Why cyber insurance is keeping the ransomware industry in business.

As all good managed IT companies and manage security providers do, we are in constant training. From daily check-ins, weekly trainings and monthly seminars, we are kept apprised of the latest trends, threats and how to mitigate them. For us, it has worked incredibly well for many years. But a new threat has arisen that we didn’t expect: ransomware insurance from insurance industry.
Read More

The Internet Explorer vulnerability (CVE-2019-1367) is a critical zero-day bug.

I mean now, right now, uninstall it – every version of Internet Explorer needs to be removed. On Monday, September 23, Microsoft made an announcement and immediately deployed out-of-band updates for Internet Explorer. This update prevents a script from executing without any interaction by the user. A simple visit to a website can compromise your computer.
Read More

It’s been some time since I made a post, but it needs to be made.

There is a war going on. Let me backtrack a bit. At Triton Technologies, we are the gatekeepers, the guardians at the gate, the Heimdall to the kingdoms of our clients. We control all the keys, passwords, access, controls, etc. We are entrusted to protect and defend our client’s networks as their managed service provider (MSP) under contract. Someone has taken notice.
Read More

For years, people have trusted the SSL certificate green lock on their Google, Firefox, Internet Explorer, edge browser for safety and security.I hate to break it to you, but SSL certificates are broke. The Story of Symantec Security CertificatesIn the early 90s, a famous company called Symantec was handing out security certificates like free samples of Tide in the mail. Everyone...

Read More

Welcome to hurricane season 2018! As many of you are aware, hurricane season for 2018 begins June 1 and ends November 30. What does this mean for businesses? Outages, Internet interruptions, server, network, and computer downtime, all of which can translate into a loss of profits. But there are ways to mitigate and or to avoid these kinds of situations: this...

Read More
it support near me

What better way to beat your competition than to know what they are working on and then steal it? What am I talking about? Corporate espionage. Corporate Espionage and Data Breaches Corporate espionage takes many forms, but what we are seeing recently is a tremendous amount of businesses sending in – for lack of better words – spies to their competition and...

Read More

Since we became a Cloudflare partner, we’ve been asked multiple times: What is a DDoS? The Rundown on DDoS Attacks A DDoS is a distributed denial of service attack. Years ago when a business needed to get online, they purchased web hosting services through many web hosting companies. It was usually on a single server for the client, shared between multiple other clients...

Read More

Not Even Once. In the last couple months a wireless vulnerability known as KRACK (Key Reinstallation Attack) was discovered. Basically, this exploit takes advantage of how the devices hand off each other’s encryption keys. Most major brands of wireless providers such as like one we use called Ubiquiti were patched within hours if not days. But most of the small businesses...

Read More