Blog / Don’t Mistake Cyber Resiliency for Cyber Security Cyber Resiliency on keyboard button with wrenches Have you ever considered your organization’s cyber resiliency? Don’t feel bad if you said no. In fact, the truth is you probably have but just didn’t know it. That’s partly because cyber resiliency is a fairly broad ranging subject that encompasses multiple topics. In a nutshell, cyber resilience is an organization’s ability to resist or […] November 09, 2021
Blog / Have you heard of the Principle of Least Privilege? Fingerprint refused access to files representing the Principle of Least Privilege There’s lots of advice to be given about how to set up your computer security. The toolbox is massive, with plenty of different models to choose from. A security model or framework, like the Principle of Least Privilege, is just an outline that doesn’t contain specific items (like “enable this exact settings” and such). Instead, […] November 02, 2021
Blog / Password Policies Are More Than Just Paperwork password policies as part of protecting online privacy There are plenty of regulations out there when it comes to your organization’s electronic security. The most common ones I’ve encountered are PIPA (Personal Information Protection Act, an Alberta regulation that governs the protection of personal information),  PIPEDA (Personal Information Protection and Electronic Documents Act, a federal version of the Albertan act) and PCI-DSS (Payment […] October 26, 2021
Blog / How to approach computer and IT security Road sign about IT security approaches How do you approach IT security? Where do you start and what should you do? These are great questions that people ask all the time because IT security is an understandably specialized field that requires more training than natural skill. There’s a lot that you need to know before you even start to get good […] October 19, 2021
Blog / Are you important enough to get hacked? There’s an interesting misconception out there—a myth, if you will—that your organization is too small and unimportant to be worth hacking or being held to a ransomware demand. It’s comforting to believe, for any reason, that your organization won’t suffer an attack. It may not be true, but it’s comforting. I think this belief comes […] October 12, 2021
Blog / Watering Hole Attacks: What they are and how to avoid them Watering hole attacks represented by a do not drink sign I’ve talked about many different kinds of attacks over the course of this newsletter. Ransomware gets a lot of attention (since it’s such a common attack), but I’ve also talked about phishing, social engineering, cross-site scripting and other types of attacks. It’s important to understand the vocabulary of computer security if you don’t want to […] October 05, 2021
Blog / Have you heard of a thing called smishing? Person opening a smishing message on their phone One thing you should understand about computer people is that we love to give things funny or clever names, and we love our acronyms. Computer hardware storage sizes are a great example. It’s all about bits and bytes (and there’s even an old out-of-use term known as a nibble). These are real terms that I’m […] September 28, 2021
Blog / Email Security Is More Important Than Ever Padlock and envelopes concept of email security Email is an amazing tool that just about everyone is at least partly familiar with. Every day, millions of emails are sent across the globe. But that’s not even the most amazing thing about it. The truly incredible thing about email is its complete and utter lack of built-in security. That’s right. When you boil […] September 21, 2021
Blog / Computer Security Basics Are Always Evolving Business man upgrading computer security practices What’s considered common sense in computer security is always changing. In fact, if I had to describe the world of computer security in one word, it would be ‘volatile’. Unfortunately too many people think this just means the bad guys are constantly evolving their tactics. Too often they forget that, in this context, volatility also […] September 14, 2021
Blog / Layered Security is Your Network’s Best Defense Layered security represented by three interlocking padlocks Another day, another breach of a major company. This time around it’s T-Mobile, one of the major US cellular carriers, who apparently wasn’t using layered security as part of their defenses. The hacker claiming to be responsible is active on Twitter, and claims the attack was politically motivated by an alleged abduction and subsequent torture […] September 07, 2021

/Partners /Systems /Certifications

TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.