Blog - Triton Technologies
217
blog,,qode-title-hidden,hide_top_bar_on_mobile_header,qode-content-sidebar-responsive,transparent_content,qode-theme-ver-11.0,qode-theme-bridge,wpb-js-composer js-comp-ver-5.0.1,vc_responsive,et-pb-theme-bridge,unknown,et_divi_builder

In the last decade or so we have noticed that more and more Internet service providers are offering services such as hosting for websites, hosting for email, DNS hosting, registration and more. We cannot emphasize enough how much we do not support this. I'll tell you why. As a managed IT provider....

At Triton Technologies we have been doing PCI, HIPAA compliance, SOX and more for years. Most of the time it is pretty straight forward and easy to implement the solutions. This one project was going on nearly a year. Wait, what? Yup, a year to bring them into compliance with HIPAA...

On Dealing With Ransomware A couple of weeks ago, a worldwide exploit stolen utilities from the National Security Agency were utilized to take down literally hundreds of thousands of computers, from hospitals, government, and large corporations. For days people were freaking out and having a tremendous time securing their networks. Traditional methodologies...

Over a month ago, Triton Technologies was given a challenge. The challenge was simple: break our wireless network and you have our security contract. Sounds great in theory, but in reality white hat hacking is a quite complex method and time-consuming. Security Penetration: Break Their Wireless Network We had been trying to acquire...

We have received a lot of requests for this and it’s a scorcher. “How do I protect my corporate privacy this day in age?” Let’s Get Right to the Answer: You Can’t At least not easily. What do we mean? Quite simply this, every company in every country cooperates with the government...

Please, please stop. In marketing, it is great to give your business a personal face: a close contact or a person to call when things go wrong. That is great, but it causes a tremendous security headache in I.T. when you paint that target. What are we talking about? A common scam...

This week we got a new client, and it was a fantastic first meeting that it must be shared. It was a simple 5 person company but they were government funded. I can't reveal much more than that without disclosing what they do. Small but important. On the first meeting, the new...

We have a client who absolutely must be online, ALL THE TIME. Are they a stock broker? A police station? Bank? Nope. Solar array farm. Yup, fields, and fields of solar panels. The Power Must Flow Why? Simple. The electric company doesn't tell them when they aren't generating power, and if there is...

We had the fun privilege this week of doing a security check for a restaurant. We have agreements with banks, credit card processors and more to analyze a network for security issues or make changes to a client's network because of a new point of sale system to be installed...

In the last decade, we have seen something that is somewhat upsetting. Vendor network evaluations are not worth anything. Yup, we said it. From ISPs, printer providers, virtual server providers, email providers and others; all have failed to live up to their engineering personnel's recommendations. It's only after the disaster begins do we see...