We get a call on Monday morning, like you do, but this one was more panic. The owner went on a week long vacation and came back to a resignation letter sitting on his desk from what was then his previous IT person. In-house person, quit Wednesday the previous week.  The boss was in a panic. So he googled the...

Read More

A Client in Need of a SolutionTriton Technologies does a lot of different kinds of business. Some logistics, medical, hospitality, government, military and more. So we are quite diverse on the types of clients that we work with. We were asked about 3 months ago to install software for an oil distribution company on a new server, tablets and so...

Read More

Dropbox over 4 years ago had a data breach which exposed over 86 million users to hackers. The hackers could have access to the passwords for the accounts, encrypted and unencrypted. We look at data breaches and Dropbox, namely their failure on handling it.  It was 4 years ago. They are just making available the data now. That is a...

Read More

Key Benefits of Partnering with a VoIP ProviderWhen an emergency happens, it’s great to have an MSP (Managed Service Provider) with a VoIP Service. Story Time: 2016 Texas FloodsAbout two months ago, we have a client out of Texas who does financial services for the local populous. Retirement packages, stock trades, trusts for entities etc, etc. Well, if you have been...

Read More

The Benefits of Choosing Ubiquiti for Wireless Access Wifi isn’t complicated. What is complicated is people. For a long time, most small business would go out to their local office supply store, purchase a router, create wifi and give it no password so their patrons could access it without an issue. Those days are long gone. Businesses need to scale and...

Read More

How Acceptable Use Policies Protect Your Business Policy, procedure and process. I was asked recently why do I need a computer policy? The short answer? It’s the law.   Massachusetts 201 CMR 17.00 Compliance In Massachusetts, the law 201.cmr.17 clearly states that a business must have a clear and defined polices when it comes to internet and data access for their employees. To quote the...

Read More

Shared hosting needs to go. What? Yes, we said it and we mean it. What is shared hosting to begin with? Understanding Shared Hosting (And Its Drawbacks) Shared hosting is a service in which on a single server usually at a hosting service that your company and many other companies share. So the resources, memory, CPU and more are literally shared at the...

Read More

Why is Triton Technologies changing firewall vendors? Triton Technologies has been with SonicWALL since 2006 and have implemented thousands of installs throughout the world. The United States, France, Germany, India, Brazil, Mexico, Canada, and more we have sent and more deployed many hundreds of firewalls throughout those countries. But due to unresolved issues, we're changing firewall vendors. But Why the Change? In September...

Read More

The importance of having an IT staff with impeccable backgrounds. In our line of work we have many keys to many kingdoms. That also means that we need to be more secure than all of our clients. That includes not only complex passwords, multi-authentication techniques, tokens and everything is secure. Because of the risk of having breaches within the network not...

Read More
HIPAA Keyboard

HIPAA Mastery for Small Healthcare Firms In the last couple months due to governmental pressures for state and local charities and nonprofits, small medical businesses have been asked to fully comply with HIPAA compliance even if a single machine might one day encounter that information. We are currently working with many translation services, small doctor offices, dentists, and branch offices of hospitals...

Read More