So, what do you get with VoIP (Voice over IP) technology that you can’t get from a PBX (Private Branch Exchange)? Quite a bit, but we will just focus on the productivity aspect of VoIP – ways to turn your office phones into better and more flexible tools to make the lives of your employees and clients easier and more...

Read More

Disaster recovery is a fundamental element of good business continuity planning. Business continuity planning refers to the broad range of plans created so that a business can continue to be operational no matter what negative event might occur. Business continuity planning addresses catastrophic events, from loss of a CEO, director, or other principal in the organization to severe natural disasters...

Read More

roomMaster is stopping all support for Windows 7

Windows 7 officially sunsets on January 14, 2020. We have known this for quite some time and have written about it previously. We have instilled in as many clients as possible the urgency to upgrade. We know some of you do not want to upgrade because of the cost, inconvenience, or the desire to keep things as they were.

We understand that the hospitality industry is very cutthroat, very razor margins, and when one of your competitors has better service than what you can provide, your clients will go across the street.

Read More

Get the hardware needed to upgrade to Windows 10 before it’s too late.

The retirement of Windows 7 is going full bore this January 2020. Microsoft has advised multiple times to upgrade to Windows 10. Here at Triton, we have advised clients multiple times to go to Windows 10 as well, and some of you have taken us up and have begun the migration process, and we applaud you for that.
Read More

The Internet Explorer vulnerability (CVE-2019-1367) is a critical zero-day bug.

I mean now, right now, uninstall it – every version of Internet Explorer needs to be removed. On Monday, September 23, Microsoft made an announcement and immediately deployed out-of-band updates for Internet Explorer. This update prevents a script from executing without any interaction by the user. A simple visit to a website can compromise your computer.
Read More

It’s been some time since I made a post, but it needs to be made.

There is a war going on. Let me backtrack a bit. At Triton Technologies, we are the gatekeepers, the guardians at the gate, the Heimdall to the kingdoms of our clients. We control all the keys, passwords, access, controls, etc. We are entrusted to protect and defend our client’s networks as their managed service provider (MSP) under contract. Someone has taken notice.
Read More
The Critical Risks of Port Forwarding in Network Security As a leader in managed IT solutions, Triton Technologies emphasizes the grave dangers of port forwarding within network security frameworks. Our mission is to ensure the utmost protection of our clients’ networks, but the security risks associated with port forwarding present significant challenges to maintaining this safety.
Read More