Blogs
Knowledge, advice and opinion on IT.

IT Hardware: Why Name Brands Make a Difference
Managed IT

IT Hardware: Why Name Brands Make a Difference

The Value of Name Brands in IT Hardware Or "Why We Don’t Build Our Own IT Hardware".I know I am treading in dangerous waters here when I say that we don’t support self-built machines. What does that mean? At Triton Technologies we prefer and only sell major name brands: Dell, Lenovo,...
Read More
Taming The VoIP Beast
VOIP

Taming The VoIP Beast

Triton Technologies years ago was created to help the business user and the business owner: over the years we have acquired products, companies and so forth in order to grow. One of them is the skill and ability for dealing with VoIP issues.Years ago, we acquired a failing telephone provider...
Read More
Why We Don’t Outsource Our Technical Support
IT Support

Why We Don’t Outsource Our Technical Support

The Benefits of In-House Expertise: Enhancing Customer Experience through Local Technical Support For years, as Triton Technologies grew we were approached by many third party IT support contractors. From telephone only, to individuals we were contacted sometimes almost daily. The offers were inviting. Learn why we've been vindicated by our...
Read More
Amazon AWS: Amazon, Part Deux
Cloud IT

Amazon AWS: Amazon, Part Deux

We get a call on Monday morning, like you do, but this one was more panic. The owner went on a week long vacation and came back to a resignation letter sitting on his desk from what was then his previous IT person. In-house person, quit Wednesday the previous week....
Read More
Amazon AWS: Amazon Saves The Day
Cloud IT

Amazon AWS: Amazon Saves The Day

A Client in Need of a SolutionTriton Technologies does a lot of different kinds of business. Some logistics, medical, hospitality, government, military and more. So we are quite diverse on the types of clients that we work with. We were asked about 3 months ago to install software for an...
Read More
Data Breaches and Dropbox
Data Privacy Data Security

Data Breaches and Dropbox

Dropbox over 4 years ago had a data breach which exposed over 86 million users to hackers. The hackers could have access to the passwords for the accounts, encrypted and unencrypted. We look at data breaches and Dropbox, namely their failure on handling it.  It was 4 years ago. They...
Read More
The Advantages of Working With a VoIP Provider
VOIP

The Advantages of Working With a VoIP Provider

Key Benefits of Partnering with a VoIP ProviderWhen an emergency happens, it’s great to have an MSP (Managed Service Provider) with a VoIP Service. Story Time: 2016 Texas FloodsAbout two months ago, we have a client out of Texas who does financial services for the local populous. Retirement packages, stock trades,...
Read More
Why We Recommend Ubiquiti Wireless Access
Managed IT

Why We Recommend Ubiquiti Wireless Access

The Benefits of Choosing Ubiquiti for Wireless Access Wifi isn’t complicated. What is complicated is people. For a long time, most small business would go out to their local office supply store, purchase a router, create wifi and give it no password so their patrons could access it without an...
Read More
Acceptable Use Policies Can Save Your Business
Uncategorized

Acceptable Use Policies Can Save Your Business

How Acceptable Use Policies Protect Your Business Policy, procedure and process. I was asked recently why do I need a computer policy? The short answer? It’s the law.   Massachusetts 201 CMR 17.00 Compliance In Massachusetts, the law 201.cmr.17 clearly states that a business must have a clear and defined...
Read More
Shared Hosting Dangers: Why It Needs to Go
Hosting

Shared Hosting Dangers: Why It Needs to Go

Shared hosting needs to go. What? Yes, we said it and we mean it. What is shared hosting to begin with? Understanding Shared Hosting (And Its Drawbacks) Shared hosting is a service in which on a single server usually at a hosting service that your company and many other companies...
Read More
Why We’re Changing Firewall Vendors
Cloud IT

Why We’re Changing Firewall Vendors

Why is Triton Technologies changing firewall vendors? Triton Technologies has been with SonicWALL since 2006 and have implemented thousands of installs throughout the world. The United States, France, Germany, India, Brazil, Mexico, Canada, and more we have sent and more deployed many hundreds of firewalls throughout those countries. But due...
Read More
The Importance of a Clean Background in IT
IT Support

The Importance of a Clean Background in IT

The importance of having an IT staff with impeccable backgrounds. In our line of work we have many keys to many kingdoms. That also means that we need to be more secure than all of our clients. That includes not only complex passwords, multi-authentication techniques, tokens and everything is secure....
Read More
HIPAA Compliance for Small Medical Businesses
Uncategorized

HIPAA Compliance for Small Medical Businesses

HIPAA Mastery for Small Healthcare Firms In the last couple months due to governmental pressures for state and local charities and nonprofits, small medical businesses have been asked to fully comply with HIPAA compliance even if a single machine might one day encounter that information. We are currently working with...
Read More
Vendor Management: The Balrog
Managed IT

Vendor Management: The Balrog

Any business owner can attest to is dealing with multiple vendors is a business in of itself. From cellular carriers, internet providers, construction companies, telephone and more, each one has their own language and each one has their own methodology. This situation happened, and this is why right after our...
Read More
Dispelling Ransomware Myths
Data Privacy Data Security

Dispelling Ransomware Myths

Ransomware is the new underground economy. In the last few years, a new breed of exploit has arrived on the scene, called Ransomware. Basically, what it does is encrypts all your files, demands bitcoins or some other crypto currency and waits. It usually has a timer giving you a couple...
Read More
Website Defense: Is It That Important?
Back Up and Recovery Cloud IT Data Security

Website Defense: Is It That Important?

It is what people see, it's what your customers see and it shows what kind of company you are when it comes to security. If your website gets hacked, it shows to potential clients that you are not serious about your internet security and you are a potential risk. Defense...
Read More
Data Breach: Barbarians at the Gate
Back Up and Recovery Data Privacy Data Security

Data Breach: Barbarians at the Gate

In the yesteryear of IT technology in order to have a data breach you needed to have incompetence and an angry person. Data networks were isolated or tightly controlled not because of security but because the technology to link them together is very complex and outside the budgets of most...
Read More
Why a Managed IT Provider?
Managed IT

Why a Managed IT Provider?

Why should a business chose a managed IT provider over a traditional break-fix? Simple: MoneyWith a managed IT provider you get more than a body that fixes stuff when things break: they make sure they don't break. As anyone who's owned a car, you perform maintenance, change the oil, rotate the...
Read More
Apple Wins the PR Battle, but Loses the War
Uncategorized

Apple Wins the PR Battle, but Loses the War

Did you doubt they could? Did you think the iPhone could really stand up to this? If you did, you need to know more about security. Good security means fast detection and real-time response. The front door can always be broken into.Should Apple Have Folded?Security is a funny thing. If...
Read More
1 6 7 8