Blogs
Knowledge, advice and opinion on IT

Managed IT

Making Connections: Long Range Wireless Access for Multiple Buildings

This week we had the extreme pleasure of helping a business connect up multiple buildings to a central office with...
Read More
IT Support

What’s Your Fancy? PC or Mac: Both Have IT Needs

One of the most controversial things that we’ve ever got from clients is: why don’t we just switch to a...
Read More
Managed IT

Managed IT Works: Especially Against Ransomware Like Petya

It’s been 6 weeks since the last global affecting ransomware attack has occurred. The last attack brought to you by...
Read More
Cloud IT VOIP

“All-in-One” ISP Services: Too Many Cooks In The Kitchen

In the last decade or so we have noticed that more and more Internet service providers are offering services such...
Read More
Managed IT

Compliance: When You Need to See Everything from 10K Up

At Triton Technologies we have been doing PCI, HIPAA compliance, SOX and more for years. Most of the time it...
Read More
Data Privacy Data Security

WannaCry or GoingtoRelax?

On Dealing With Ransomware A couple of weeks ago, a worldwide exploit stolen utilities from the National Security Agency were...
Read More
Data Privacy Data Security

White Hat Hacking: Doing Wrong to Do Right

Over a month ago, Triton Technologies was given a challenge. The challenge was simple: break our wireless network and you...
Read More
Data Privacy

Corporate Privacy In Today’s Environment

We have received a lot of requests for this and it’s a scorcher. “How do I protect my corporate privacy...
Read More
Data Privacy Data Security

Phishing: STOP Posting Your Personnel’s Contact Information!

Please, please stop.In marketing, it is great to give your business a personal face: a close contact or a person...
Read More
IT Support

Q&A with IT: We Love Questions

This week we got a new client, and it was a fantastic first meeting that it must be shared. It...
Read More
Managed IT

Always Online: Industries That Never Sleep

We have a client who absolutely must be online, ALL THE TIME. Are they a stock broker? A police station?...
Read More
Managed IT

Network Security: First, Middle and Last

We had the fun privilege this week of doing a security check for a restaurant. We have agreements with banks,...
Read More
Managed IT

The Importance of Thorough Vendor Evaluations

In the last decade, we have seen something that is somewhat upsetting. Vendor network evaluations are not worth anything. Yup, we...
Read More
Managed IT

Why Restaurants Need WiFi

If your restaurant wants to survive, it needs wifi.When it comes to selling more restaurants need to attract more clients...
Read More
Data Security Managed IT

Dealing with CryptoLocker: Why We Do What We Do

Why We Fight CryptoLocker: Our Strategy Explained As the owner of Triton Technologies, I go through constant training when it comes...
Read More
Data Privacy Data Security

Security Risk: Why We Don’t Show Client Testimonials

No testimonials please.If you have been around this website for any period of time, you’ll notice no testimonials. Why?Testimonials are...
Read More
Managed IT

IT Hardware: Why Name Brands Make a Difference

The Value of Name Brands in IT Hardware Or "Why We Don’t Build Our Own IT Hardware".I know I am treading...
Read More
VOIP

Taming The VoIP Beast

Triton Technologies years ago was created to help the business user and the business owner: over the years we have...
Read More
IT Support

Why We Don’t Outsource Our Technical Support

The Benefits of In-House Expertise: Enhancing Customer Experience through Local Technical Support For years, as Triton Technologies grew we were...
Read More
Cloud IT

Amazon AWS: Amazon, Part Deux

We get a call on Monday morning, like you do, but this one was more panic. The owner went on...
Read More
1 7 8 9 10