Blogs
Knowledge, advice and opinion on IT.

Recommendation: SSD Drives for Commercial Computers
Managed IT

Recommendation: SSD Drives for Commercial Computers

Traditionally for many decades computers utilized hard drives that physically moved. Round platters would store our information and read heads would move back and forth to access that information. When it came out, it was revolutionary. But like all good things, time moves on. In the last decade, we have...
Read More
IT Cloud Infrastructure: Why We Love Amazon
Cloud IT IT Support

IT Cloud Infrastructure: Why We Love Amazon

Why Triton Technologies really loves Amazon.In the IT cloud sphere, there are multiple competitors. You have Amazon AWS, Microsoft Azure, Google, Virtual, and many other standalone providers. We have used multiple ones and are currently working with multiple iterations of most of those companies.Nothing is Wrong with Microsoft or Google,...
Read More
When It Rains, Grab a Cisco Umbrella
IT Support

When It Rains, Grab a Cisco Umbrella

Over the years we have recommended to our clients that they do not use the DNS services provided by their ISP. There are multiple reasons for that. Maintaining Network Order and Security with Forwarders Since most of our clients have a server or virtual server through Amazon through best practices,...
Read More
Multiple Antivirus: Why More Isn’t Better
Managed IT

Multiple Antivirus: Why More Isn’t Better

When you were younger, you’re taught that more is always better. So, if you have more layers of protection, you can defend your computers better. Right? The System Impact of Multiple Antivirus That is not exactly true when it comes to antivirus. The reason why is that we are encountering...
Read More
Computer Warranties: Know What They Cover Before You Claim
IT Support

Computer Warranties: Know What They Cover Before You Claim

In the last couple months, we've got an unexpected surge in warranty claims. It didn't matter who the manufacturer was: it was across the board. From Dell to Lenovo, Apple, and HP: hard drives, motherboards, and screens all began to fail. It’s par for the norm for hardware, and so...
Read More
Denial of Service Attacks and CDNs like Cloudflare
Data Privacy Data Security

Denial of Service Attacks and CDNs like Cloudflare

At Triton Technologies, security is in the forefront of our mind on every level. That includes stuff and technologies that we do not have direct access to or complements our client's networks. One of those such complementary services is web hosting and web page public facing servers. The Rise of...
Read More
IT Problems: Yes, Always Run Updates
IT Support

IT Problems: Yes, Always Run Updates

In the last week, an update proliferated through our clients' servers. A small minority of our clients' servers went down during these updates. A vast majority did not have a problem at all. But that small minority represented hundreds of users. One of the questions I was asked was: do...
Read More
Interconnected IT: Welcome to the Matrix
IT Support

Interconnected IT: Welcome to the Matrix

We had the pleasure of working with a new client this week with very unique requirements.Client Needs: High Speed, Mobile InternetBasically, they needed long-range communication with high-speed Internet and over 50 locations that were all mobile. It was a livery company that transported medical patients all throughout New England. Within...
Read More
IT Support Bids: If It’s Too Good to Be True…
IT Support

IT Support Bids: If It’s Too Good to Be True…

It probably is. When IT Support Over-Promises What I am talking about is over promise and under deliver. Over the years we have dealt with many clients and potential clients when it comes to IT support. In the bidding/quoting process we have competition just like any other business. What we...
Read More
Cloud-Based Servers and Natural Disasters
Cloud IT

Cloud-Based Servers and Natural Disasters

It's been a bad few weeks for businesses dealing with natural disasters. Hurricane after hurricane rolled through many of our vendor's facilities. Many of them were shut down, and tech-support was suspended while they got power and their services back up and running. Why is this important to this blog,...
Read More
We’ll Say It Again: Background Checks For IT
IT Support

We’ll Say It Again: Background Checks For IT

One of the most intense discussions we get into with clients is their background check for IT staff. With events such as a managed IT company holding hostage a client's data, a rogue IT person hacking into one of their client's networks to steal customer data, and many cases over...
Read More
IT Projects: Vendors Not Following Through
IT Support

IT Projects: Vendors Not Following Through

How the lack of a vendor follow-through hurts business. For unknown reasons we are encountering a lot of clients reaching out to us due to a failure of vendor follow-through. Basically, they set up a solution such as a cellular router, printer, security system, or of some variant of the...
Read More
Amazon AWS Saves the Day… AGAIN
Cloud IT

Amazon AWS Saves the Day… AGAIN

Amazon saves the day again and again. We may sound like a broken record, but the solution is solid. What are we talking about? Amazon Web services. Truthfully, if you're in business, you need your head in the cloud now! Client Story: Food Logistics Company A quick example is this,...
Read More
Cutting the Cord in the Office: A Cellular ISP Solution
Cloud IT IT Support

Cutting the Cord in the Office: A Cellular ISP Solution

Triton technologies has expanded our cellular offerings exponentially. A prime example is a law office in a single building in a small town in Massachusetts. Their current coaxial provider had very very poor Internet results. Truthfully they had more outage than they had internet. Multiple node issues, a modem replaced...
Read More
Making Connections: Long Range Wireless Access for Multiple Buildings
Managed IT

Making Connections: Long Range Wireless Access for Multiple Buildings

This week we had the extreme pleasure of helping a business connect up multiple buildings to a central office with very little cost. A couple weeks ago we were asked by a local logistics company to price out multiple Internet connections, firewalls, routers and so forth for 4 buildings that...
Read More
What’s Your Fancy? PC or Mac: Both Have IT Needs
IT Support

