Blogs
Knowledge, advice and opinion on IT

Network Security: First, Middle and Last
Managed IT

Network Security: First, Middle and Last

We had the fun privilege this week of doing a security check for a restaurant. We have agreements with banks,...
Read More
The Importance of Thorough Vendor Evaluations
Managed IT

The Importance of Thorough Vendor Evaluations

In the last decade, we have seen something that is somewhat upsetting. Vendor network evaluations are not worth anything. Yup, we...
Read More
Why Restaurants Need WiFi
Managed IT

Why Restaurants Need WiFi

If your restaurant wants to survive, it needs wifi.When it comes to selling more restaurants need to attract more clients...
Read More
Dealing with CryptoLocker: Why We Do What We Do
Data Security Managed IT

Dealing with CryptoLocker: Why We Do What We Do

Why We Fight CryptoLocker: Our Strategy Explained As the owner of Triton Technologies, I go through constant training when it comes...
Read More
Security Risk: Don’t Show Client Testimonials
Data Privacy Data Security

Security Risk: Don’t Show Client Testimonials

Displaying client testimonials can enhance credibility but may also introduce security risks. Understand these dangers and discover strategies to protect...
Read More
IT Hardware: Why Name Brands Make a Difference
Managed IT

IT Hardware: Why Name Brands Make a Difference

The Value of Name Brands in IT Hardware Or "Why We Don’t Build Our Own IT Hardware".I know I am treading...
Read More
Taming The VoIP Beast
VOIP

Taming The VoIP Beast

Triton Technologies years ago was created to help the business user and the business owner: over the years we have...
Read More
Why We Don’t Outsource Our Technical Support
IT Support

Why We Don’t Outsource Our Technical Support

The Benefits of In-House Expertise: Enhancing Customer Experience through Local Technical Support For years, as Triton Technologies grew we were...
Read More
Amazon AWS: Amazon, Part Deux
Cloud IT

Amazon AWS: Amazon, Part Deux

We get a call on Monday morning, like you do, but this one was more panic. The owner went on...
Read More
Amazon AWS: Amazon Saves The Day
Cloud IT

Amazon AWS: Amazon Saves The Day

A Client in Need of a SolutionTriton Technologies does a lot of different kinds of business. Some logistics, medical, hospitality,...
Read More
Data Breaches and Dropbox
Data Privacy Data Security

Data Breaches and Dropbox

Dropbox over 4 years ago had a data breach which exposed over 86 million users to hackers. The hackers could...
Read More
The Advantages of Working With a VoIP Provider
VOIP

The Advantages of Working With a VoIP Provider

Key Benefits of Partnering with a VoIP ProviderWhen an emergency happens, it’s great to have an MSP (Managed Service Provider)...
Read More
Why We Recommend Ubiquiti Wireless Access
Managed IT

Why We Recommend Ubiquiti Wireless Access

The Benefits of Choosing Ubiquiti for Wireless Access Wifi isn’t complicated. What is complicated is people. For a long time,...
Read More
Acceptable Use Policies Can Save Your Business
Uncategorized

Acceptable Use Policies Can Save Your Business

How Acceptable Use Policies Protect Your Business Policy, procedure and process. I was asked recently why do I need a...
Read More
Shared Hosting Dangers: Why It Needs to Go
Hosting

Shared Hosting Dangers: Why It Needs to Go

Shared hosting needs to go. What? Yes, we said it and we mean it. What is shared hosting to begin...
Read More
Why We’re Changing Firewall Vendors
Cloud IT

Why We’re Changing Firewall Vendors

Why is Triton Technologies changing firewall vendors? Triton Technologies has been with SonicWALL since 2006 and have implemented thousands of...
Read More
The Importance of a Clean Background in IT
IT Support

The Importance of a Clean Background in IT

The importance of having an IT staff with impeccable backgrounds. In our line of work we have many keys to...
Read More
HIPAA Compliance for Small Medical Businesses
Uncategorized

HIPAA Compliance for Small Medical Businesses

HIPAA Mastery for Small Healthcare Firms In the last couple months due to governmental pressures for state and local charities...
Read More
Vendor Management: The Balrog
Managed IT

Vendor Management: The Balrog

Any business owner can attest to is dealing with multiple vendors is a business in of itself. From cellular carriers,...
Read More
Dispelling Ransomware Myths
Data Privacy Data Security

Dispelling Ransomware Myths

Ransomware is the new underground economy. In the last few years, a new breed of exploit has arrived on the...
Read More