For years, people have trusted the SSL certificate green lock on their Google, Firefox, Internet Explorer, edge browser for safety and security.I hate to break it to you, but SSL certificates are broke. The Story of Symantec Security CertificatesIn the early 90s, a famous company called Symantec was handing out security certificates like free samples of Tide in the mail. Everyone...
Read MoreAs you may be aware, we are a very AWS oriented shop when it comes to our cloud services. We provision servers, workspaces, EC2 instances, etc., all day long. With our certifications as an AWS Partner, it allows us to concentrate on this single dynamic, powerful platform and perform our jobs extremely well. Below is a story of “you get what you pay for” and how a slight increase in cost can lead to a lot of savings when it comes to dealing with issues.
Welcome to hurricane season 2018! As many of you are aware, hurricane season for 2018 begins June 1 and ends November 30. What does this mean for businesses? Outages, Internet interruptions, server, network, and computer downtime, all of which can translate into a loss of profits. But there are ways to mitigate and or to avoid these kinds of situations: this...
Read MoreAs we go into the weekend, we would like to introduce you to something in the IT world known as Read-Only Fridays.Read-only Fridays is a term that the IT industry uses for no major changes to any infrastructure when approaching the weekend. The reason why a simple: support hours from the vast majority of manufacturers are usually Monday through Friday...
Read MoreWhat better way to beat your competition than to know what they are working on and then steal it? What am I talking about? Corporate espionage. Corporate Espionage and Data Breaches Corporate espionage takes many forms, but what we are seeing recently is a tremendous amount of businesses sending in – for lack of better words – spies to their competition and...
Read MoreYou may have heard of compensation agreements for new employees, but for signing up with an IT firm? Triton Technologies prides itself on its many different types of clients, entities, and governmental bodies in which we do work for. Sometimes we are approached with questions or requirements for "compensation agreements" to be met for them to sign on with us. What...
Read MoreSince we became a Cloudflare partner, we’ve been asked multiple times: What is a DDoS? The Rundown on DDoS Attacks A DDoS is a distributed denial of service attack. Years ago when a business needed to get online, they purchased web hosting services through many web hosting companies. It was usually on a single server for the client, shared between multiple other clients...
Read MoreWhy do we recommend a VPN when you have nothing to hide? With the end of net neutrality, ISPs and Internet providers have now free reign to do as they please with on how you receive your data. We’ve already seen it with our commercial clients on how to access their services. A Matter of Priority A prime example is prioritization of the...
Read More