Blog / Incident Response Plans vs Disaster Recovery Plans Are they really all that different? Having a solid incident response plan and disaster recovery plan are required by multiple regulatory frameworks and legislations (PIPA, PIPEDA and PCI-DSS all require them). These plans form the basis for how organizations deal with the situation when things go rather badly wrong. It’s important to have them in […] June 21, 2022
Blog / Refining Remote Work cloud storage As we put COVID behind us, it’s clear the predictions it would change the work world were mostly true and most people are working from home more than ever. Sure, office buildings haven’t become the glittery mausoleums in empty city centers that look like they could have been taken from a post-apocalyptic film set as […] May 26, 2022
Blog / Meta’s Data Privacy Problems: A Cautionary Tale Data privacy Even Facebook doesn’t know where user data goes. A recently leaked internal report from Facebook, Meta’s flagship service, shows the social media giant’s own data engineers can’t say with any real certainty where their users’ data is stored. If you’ll stand for a bit of editorializing, it’s ironic that the company known for data privacy […] May 16, 2022
Blog / The Legal Realities of Cyber Security Non-Compliance Cyber Security Legal Compliance concept When it comes to cyber security practices and why customers “can’t” do the things they should be doing, I’ve pretty much heard it all. “Isn’t there a cheaper alternative?” “We’ve been doing it this way since forever.” “Nothing’s gone wrong before.” “That seems too complicated.” I’ve heard plenty of other “reasons” for avoiding cyber security […] April 26, 2022
Blog / Basic Cyber Security Tips basic cyber security It’s funny how long weekends are meant to be relaxing and give us a chance to recharge, and yet it seems no matter how much fun R&R we get, the first day back can seem extra-hard. Maybe you got used to sleeping in, or maybe you had family over for an egg-hunt and it was […] April 19, 2022
Blog / Cyber Security Software Licenses Are A Must-Have Cyber security software license I’ve talked before about the differences between consumer grade and business class equipment, but there’s one product I’d like to focus on this week. One of the major differences between a business-class firewall and a consumer-grade firewall is that the former includes a license or support agreement of some kind  (though some consumer firewalls do […] April 12, 2022
Blog / Four Key Benefits of Virtualization Benefits of Virtualization Visualization Information technology covers a fairly broad variety of topics, but in general there are two major themes: hardware and software. Hardware of course refers to computers, servers, modems, and other physical items (like IoT devices), whereas software refers to the various operating systems and applications running on those machines. However, the difference doesn’t always have […] April 04, 2022
Blog / The Good, Bad, and Ugly of Cyber Loafing Cyber loafing Acceptable Use Policies, or AUPs, typically try to address two specific elements of employee behaviour: dangerous practices and productivity. The security risks of employees browsing dangerous and unacceptable sites on company computers are clear. However, when it comes to the productivity side of things, things aren’t nearly as clear cut. There’s sometimes conflicting information from […] December 02, 2021
Blog / Enforcing Your Acceptable Use Policy Effectively Acceptable Use Policy button As we’ve written about previously, having an Acceptable Use Policy (AUP) for your employees isn’t really an option in the business world these days. With so much work being done either on computers, online, or both, it’s imperative that you clearly define what employee behavior on company machines is acceptable and what is not. The […] November 18, 2021
Blog / 5 Key Considerations for Selecting a Managed Service Provider Businessman deciding on a new managed service provider There are plenty of benefits to partnering with a Managed Service Provider (MSP) for your IT needs. Outsourcing all or most of your IT can dramatically reduce your internal IT costs, improve efficiency across your organization, and substantially enhance your online/cyber security positioning. There are plenty of other benefits too. In every case though, you […] November 15, 2021

/Partners /Systems /Certifications

TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.