Blog / Proactive or Reactive Security: Red vs Blue Your staff needs to be aware of what is "normal" for them to be able to do with their computers. Then make sure they also know who to report things to if anything "outside the norm" occurs. Many situations that occur, happen because Security settings on computers are lax. If that is the root cause, then the fault lies with the organization. August 04, 2020
Blog / No Place Like (Working From) Home – Part 4: Microsoft 365’s Full Potential Microsoft Teams is only one of many tools offered by Microsoft, to empower your employees to work seamlessly together on projects. July 30, 2020
Blog / There’s Admin and there’s Admin – Domain Administrators vs Local Administrators This is a tricky topic to try and keep simple, but I will certainly do my best. The easiest way to explain the difference between a Local Admin and a Domain Admin is to summarize the purpose of both types of accounts. July 28, 2020
Blog / No Place Like (Working From) Home Video Series – Part 3: Setting-up the Home Office – Chair, Desk and Posture All office workers know how important our posture is, and your office chair is your trusty sidekick in maintaining it. But what happens when you work from home? July 23, 2020
Blog / Threats Exist in Places Where You Will Least Expect Them … Even Inside Your Own Organization! The more access an employee has, the more their activity needs to be monitored. In terms of computers and networks, this means any and all administrative activity needs to be heavily supervised... July 20, 2020
Blog / No Place Like (Working From) Home Video Series – Part 2: Video Meeting Etiquette Tips What is your own Go-To Video Meeting tool? At TRINUS, we feel most secure by using Microsoft Teams... July 16, 2020
Blog / Tracking Your Devices – What’s on Your Network? Everyone wants good Security on their computers. That's a no-brainer. The big issue with that is how do you go about getting it? July 13, 2020
Blog / No Place Like (Working From) Home Video Series – Part 1: Tech Equipment for the Work-From-Home Office Starting today, I'll be presenting an 8-part series of short videos (one per each during the next 8 weeks) featuring TRINUS staffers teaching on Best Practices you need for the Work From Home environment. July 09, 2020
Blog / Where’s Your Information Coming From? What a Cross-Site Scripting Vulnerability Actually Means… It's important to understand the potential scope of this sort of attack and become aware that any of the tools you make use of, have web-based interfaces (like any firewall or switch in your network) which could be hiding something like this. July 06, 2020
Blog / MORE Big Brother is Watching! Geo-Location Tracking: What To Do About It. It's good practice to restart your phone on a regular schedule; once a day is great, every other day is good, but every week at a minimum. Restarting the phone guarantees that ALL APP's are closed, and tracking is disabled, until the APP is re-started. July 02, 2020
Post navigation
/Partners /Systems /Certifications
TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.