Blog / Defending Against Human Error Human Error Concept of woman in front of laptop with emails and warning icons everywhere It’s Not an Entirely Unwinnable Battle Last week we talked about network segregation, and in that article (as well a few others like this one) I discussed some high-profile data breaches. I did this partly to help others understand what a breach actually is, but also to shine light on some less well-known causes of […] July 19, 2022
Blog / Plugging Technology Gaps with Traffic Lights technology gaps coding street lights analogy Prioritize filling technology gaps using a straightforward approach. Although advancing technology has been a boon to productivity, particularly over the past few decades as the pace of advances continues to accelerate, it’s important to remember that not all technologies are made equal. Even the ones developed to ameliorate the same pain points often have different […] July 18, 2022
Blog / The 3 Ws of Technology Audits Technology audits checkbox What they are, why they’re important, and when to do them. When it comes to maximizing the value of your IT, you need to understand your IT infrastructure and how it’s being used. That’s easier said than done, but not impossible. Some of the most effective tools for getting a bird’s eye view of all-things […] July 14, 2022
Blog / Why is Network Segregation Important? Network segregation concept Don’t let the bad guys weaponize your own network against you. One of the common results of the security audits I perform is the recommendation to segregate the client’s networks. In fact, network segregation is often viewed as just a way to organize or devices and usually gets put into the pile of other IT […] July 12, 2022
Blog / Getting Hacked Without Hackers? Even non-malicious data breaches are a serious problem. Data breaches are a serious issue. Depending on the type and amount of information involved, the costs can add up quickly. For example, some of you may remember the 2017 Equifax breach. As of early last year it has cost Equifax approximately $2 billion dollars and even […] July 05, 2022
Blog / Three Dark Horse Technologies To Keep An Eye On Peer-to-peer Network Concept Being forward-thinking isn’t just a plus, it’s necessary for success. When you work in a field like IT, it’s imperative to keep up on the latest trends and developments in technology. Of course, not every potential new trend or clickbait headline comes true, even when they’re truly useful. Sometimes good ideas just don’t catch on. […] July 04, 2022
Blog / Simplifying Municipal Elections with IT electronic voting More complications make municipal elections a great fit for new technologies. Advancing technology has transformed almost every aspect of our society, but there is one democratic institution that hasn’t kept up, and that’s the fundamental act of electing leaders and making decisions via accurate and secure elections. There are actually several good reasons electronic and […] June 30, 2022
Blog / Insuring Yourself Against Cyber War The devil is in the details, or in this case, the changing fine print. Recently I wrote about how an insurance company tried to deny a payout by claiming the ransomware was an act of war. That was four months ago, near the start of the still-ongoing Russian/Ukrainian conflict and while I haven’t mentioned it […] June 28, 2022
Blog / Incident Response Plans vs Disaster Recovery Plans Are they really all that different? Having a solid incident response plan and disaster recovery plan are required by multiple regulatory frameworks and legislations (PIPA, PIPEDA and PCI-DSS all require them). These plans form the basis for how organizations deal with the situation when things go rather badly wrong. It’s important to have them in […] June 21, 2022
Blog / What’s the worst cyber attack to get hit by? costa rica hackers Not all digital assaults are coded the same. When it comes to targeting an organization for a cyber attack, hackers sadly have plenty of options. Things like Dedicated Denial of Service (DDoS) attacks, viruses, business email compromise, are just a few major selections from a list that goes on and on. However, if I had […] June 14, 2022

/Partners /Systems /Certifications

TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.