Blog / Meta’s Data Privacy Problems: A Cautionary Tale Data privacy Even Facebook doesn’t know where user data goes. A recently leaked internal report from Facebook, Meta’s flagship service, shows the social media giant’s own data engineers can’t say with any real certainty where their users’ data is stored. If you’ll stand for a bit of editorializing, it’s ironic that the company known for data privacy […] May 16, 2022
Blog / The Legal Realities of Cyber Security Non-Compliance Cyber Security Legal Compliance concept When it comes to cyber security practices and why customers “can’t” do the things they should be doing, I’ve pretty much heard it all. “Isn’t there a cheaper alternative?” “We’ve been doing it this way since forever.” “Nothing’s gone wrong before.” “That seems too complicated.” I’ve heard plenty of other “reasons” for avoiding cyber security […] April 26, 2022
Blog / Basic Cyber Security Tips basic cyber security It’s funny how long weekends are meant to be relaxing and give us a chance to recharge, and yet it seems no matter how much fun R&R we get, the first day back can seem extra-hard. Maybe you got used to sleeping in, or maybe you had family over for an egg-hunt and it was […] April 19, 2022
Blog / Cyber Security Software Licenses Are A Must-Have Cyber security software license I’ve talked before about the differences between consumer grade and business class equipment, but there’s one product I’d like to focus on this week. One of the major differences between a business-class firewall and a consumer-grade firewall is that the former includes a license or support agreement of some kind  (though some consumer firewalls do […] April 12, 2022
Blog / Four Key Benefits of Virtualization Benefits of Virtualization Visualization Information technology covers a fairly broad variety of topics, but in general there are two major themes: hardware and software. Hardware of course refers to computers, servers, modems, and other physical items (like IoT devices), whereas software refers to the various operating systems and applications running on those machines. However, the difference doesn’t always have […] April 04, 2022
Blog / The Good, Bad, and Ugly of Cyber Loafing Cyber loafing Acceptable Use Policies, or AUPs, typically try to address two specific elements of employee behaviour: dangerous practices and productivity. The security risks of employees browsing dangerous and unacceptable sites on company computers are clear. However, when it comes to the productivity side of things, things aren’t nearly as clear cut. There’s sometimes conflicting information from […] December 02, 2021
Blog / Enforcing Your Acceptable Use Policy Effectively Acceptable Use Policy button As we’ve written about previously, having an Acceptable Use Policy (AUP) for your employees isn’t really an option in the business world these days. With so much work being done either on computers, online, or both, it’s imperative that you clearly define what employee behavior on company machines is acceptable and what is not. The […] November 18, 2021
Blog / 5 Key Considerations for Selecting a Managed Service Provider Businessman deciding on a new managed service provider There are plenty of benefits to partnering with a Managed Service Provider (MSP) for your IT needs. Outsourcing all or most of your IT can dramatically reduce your internal IT costs, improve efficiency across your organization, and substantially enhance your online/cyber security positioning. There are plenty of other benefits too. In every case though, you […] November 15, 2021
Blog / Have you heard of the Principle of Least Privilege? Fingerprint refused access to files representing the Principle of Least Privilege There’s lots of advice to be given about how to set up your computer security. The toolbox is massive, with plenty of different models to choose from. A security model or framework, like the Principle of Least Privilege, is just an outline that doesn’t contain specific items (like “enable this exact settings” and such). Instead, […] November 02, 2021
Blog / 4 Tricks for Faster Computers from your IT Experts Slow computer being timed by IT Experts using a stopwatch One of the most common technical issues users run into is the problem of slow-running computers. Regardless of whether you’re a business chasing better hardware investment returns or a casual user trying to get the most out of an outdated machine, there are several low-tech solution solutions you can try out yourself before calling in […] November 01, 2021

/Partners /Systems /Certifications

TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.