Blog / The Nitty Gritty of Service Level Agreements (SLAs) SLAs conceptualized as a blue button on a keyboard We take a peek at some of the lesser known details of SLAs. Service level agreements (also known as SLAs) aren’t a particularly new concept, though in case you’re unaware, they layout the services, costs, and time frames for rectifying problems, among other things. They’re used to help ensure both sides understand exactly what to […] March 23, 2023
Blog / The Importance Of Your Ransomware Response ransomware response Getting it wrong could mean costly penalties. Ransomware is a topic that I’ve covered in the recent past, so much so that you’ve read or at least seen a few of them like this one, or this one, or maybe even this one (just to point out a few). It comes up so often it […] March 21, 2023
Blog / Three Ways Technology is Empowering Municipal Government high tech municipal government How technology can benefit your municipal government. Governments, be they local, provincial or federal–are meant to offer much needed services for the community but often struggle to do so efficiently and economically. There’s a variety of reasons for this, and we’re not a politics blog so we’re not going to get into the details of […] March 16, 2023
Blog / AI and ChatGPT are Amazing. ChatGPT on a computer screen But are they a security risk? A long time ago, before the before times,  I earned my degree in computer programming with a major in Artificial Intelligence. AI is has been a topic of previous TRINUS newsletters and the current technology buzzword these days, specifically ChatGPT, which uses an AI-modeled text system to interface with […] March 14, 2023
Blog / Three Main Benefits of Cloud Backups for Businesses Cloud backups concept in gray and white Plus a bonus cybersecurity perk of cloud backups! The existence of the Cloud is a relatively new development compared with the need to backup data. Prior to the widespread adoption of the internet, data backups were generally kept in case of physical failure and corruption on devices, and were kept on premises using physical storage […] March 09, 2023
Blog / Phishing versus Ransomware Phishing button with fishing hook on red-lit keyboard Why phishing may overtake ransomware as attackers’ tactic of choice. Over the last couple of years ransomware has been king of the malware hill and the attack that has increased the most in frequency, and considering the potential revenue it can generate, it’s not hard to understand why. But of course, businesses haven’t been particularly […] March 07, 2023
Blog / How to get the most out of your technology budget Technology budget represented by a piggy back on a computer keyboard Here are three ways to ensure your technology budget covers all your bases. Technology is great, but it can be remarkably expensive, and, in business at least, it’s meant to help improve your bottom line and not blow your budget. Unfortunately too many organizations—businesses, municipalities, clinics, and non-profits alike—don’t fully understand the scope of their […] March 02, 2023
Blog / What common cyberattacks do companies routinely ignore? a man in a mask using a prop to demonstrate common cyberattacks like phishing Phishing attacks are common cyberattacks and not to be underestimated. Email has been around for a long, long time. Its origins date back over 60 years to the 1960s. Email, in the form we are familiar with today was developed in 1980. Younger readers of this newsletters may not remember a time when email was […] February 28, 2023
Blog / Is the Metaverse Really DOA? Man yelling at the metaverse in a headset While Meta’s failures have been public, the metaverse itself is virtually inevitable. Although Facebook made a public relations splash a few years ago with their high profile rebranding to Meta, interest in the metaverse since then has slipped substantially, leading some to speculate the that metaverse was dead on arrival. According to these naysayers, we […] February 23, 2023
Blog / How will your organization react to a cybersecurity incident? Incident Response Plan in green highlighted on a keyboard Unfortunately, tossing blame around is all too common. An important part of good cybersecurity is preparedness. That means thinking ahead and having business continuity and disaster recovery plans for when things go wrong. When a situation is critical it’s easy to lose track and miss important details, so having robust plans will relieve some of […] February 21, 2023

/Partners /Systems /Certifications

TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.