Blogs
Knowledge, advice and opinion on IT

Denial of Service Attacks and CDNs like Cloudflare
Data Privacy Data Security

Denial of Service Attacks and CDNs like Cloudflare

At Triton Technologies, security is in the forefront of our mind on every level. That includes stuff and technologies that...
Read More
IT Problems: Yes, Always Run Updates
IT Support

IT Problems: Yes, Always Run Updates

In the last week, an update proliferated through our clients' servers. A small minority of our clients' servers went down...
Read More
Interconnected IT: Welcome to the Matrix
IT Support

Interconnected IT: Welcome to the Matrix

We had the pleasure of working with a new client this week with very unique requirements.Client Needs: High Speed, Mobile...
Read More
IT Support Bids: If It’s Too Good to Be True…
IT Support

IT Support Bids: If It’s Too Good to Be True…

It probably is. When IT Support Over-Promises What I am talking about is over promise and under deliver. Over the...
Read More
Cloud-Based Servers and Natural Disasters
Cloud IT

Cloud-Based Servers and Natural Disasters

It's been a bad few weeks for businesses dealing with natural disasters. Hurricane after hurricane rolled through many of our...
Read More
We’ll Say It Again: Background Checks For IT
IT Support

We’ll Say It Again: Background Checks For IT

One of the most intense discussions we get into with clients is their background check for IT staff. With events...
Read More
IT Projects: Vendors Not Following Through
IT Support

IT Projects: Vendors Not Following Through

How the lack of a vendor follow-through hurts business. For unknown reasons we are encountering a lot of clients reaching...
Read More
Amazon AWS Saves the Day… AGAIN
Cloud IT

Amazon AWS Saves the Day… AGAIN

Amazon saves the day again and again. We may sound like a broken record, but the solution is solid. What...
Read More
Cutting the Cord in the Office: A Cellular ISP Solution
Cloud IT IT Support

Cutting the Cord in the Office: A Cellular ISP Solution

Triton technologies has expanded our cellular offerings exponentially. A prime example is a law office in a single building in...
Read More
Making Connections: Long Range Wireless Access for Multiple Buildings
Managed IT

Making Connections: Long Range Wireless Access for Multiple Buildings

This week we had the extreme pleasure of helping a business connect up multiple buildings to a central office with...
Read More
What’s Your Fancy? PC or Mac: Both Have IT Needs
IT Support

What’s Your Fancy? PC or Mac: Both Have IT Needs

One of the most controversial things that we’ve ever got from clients is: why don’t we just switch to a...
Read More
Managed IT Works: Especially Against Ransomware Like Petya
Managed IT

Managed IT Works: Especially Against Ransomware Like Petya

It’s been 6 weeks since the last global affecting ransomware attack has occurred. The last attack brought to you by...
Read More
“All-in-One” ISP Services: Too Many Cooks In The Kitchen
Cloud IT VOIP

“All-in-One” ISP Services: Too Many Cooks In The Kitchen

In the last decade or so we have noticed that more and more Internet service providers are offering services such...
Read More
Compliance: When You Need to See Everything from 10K Up
Managed IT

Compliance: When You Need to See Everything from 10K Up

At Triton Technologies we have been doing PCI, HIPAA compliance, SOX and more for years. Most of the time it...
Read More
WannaCry or GoingtoRelax?
Data Privacy Data Security

WannaCry or GoingtoRelax?

On Dealing With Ransomware A couple of weeks ago, a worldwide exploit stolen utilities from the National Security Agency were...
Read More
White Hat Hacking: Doing Wrong to Do Right
Data Privacy Data Security

White Hat Hacking: Doing Wrong to Do Right

Over a month ago, Triton Technologies was given a challenge. The challenge was simple: break our wireless network and you...
Read More
Corporate Privacy In Today’s Environment
Data Privacy

Corporate Privacy In Today’s Environment

We have received a lot of requests for this and it’s a scorcher. “How do I protect my corporate privacy...
Read More
Phishing: STOP Posting Your Personnel’s Contact Information!
Data Privacy Data Security

Phishing: STOP Posting Your Personnel’s Contact Information!

Please, please stop.In marketing, it is great to give your business a personal face: a close contact or a person...
Read More
Q&A with IT: We Love Questions
IT Support

Q&A with IT: We Love Questions

This week we got a new client, and it was a fantastic first meeting that it must be shared. It...
Read More
Always Online: Industries That Never Sleep
Managed IT

Always Online: Industries That Never Sleep

We have a client who absolutely must be online, ALL THE TIME. Are they a stock broker? A police station?...
Read More