your Business Online in Hurricane Season 2018

Welcome to hurricane season 2018!

As many of you are aware, hurricane season for 2018 begins June 1 and ends November 30. What does this mean for businesses? Outages, Internet interruptions, server, network, and computer downtime, all of which can translate into a loss of profits. But there are ways to mitigate and or to avoid these kinds of situations: this blog will go over six services and procedures that can be easily implemented, especially when a managed service provider helps out.

1. First and Foremost: Online Backups

We at Triton Technologies have multiple backup programs and multiple backup methods to fit different sized companies and budgets. Make sure to have some form of data backup to avoid losing it all.

Datto Backup Disaster Recovery

We recommend for most small businesses a company called Datto. Datto has a device known as a BDR (Backup Disaster Recovery) that sits on your local network, images your server, and then send that data off-site. Every day it generates a boot image that shows not only that your server has been backed up, but can be virtualized into a new physical platform, or be transferred to the cloud.

Direct MSP Solutions

The second method that we recommend is from Triton Technologies directly, which is our imaging software which takes a full image of your server and sent it off-site. It may interrupt your Internet during the day as it sends the files off-site, but it is very effective and customizable service.

2. Have Smart Battery Backup Units

We do not recommend standard backups, but instead smart backups. A smart backup actually has a piece of hardware built into it that cleans the sine wave (the “alternating” in alternating current) of the electrical grid. With storms, electrical, and more causing havoc, you need something that not just only keeps your hardware from crashing in the event of a power outage, but actually cleans and stabilizes the electrical delivery.

3. Have a Second Means of Internet

We recommend using a company called Peplink and their BR1 mini cellular modems as a backup for your primary ISP. In the event that an outage occurs with your Internet provider, this cellular uplink will give you basic Internet, so you can get back online. It is unknown when your Internet could go down, but with the right firewall such as a Sophos, the switch between connections can be done automatically. Since the BR1 MINI can auto change and can have multiple service providers, there is no reason to not utilize both services keep you fully operational with a seamless transition.

4. Use the Cloud Wherever You Can

Since many data centers are somewhat isolated from weather events or are heavily fortified, you should utilize those resources as much as possible. Servers, workspaces, and entire digital infrastructures can and should be replicated to the cloud in the event a catastrophe occurs. There are many options for hybrid infrastructure to prevent any kind of loss of data, and small businesses with the right firewalls and antivirus can use these systems and stay safe.

5. Use Cloud-Based Phone Systems

Most phone systems are actually already cloud-based – it’s just a matter of adjusting traditional phone systems to match. New phone systems can be deployed quickly and easily in advance. Do not wait until after your phone system has completely collapsed to forward and/or establish a cloud-based service; their priority to restore infrastructure will overtake your demand for new service.

6. Take Care of Yourself

This has nothing to do with technology, but it’s important to put the life of yourself, your family, and your employees first. Keep a hurricane preparedness kit on hand, at least three days of food and water for every person, have a battery operated and/or hand-crank radio, flashlights, batteries, and more in the event of a hurricane. Check out’s Build a Kit page for more details. Acquisition of all of these things is far easier, cheaper, and faster if done ahead of time.

Being prepared for natural disasters will save your company’s data, time, and money only if you plan ahead. The above isn’t just true for hurricanes, but also for blizzards, floods, and other natural disasters. To learn more about disaster-proofing your business, contact Triton Technologies today.

Read-Only Fridays: Avoiding Weekend Infrastructure Issues

As we go into the weekend, we would like to introduce you to something in the IT world known as Read-Only Fridays.

What are Read-Only Fridays?read only fridays, managed IT, network support, weekend support

Read-only Fridays is a term that the IT industry uses for no major changes to any infrastructure when approaching the weekend. The reason why a simple: support hours from the vast majority of manufacturers are usually Monday through Friday from 8 AM to 5 PM. With all products and all services come bugs and issues. The worst time to encounter a bug or an issue is when you do not have the support and/or cannot be fixed quickly.

Practicing Read-Only Fridays

So, we practice at Triton technologies known as read-only Fridays. This helps our clients go into the weekend, keep their infrastructure up operational, and provide them the level of support in which they need. This keeps their business running through the weekend.

With read-only Fridays, we handle small tickets, minor repairs, and so forth, but no major changes. It really improves the experience that our clients receive when it comes to their network and productivity. By holding back large projects until full support can be obtained, which keeps a lot of businesses up and running without worrying about mid-weekend issues it saves a lot of frustration.

You’d be surprised how effective read-only Fridays are when it comes to managing network infrastructure.

If in major infrastructure change needs to happen on a Friday, it is well-planned. Reasons could be many such as medical, the public, or when the vendor is only available for after-hours support. Luckily for us, they are few and far between.

Infrastructure changes usually happen on a Tuesday through Thursday. Vendors and manufacturers are usually flooded on Mondays with requests over the weekend. This is why read-only Fridays are fantastic and we should only begin major infrastructure changes on a Tuesday to allow us to get the maximum support benefit from our vendors.

How We Deal with Corporate Espionage and Data Breaches

What better way to beat your competition than to know what they are working on and then steal it? What am I talking about? Corporate espionage.

