Blog / You Have Mail! You Have Mail! Canada Post SCAM leads to malware infection A client recently received an Email that appeared to be from Canada Post claiming that they had a package waiting for delivery.  It has the usual information about the delivery; ID number, date and time, and a payment amount.  There is even a link to […] December 12, 2016
Blog / The Devil You Know… The Devil You Know … IT Manager does malicious damage to local college You may have picked up on a recent news investigation report from CBC and others about the massive trouble at Norquest College.  It appears that back in February, 2013 a disgruntled IT Manager perpetrated two fraud schemes against senior staff as a backlash […] December 10, 2016
Blog / It’s BUDGET Time It’s BUDGET Time The leaves change colour and it’s time to start thinking about budgets. Many of our clients are municipalities who operate with a fiscal year and that coincides with the calendar year.  That means they need to start preparing budgets in the fall to insure their elected officials have time to review and […] September 10, 2016
Blog / Hackers Strike Another Unsuspecting Victim Hackers Strike Another Unsuspecting Victim Northern Alberta Municipality network is shutdown for up to 2 weeks. There has been a lot of (unwanted) media attention given recently to a municipality in Northern Alberta who has been fighting an intrusion into their network.  According to news reports the problems started back in July, but reached a […] August 31, 2016
Blog / I Need a REALLY BIG computer I Need a REALLY BIG computer There is more to document management than just scanning files We received a call the other day from a client asking for a REALLY BIG computer and a scanner.  Now, we’ll all for selling some gear to a client, but we asked a few more questions to dig in […] August 24, 2016
Blog / The BIG Phone Book: How do Email and website requests find you? The BIG Phone Book How do Email and website requests find you? We were recently transitioning a client to a new Email system.  It required that some settings be changed in their DNS to point to the new provider.  The matter was complicated by the addition of another technology provider who also needed to change […] August 22, 2016
Blog / Who is Calling Please? Aggressive Phone Solicitation Preys on Old Fears Who is Calling Please? Aggressive Phone Solicitation Preys on Old Fears A client called us yesterday to question the security and stability of their network.  The call wasn’t really serious as the long-standing client knows we have their network support and security under good control.  But they did want to report a new twist on […] August 10, 2016
Blog / That BLACK BOX Can be Dangerous Servers and Racks are Ignored when Considering Security of Files and Data Most organizations with more than 10 employees have local servers to help organize, control and store corporate information. For the most part, these servers hum away in obscurity located in some dark corner of the office – or even a broom closet. Over […] August 05, 2016
Blog / What Did You Say? Firewall 101 What is a Firewall Anyway? I recently had a client ask me a question: What is a firewall?  I was somewhat taken aback as I had just Emailed them about the virtues of Advanced Persistent Threat (APT) Blocking service that we were recommending for the Dynamic Filtering Services on their Watchguard firewall … I might […] July 27, 2016
Blog / I Hate Passwords! Lax Password Enforcement is still a Priority Concern We hear the phrase I Hate Passwords in one form or another with monotonous regularity. I think I have muttered it under my breath several times recently. I decided to take inventory. Between personal and business, I added up the number of accounts that require some sort […] July 21, 2016

/Partners /Systems /Certifications

TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.