On Dealing With Ransomware A couple of weeks ago, a worldwide exploit stolen utilities from the National Security Agency were utilized to take down literally hundreds of thousands of computers, from hospitals, government, and large corporations. For days people were freaking out and having a tremendous time securing their networks. Traditional methodologies failed. Traditional thought processes failed. In the days and weeks since...

Read More

Over a month ago, Triton Technologies was given a challenge. The challenge was simple: break our wireless network and you have our security contract. Sounds great in theory, but in reality white hat hacking is a quite complex method and time-consuming. Security Penetration: Break Their Wireless Network We had been trying to acquire this company for years and we knew their shortcomings, insecurity...

Read More

We have received a lot of requests for this and it’s a scorcher. “How do I protect my corporate privacy this day in age?”Let’s Get Right to the Answer: You Can’tAt least not easily. What do we mean? Quite simply this, every company in every country cooperates with the government of that country. From China, to France, UK, Russia and...

Read More

This week we got a new client, and it was a fantastic first meeting that it must be shared. It was a simple 5 person company but they were government funded. I can't reveal much more than that without disclosing what they do. Small but important. On the first meeting, the new director was recommended to us by a friendly competitor of...

Read More

We have a client who absolutely must be online, ALL THE TIME. Are they a stock broker? A police station? Bank? Nope. Solar array farm. Yup, fields, and fields of solar panels. The Power Must Flow Why? Simple. The electric company doesn't tell them when they aren't generating power, and if there is no power being generated, the return on investment of the...

Read More

We had the fun privilege this week of doing a security check for a restaurant. We have agreements with banks, credit card processors and more to analyze a network for security issues or make changes to a client's network because of a new point of sale system to be installed or modifications to existing ones. The Restaurant's Network It was a...

Read More

In the last decade, we have seen something that is somewhat upsetting. Vendor network evaluations are not worth anything. Yup, we said it. From ISPs, printer providers, virtual server providers, email providers and others; all have failed to live up to their engineering personnel's recommendations. It's only after the disaster begins do we see what narrow scope they have been placed in with a...

Read More