Blog / Cloud vs. Onsite Servers A wireframe mockup of the cloud server farms used by providers What are the pros and cons of cloud servers as opposed to onsite ones? Cloud servers and services have long been touted as the ultimate server solution for both individuals and businesses. For one, their upfront costs are substantially lower than buying a server, and for another they come with their own infrastructure (a secured […] August 22, 2023
Blog / How much life does your computer hardware have left? old computer hardware in need of replacement Waiting for computer hardware to break is bad replacement policy. Although it’s rarely top-of-mind at the time, we all typically consider how long a product will last, even if we never calculate a precise time length or put it into words. That’s all fine and dandy for private life, but it’s a different story when […] August 15, 2023
Blog / A Refresher On Canada’s Antispam Legislation (CASL) CASL concept Understanding CASL rules can save you plenty of headaches. As regular readers know by now, compliance is a huge part of the cybersecurity domain or job scope. Yes, there’s plenty of patching and updating firewalls for ransom/malware protection, but pretty much every business today offers some kind of online payment program or collects private information, […] August 01, 2023
Blog / Changes to Privacy Legislation are on their way. Understand where you are now versus where the regulations are going. Long time readers will know that we like to sometimes discuss privacy and security legislation. For example, the Payment Card Industry Data Security Standards (PCI-DSS) regulations come up periodically, which is a set of rules that applies to organizations that accept plastic for payment, […] July 18, 2023
Blog / Is your new hardware compatible with your environment? Planning ahead will help you avoid significant issues. The first part of any change project is planning what needs to be done, including the materials needed, additional fees or licenses that need to be paid, and any modifications to your existing setup to make it all work. It doesn’t matter if you’re putting in a […] July 11, 2023
Blog / Resetting Passwords Properly Resetting Passwords Resetting passwords can be dangerous when done wrong. Staying modern and on top of trends is important in any profession, but particularly cybersecurity. Situations can develop quickly, as quickly as computers can process things sometimes, so it’s important to be as prepared as possible by actively seeking out reports on attacks, exploit campaigns, and any […] July 04, 2023
Blog / Inventory Control and Security Inventory Control When it comes to inventory control, make sure you know who tracks what. The importance for strong inventory control processes is the same for businesses regardless of whether they offer goods, services, or both. Sure, plenty of costs and capital are bound in products (which of course is why those who do sell manufactured goods) […] June 27, 2023
Blog / The Importance of Understanding Email URL email checker hacker image It’s hard for computers to detect phishing attempts. Email is everywhere, but particularly in business, but people often forget just how recent a change this really is. For example, I (and I’m sure at least a portion of my readers) remember a time before big companies like London Drugs or Walmart even had websites, let […] June 20, 2023
Blog / Two Key Components of Wi-Fi Wi-Fi Signal Image Getting Wi-Fi policies right is just as important as setting it up securely. It wasn’t that long ago that having a wireless network in your business was a novel rarity, but nowadays? Not having wireless everywhere in your business is just rare as having it used to be. Much like email, Wi-Fi has become ubiquitous, even though […] June 13, 2023
Blog / A Few Tricks For Good Business Policies Business Policies Good business policies are essential for successful business. Cybersecurity has two main aspects. First are the familiar technical aspects like antimalware, web filtering, firewalls and all the rest. What often gets forgotten about are the non-technical aspects, but things like business policies and management attitudes play pivotal roles when it comes to cybersecurity. Policies are […] June 06, 2023

/Partners /Systems /Certifications

TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.