Blog / Improving Your Cyber Security Posture cyber security posture habits getting broken down Is there an easy, cost-effective way of improving your cyber security posture? Yes, but many organizations don’t do it. When people talk about an organization’s cyber security posture, they’re talking about how prepared that organization is to deal with any cyber security disruption. This covers substantially more than the brand of of antivirus software you […] March 15, 2022
Blog / What the War in Ukraine Means for your Cyber Security Ukrainian and Russian Flags painted on concrete Much has been made in the western media about the cyber component of the war in Ukraine. Technology experts are watching the first conflict between two developed nations in the 21st century to see how cyber space has been weaponized both offensively and defensively to support a military engagement. While the media and their associated […] March 10, 2022
Blog / Don’t fall victim to fallout Russian flag on computer screen as attack Just to get it out of the way, I’d like to start this newsletter by assuring you right off the bat that this will not be about politics. This is a cyber security newsletter and only a cyber security newsletter. However, there’s no denying some of what’s going on in the real world does have real […] March 08, 2022
Blog / Five Benefits of Industrial Digital Transformation Industrial Digital Transformation Concept As subscribers to our newsletter already know (and you can sign up below if you haven’t yet), we’re dedicating this month’s articles to exploring digital transformation and its benefits for organizations of all kinds. Now, when we hear “digital transformation,” most of us think of servers and digitalizing documents and upgrading offices, and all that’s […] March 07, 2022
Blog / The Inside Scoop on Digital Transformation Digital Transformation Digital transformation is one of those IT business phrases that gets bandied around a lot but doesn’t mean much to those on the outside. In fact, you could almost call it a buzzword. After all, loathe as I am to start one of these articles with “Webster’s defines ‘buzzword’ as…”, the famous dictionary does describe […] March 03, 2022
Blog / The Importance of IP Address Restrictions Russian Hackers It probably comes as no surprise that Russia is currently on pretty much everyone’s cyber security radar. There are bot nets and hacking originating from (and targeted at) Russia like you wouldn’t believe right now. Well, maybe you would considering what Russia’s getting up to these days, but the thing is this has been going […] March 01, 2022
Blog / Ransomware Update: Insiders and Unix Attacks ransomware update showing hacker unlocking a padlock It’s no secret around the TRINUS offices that I’m not a fan of writing about ransomware. Don’t get me wrong, I could write a new ransomware update pretty much every week; it’s a massive cyber security topic with potentially massive consequences for those who don’t take it seriously. Unfortunately, it’s also hard not to come […] February 22, 2022
Blog / Industry 4.0 – The Fourth Industrial Revolution Industry 4.0 Smart Factory When we think of the industrial revolution, most of us remember our high school history or social studies classes. We think of the late 1700s, steam engines, miners caked in coal dust, and urchin chimney sweeps swarming across London. But early education has always been about delivering a broad understanding about a variety of subjects. […] February 21, 2022
Blog / The Evolving Medical IoT Landscape Doctor using Medical IoT device The Internet of Things (IoT) has existed in one form or another for a fair while now. As is typical with such things, it’s origin varies depending on your perspective. For some, it started in 1985 with the first ARPANET connected Coca-Cola vending machine. For others, it was in 1999 when Kevin Ashton coined the […] February 17, 2022
Blog / Common Cyber Attacks You Should Know About Hooded hackers representing different types of common cyber attacks If you’ve ever overheard computer experts talking amongst themselves, then you know it can often seem like they are speaking a different language. The world of computers has always been a hotbed of acronyms, abbreviations, and strange names. Sometimes there’s a clever joke involved, like how the acronym GNU which stands for “GNU’s Not Unix!” […] February 15, 2022

/Partners /Systems /Certifications

TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.