What’s Your Fancy? PC or Mac: Both Have IT Needs

One of the most controversial things that we’ve ever got from clients is: why don’t we just switch to a Mac and not have any problems?Hate to break it to you, but as a managed IT provider with dozens of Mac-only clients, it doesn’t matter: everything has problems.PC vs. Mac...
Read More
Managed IT Works: Especially Against Ransomware Like Petya
Managed IT

Managed IT Works: Especially Against Ransomware Like Petya

It’s been 6 weeks since the last global affecting ransomware attack has occurred. The last attack brought to you by WannaCry affected millions of computers and servers throughout the globe. That attack affected an ancient exploit going all the way back to Windows XP and was stolen from the national...
Read More
“All-in-One” ISP Services: Too Many Cooks In The Kitchen
Cloud IT VOIP

“All-in-One” ISP Services: Too Many Cooks In The Kitchen

In the last decade or so we have noticed that more and more Internet service providers are offering services such as hosting for websites, hosting for email, DNS hosting, registration and more.We cannot emphasize enough how much we do not support this.I'll tell you why. As a managed IT provider....
Read More
Compliance: When You Need to See Everything from 10K Up
Managed IT

Compliance: When You Need to See Everything from 10K Up

At Triton Technologies we have been doing PCI, HIPAA compliance, SOX and more for years. Most of the time it is pretty straight forward and easy to implement the solutions. This one project was going on nearly a year. Wait, what? Yup, a year to bring them into compliance with...
Read More
WannaCry or GoingtoRelax?
Data Privacy Data Security

WannaCry or GoingtoRelax?

On Dealing With Ransomware A couple of weeks ago, a worldwide exploit stolen utilities from the National Security Agency were utilized to take down literally hundreds of thousands of computers, from hospitals, government, and large corporations. For days people were freaking out and having a tremendous time securing their networks....
Read More
White Hat Hacking: Doing Wrong to Do Right
Data Privacy Data Security

White Hat Hacking: Doing Wrong to Do Right

Over a month ago, Triton Technologies was given a challenge. The challenge was simple: break our wireless network and you have our security contract. Sounds great in theory, but in reality white hat hacking is a quite complex method and time-consuming. Security Penetration: Break Their Wireless Network We had been...
Read More
Corporate Privacy In Today’s Environment
Data Privacy

Corporate Privacy In Today’s Environment

We have received a lot of requests for this and it’s a scorcher. “How do I protect my corporate privacy this day in age?”Let’s Get Right to the Answer: You Can’tAt least not easily. What do we mean? Quite simply this, every company in every country cooperates with the government...
Read More
Phishing: STOP Posting Your Personnel’s Contact Information!
Data Privacy Data Security

Phishing: STOP Posting Your Personnel’s Contact Information!

Please, please stop.In marketing, it is great to give your business a personal face: a close contact or a person to call when things go wrong. That is great, but it causes a tremendous security headache in I.T. when you paint that target.What are we talking about? A common scam...
Read More
Q&A with IT: We Love Questions
IT Support

Q&A with IT: We Love Questions

This week we got a new client, and it was a fantastic first meeting that it must be shared. It was a simple 5 person company but they were government funded. I can't reveal much more than that without disclosing what they do. Small but important. On the first meeting,...
Read More
Always Online: Industries That Never Sleep
Managed IT

Always Online: Industries That Never Sleep

We have a client who absolutely must be online, ALL THE TIME. Are they a stock broker? A police station? Bank? Nope. Solar array farm. Yup, fields, and fields of solar panels. The Power Must Flow Why? Simple. The electric company doesn't tell them when they aren't generating power, and...
Read More
Network Security: First, Middle and Last
Managed IT

Network Security: First, Middle and Last

We had the fun privilege this week of doing a security check for a restaurant. We have agreements with banks, credit card processors and more to analyze a network for security issues or make changes to a client's network because of a new point of sale system to be installed...
Read More
The Importance of Thorough Vendor Evaluations
Managed IT

The Importance of Thorough Vendor Evaluations

In the last decade, we have seen something that is somewhat upsetting. Vendor network evaluations are not worth anything. Yup, we said it. From ISPs, printer providers, virtual server providers, email providers and others; all have failed to live up to their engineering personnel's recommendations. It's only after the disaster begins do...
Read More
Why Restaurants Need WiFi
Managed IT

Why Restaurants Need WiFi

If your restaurant wants to survive, it needs wifi.When it comes to selling more restaurants need to attract more clients or high-priced clients. How does a business do that? Business clients, high spenders, people that will spend hour after hour sitting and ordering, not just one thing, but many things....
Read More
Dealing with CryptoLocker: Why We Do What We Do
Data Security Managed IT

Dealing with CryptoLocker: Why We Do What We Do

Why We Fight CryptoLocker: Our Strategy Explained As the owner of Triton Technologies, I go through constant training when it comes to MSP services, products and support methodologies. I was at a conference in Hartford Connecticut and listening to other business owners and I heard something that isn’t heard in our office:...
Read More
Security Risk: Don’t Show Client Testimonials
Data Privacy Data Security

Security Risk: Don’t Show Client Testimonials

Displaying client testimonials can enhance credibility but may also introduce security risks. Understand these dangers and discover strategies to protect your clients and your business.
Read More