How the lack of a vendor follow-through hurts business. For unknown reasons we are encountering a lot of clients reaching out to us due to a failure of vendor follow-through. Basically, they set up a solution such as a cellular router, printer, security system, or of some variant of the above and it would not get finished or completed. Let's talk...

Read More

Amazon saves the day again and again. We may sound like a broken record, but the solution is solid. What are we talking about? Amazon Web services. Truthfully, if you're in business, you need your head in the cloud now! Client Story: Food Logistics Company A quick example is this, we have a food logistics company that delivers their products throughout the Northeast...

Read More

Triton technologies has expanded our cellular offerings exponentially. A prime example is a law office in a single building in a small town in Massachusetts. Their current coaxial provider had very very poor Internet results. Truthfully they had more outage than they had internet. Multiple node issues, a modem replaced every few weeks, and their phone service. With that provider was...

Read More

It’s been 6 weeks since the last global affecting ransomware attack has occurred. The last attack brought to you by WannaCry affected millions of computers and servers throughout the globe. That attack affected an ancient exploit going all the way back to Windows XP and was stolen from the national security agency. Hackers use that exploit and penetrated systems worldwide generating...

Read More

On Dealing With Ransomware A couple of weeks ago, a worldwide exploit stolen utilities from the National Security Agency were utilized to take down literally hundreds of thousands of computers, from hospitals, government, and large corporations. For days people were freaking out and having a tremendous time securing their networks. Traditional methodologies failed. Traditional thought processes failed. In the days and weeks since...

Read More

Over a month ago, Triton Technologies was given a challenge. The challenge was simple: break our wireless network and you have our security contract. Sounds great in theory, but in reality white hat hacking is a quite complex method and time-consuming. Security Penetration: Break Their Wireless Network We had been trying to acquire this company for years and we knew their shortcomings, insecurity...

Read More