Not Even Once. In the last couple months a wireless vulnerability known as KRACK (Key Reinstallation Attack) was discovered. Basically, this exploit takes advantage of how the devices hand off each other’s encryption keys. Most major brands of wireless providers such as like one we use called Ubiquiti were patched within hours if not days. But most of the small businesses...

Read More

On Dealing With Ransomware A couple of weeks ago, a worldwide exploit stolen utilities from the National Security Agency were utilized to take down literally hundreds of thousands of computers, from hospitals, government, and large corporations. For days people were freaking out and having a tremendous time securing their networks. Traditional methodologies failed. Traditional thought processes failed. In the days and weeks since...

Read More

Over a month ago, Triton Technologies was given a challenge. The challenge was simple: break our wireless network and you have our security contract. Sounds great in theory, but in reality white hat hacking is a quite complex method and time-consuming. Security Penetration: Break Their Wireless Network We had been trying to acquire this company for years and we knew their shortcomings, insecurity...

Read More

Why We Fight CryptoLocker: Our Strategy Explained As the owner of Triton Technologies, I go through constant training when it comes to MSP services, products and support methodologies. I was at a conference in Hartford Connecticut and listening to other business owners and I heard something that isn’t heard in our office: “Cryptolocker is kicking our butts.”We Take Security SeriouslyI can barely...

Read More

Dropbox over 4 years ago had a data breach which exposed over 86 million users to hackers. The hackers could have access to the passwords for the accounts, encrypted and unencrypted. We look at data breaches and Dropbox, namely their failure on handling it.  It was 4 years ago. They are just making available the data now. That is a...

Read More