Blog / Wired vs Wireless Connections As one of the leading managed IT service providers in Western Canada, we field a lot of technical questions every day. We’re firm believers that there’s no such thing as a stupid IT question, since asking questions is a great way to learn. This week we decided to focus on one of the questions we […] June 14, 2021
Blog / A ransomware guide worth $4.4 million USD? It turns out that, unlike in the movies, in real life the bad guys sometimes win. That’s how the Colonial pipeline ransomware situation got sorted out. In case you didn’t hear, a major oil pipeline operated by the Colonial Pipeline Company was recently shut down by ransomware. It was a major issue that caused a […] June 08, 2021
Blog / Data Redundancy and Database Management Duplicated data isn’t always a bad thing, but let’s get definitions down first. Information technology is an incredibly fast-paced industry. Computers get faster, new software and hardware peripherals expand their utility, and it seems like there’s always a new update for one thing or another. Don’t get us wrong; we like being part of a […] June 03, 2021
Blog / How good is your ransomware plan? In case you haven’t heard about it, the Colonial pipeline was recently shut down by a ransomware attack. The Colonial is a massive pipeline that stretches from Texas, over to the east coast of US, and then heads north up to Jersey. Details are sparse. Other than the fact that the pipeline has been shutdown […] June 01, 2021
Blog / Finding efficiencies in I.T. for SMBs Efficiency is a serious issue for small businesses, especially new startups looking to establish themselves in the market. It’s critical that costs be kept in line and resources are used to their fullest extent. Waste and even tiny inefficiencies can mean the difference between becoming a success or becoming a statistic about SMB failure rates. […] May 31, 2021
Blog / Industrial control equipment vulnerabilities IT Security is much like any other industry; sometimes there are good days, sometimes there are dull days, and sometimes there are bad days. Now, because I work in IT security my definitions of good, bad, and dull may not be what you would expect. A “good day” is one where a new major vulnerability […] May 25, 2021
Blog / Four Tips for Hardware Investment Planning Computer hardware is expensive, with a single device often costing upwards of a thousand dollars. With that kind of price tag it’s no wonder that many organizations are hesitant to invest in new hardware. What many business owners don’t take into consideration is the lost productivity involved with using old machines. In fact, according to […] May 20, 2021
Blog / FragAttacks: What they are and how to protect yourself In case you hadn’t heard, the big news in computer security right now are FragAttacks. FragAttacks (Fragmentation and Aggregation Attacks) consist of 12 separate vulnerabilities revolving around how wireless devices split up and transmit data. Wired connections send each packet of data individually, but this process is too wasteful for wireless connections, which combine the […] May 18, 2021
Blog / Building and curating your knowledge base A few weeks ago we looked at some of the benefits of keeping a knowledge base about your company and its products/services. These online repositories can be for internal or external use (or both), and are great for streamlining employee training or providing easy self-serve technical help for clients. But there’s no point in extolling […] May 17, 2021
Blog / Secret doesn’t mean secure No one could really blame you for thinking that the internet is basically just a collection of email and websites. After all, websites are pretty much the only things most search engines (including Google) return. When websites are the only thing most people ever get presented with, it’s easy to understand why some people might […] May 11, 2021

/Partners /Systems /Certifications

TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.