Blog / Why Do You Need a Password Manager? Vault wireframe denoting a password manager Keeping credentials in a password manager makes protecting yourself easier. I’ve talked a lot in this newsletter about passwords from the point of view of an organization. This generally means having appropriate acceptable use and password policies around user behavior and device configuration. You don’t want your staff using personal passwords, simple passwords, and so […] November 29, 2022
Blog / What’s in Your Service Level Agreements? Service Level Agreements concept rendered as button with three settings Here are three key points service level agreements should cover. Service level agreements, also known as SLAs, are the legal backbone of most software applications (primarily enterprise-level) and IT companies. They spell out the specific terms of a service being provided. However, no two SLAs are the same, and will likely vary considerably depending on […] November 24, 2022
Blog / The Scary Side of Cybersecurity Marketing Cybersecurity marketing Selling fear is far too common. As an industry, Cybersecurity is an incredibly young industry that really only became mainstream over the past two decades. Being such a young industry means the tactics that make sales are still being played around with. Unfortunately, a lot of those tactics currently seem to be built on buzz […] November 22, 2022
Blog / The Evolving Realities of Cyberinsurance cyberinsurance premiums are on the rise The cyberinsurance industry is changing. Cyberinsurance is proving to be a great source for topical cybersecurity newsletters. Recently I wrote about how cyberinsurance now includes physical protection of electronic data as a consideration. Then there was the case of the insurance company that lost a lawsuit for denying a ransomware claim with the excuse that […] November 15, 2022
Blog / The Three Biggest Cybersecurity Threats You Need To Know Different cybersecurity threats displayed onscreen Not all cybersecurity threats are made equal. We live in an age of relative plenty, at least as far as computer technology goes. With each new generation of hardware, software, and smart devices, our ability to leverage technology has never been more powerful. Unfortunately, that’s a double-edged sword, because despite all the useful applications out […] November 08, 2022
Blog / A Brief Dive Into PIPA’s Take On Passwords Note to remind people to be changing passwords Are you legally required to be regularly changing them? In last week’s newsletter I talked about a PIPA requirement regarding passwords that had serious implications when combined with PCI-DSS. That investigation led to a couple of other useful questions, so I figured it might be a good idea to dig into the details of it. […] November 01, 2022
Blog / Why is Changing Passwords Regularly So Important? Changing Passwords highlighted on keyboard For many, changing passwords isn’t just best practices; it’s the law. Regular readers of this newsletter will know, Alberta’s PIPA legislation has been a featured topic in this newsletter from time to time. I’ve also mentioned PCI-DSS more than once as well. However what I want to point out now is that PIPA and PCI-DSS […] October 25, 2022
Blog / Have You Checked What’s On Your Roof? drones with network intrusion equipment payload Drones are being weaponized with network intrusion equipment. Thanks to the rapid pace of technology, staying on top of the latest news is an absolute must for providing effective cybersecurity. A lot of that focus is on watching for vulnerabilities in important software, active attack campaigns, and problematic software patches (here’s looking at you, Windows). […] October 18, 2022
Blog / The Value of Segregated Networks Segregated Networks Concept Don’t assume your internal network is a safe. Segregated networks are a complicated affair, but there’s a good analogy to help explain  the idea; it’s like building a plant conservatory. Plants are separated according to a set of criteria, and have walkways between each type of plant that allow limited traffic through, in a sheltered […] October 11, 2022
Blog / Cyber security is not like the movies Attack Failed Although it is fast-paced and high stakes. Cyber security is a fast-paced business, and it’s important to keep tabs on current trends, tactics, and possible problem updates. That means I spend more time than you might think reading about about various breaches, and many of them read the same as all the rest. However, every […] October 04, 2022

/Partners /Systems /Certifications

TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.