Blog / A Few Tricks For Good Business Policies Business Policies Good business policies are essential for successful business. Cybersecurity has two main aspects. First are the familiar technical aspects like antimalware, web filtering, firewalls and all the rest. What often gets forgotten about are the non-technical aspects, but things like business policies and management attitudes play pivotal roles when it comes to cybersecurity. Policies are […] June 06, 2023
Blog / Use Risk Assessments Before Providing Access Risk Assessments on dial Risk assessments let you evaluate the risks of offering external access. Any time you consider providing access to something inside your network it’s important to handle the situation properly. Usually though, the only thing most people think about is the business need or why doing so might be useful. But making a decision solely on […] May 30, 2023
Blog / Some New Cyberinsurance Requirements Changing cybersinsurance requirements New cyberinsurance requirements mean getting coverage could be getting harder. As TRINUS’s head of cybersecurity, I’m regularly helping clients fill out cybersinsurance applications, so I get to see all sorts of forms from plenty of different insurance companies. I also make it a point to stay informed about all the latest cybersecurity and insurance information. […] May 23, 2023
Blog / Fire Season Has Started In Alberta Computers backups in fire As wildfire season is upon us, and we witness the unfortunate impact it has on numerous businesses, the importance of having a robust disaster recovery plan and reliable backups cannot be stressed enough. That’s why we felt compelled to address three vital aspects of effective backups that deserve your immediate attention: Safeguard Your Backups during […] May 09, 2023
Blog / Email: Inhouse or Cloud Based? Email server Inhouse and Cloud email can’t both be right, right? Cloud services have long been touted as the future of computing. You don’t need to spend money on hardware, which is nice, but you do need to pay a monthly subscription. One of the other claims is that the security is improved. This can be true, […] April 18, 2023
Blog / Time to Catch Up on Exchange Patches Microsoft Exchange Patches for Servers Microsoft has announced they’re going to start enforcing policies about Exchange patches. It seems like Microsoft Exchange has been the focus of hacker attackers for a long time now, though considering how common it is and that focusing on common software maximizes hackers’ potential for “positive” results, it’s not exactly surprising. It’s the same reason […] April 04, 2023
Blog / The Importance Of Your Ransomware Response ransomware response Getting it wrong could mean costly penalties. Ransomware is a topic that I’ve covered in the recent past, so much so that you’ve read or at least seen a few of them like this one, or this one, or maybe even this one (just to point out a few). It comes up so often it […] March 21, 2023
Blog / Three Main Benefits of Cloud Backups for Businesses Cloud backups concept in gray and white Plus a bonus cybersecurity perk of cloud backups! The existence of the Cloud is a relatively new development compared with the need to backup data. Prior to the widespread adoption of the internet, data backups were generally kept in case of physical failure and corruption on devices, and were kept on premises using physical storage […] March 09, 2023
Blog / How to get the most out of your technology budget Technology budget represented by a piggy back on a computer keyboard Here are three ways to ensure your technology budget covers all your bases. Technology is great, but it can be remarkably expensive, and, in business at least, it’s meant to help improve your bottom line and not blow your budget. Unfortunately too many organizations—businesses, municipalities, clinics, and non-profits alike—don’t fully understand the scope of their […] March 02, 2023
Blog / What common cyberattacks do companies routinely ignore? a man in a mask using a prop to demonstrate common cyberattacks like phishing Phishing attacks are common cyberattacks and not to be underestimated. Email has been around for a long, long time. Its origins date back over 60 years to the 1960s. Email, in the form we are familiar with today was developed in 1980. Younger readers of this newsletters may not remember a time when email was […] February 28, 2023

/Partners /Systems /Certifications

TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.