Corporate Espionage and Data Breaches

Corporate espionage takes many forms, but what we are seeing recently is a tremendous amount of businesses sending in – for lack of better words – spies to their competition and stealing their data. In the last four months, we have been finding with new and existing clients, employees – new hires, subcontractors, and even long-standing employees – being paid by that firm’s competitors to steal their data (which also triggers a potential data breach).

What Managed Service Providers are Seeing

As a managed provider we watch over your network, systems, data, security and more and that includes watching who has access to what and to what systems. Many times, we catch it blatantly happening, such as somebody’s trying to get a USB drive connected in, a tremendous amount of data going through the corporate databases, and/or emails that should not have been sent by employees.

What we’ve also been seeing is a rise in the demand for business owners to prevent these kinds of actions from occurring, while making it seamless within the network.

Implementing Sophos Intercept X and Reflexions

To help business owners keep their secrets, we have begun full-blown implementation of the Sophos Intercept X endpoint protection client. This endpoint client allows not only prevents viruses and malware, but also encrypts hard drives, provides DLP (data loss prevention), and more. It also allows it to seamlessly encrypt and decrypt files based on the local network. So an employee who is working on Word, Excel, and other types of documents can open and close a document or file with ease, but if they copy it to a flash drive, send by email, or use a filesharing service, the file will be encrypted the entire way through, making it useless to would-be spies.

Utilizing Sophos Reflexions, we can monitor all email traffic to and from a network, provide logs, evidence, and monitor who is communicating with the what business for your day-to-day operations. It has been fantastic and instrumental in helping multiple clients see where their leaks were.

Why We Recommend Sophos

Sophos has been a leader in DLP protection, firewalls, encryption, and endpoint management and we cannot say enough good things about them. Business owners who need to secure their intellectual property, their secrets, methodologies should look at implementing a Sophos-based infrastructure.

Here are Triton Technologies we recommend Sophos alongside procedures and managed IT services to improve your cyber security and prevent corporate espionage and data breaches. Want to learn how to get these systems seamlessly implemented at your business? Contact us today.

Compensation, Sign Up Bonuses, Kickbacks: Why We Don’t Play

You may have heard of compensation agreements for new employees, but for signing up with an IT firm? Triton Technologies prides itself on its many different types of clients, entities, and governmental bodies in which we do work for. Sometimes we are approached with questions or requirements for “compensation agreements” to be met for them to sign on with us.

What am I talking about?

For Lack of a Better Term, Kickbacks

Some businesses like to compensate new clients with a bonus or discount. You’ve all probably experiences at least one instance of this. For IT and MSPs, this could compensate the signing company with free computers, hardware, software, or for lack of a better term some sort of “kickback” to the company for signing up with them. Think “open an account for a free toaster” but instead it’s a new laptop.

Triton Doesn’t Believe in This

Due to our many contractual obligations, training, certifications, and more: we can never do that. Companies such as Cisco, Hewlett-Packard, Microsoft, Adobe explicitly prohibit any kind of onboarding payment compensation exploitation. At Triton, we are above the board when it comes to our clients. We believe that we have the best pricing, technicians, certifications, and partnerships throughout the industry to provide our many clients solutions.

The bonuses, compensation, and more may seem tempting, but if the company is fantastic, there is no need for a sign-on bonus. We believe the best signing bonus is a company that is ready to help solve your problems and that has the tools and staff to do so. We are very proud of the fact that we do not need such a bonus. And even without  our relationships, partnerships, and agreements that prohibit such behaviors, we would never have one. Contact us today to learn more.

What is DDoS? The Problem and Solutions

Since we became a Cloudflare partner, we’ve been asked multiple times: What is a DDoS?

The Rundown on DDoS Attacks

A DDoS is a distributed denial of service attack.

Years ago when a business needed to get online, they purchased web hosting services through many web hosting companies. It was usually on a single server for the client, shared between multiple other clients depending on how the request into the machine. At the time most servers were capable of handling the load of a lot of requests, sometimes in the hundreds, if not thousands per second.

Now comes along somebody you made an enemy with. Knowing the capacity of your server, they would then utilize hundreds, thousands, or millions of compromised machines in a coordinated attack to overload your server online. This caused your business to suffer online, drop off search engines, and prevent your business from being accessible and communicating online. Email, web, DNS, and even name registrars were not immune to this attack. They were very common about 10 to 15 years ago.

Cloudflare and Other CDNs

Now, where does Cloudflare come in?

Cloudflare is what is known as a CDN. A CDN is a content delivery network. A content delivery network delivers content in a distributed manner to those who request it. In its most basic form, they have hundreds if not thousands of servers acting as one to satisfy the content request for someone requesting it. That basically means that you have dozens of data centers to handle any number of content requests easily. One of the greatest strengths of this content delivery network is the ability to mitigate DDoS. Since hundreds if not millions of servers are handling requests promptly, your website, the content isn’t compromised, and you can still be productive in your day-to-day operations.

There are many other features with the Cloudflare CDN, but the biggest one is mitigation of distributed denial of service attacks. For businesses that need to be number one on the Google page ranks, being or Yahoo, a CDN is required. Want to learn more about CDNs? Check out our other blog, Denial of Service Attacks and CDNs like Cloudflare. Want to get started? Then contact Trition Technologies so we can talk more about proactive website security and IT support.