Blog / Industrial control equipment vulnerabilities IT Security is much like any other industry; sometimes there are good days, sometimes there are dull days, and sometimes there are bad days. Now, because I work in IT security my definitions of good, bad, and dull may not be what you would expect. A “good day” is one where a new major vulnerability […] May 25, 2021
Blog / FragAttacks: What they are and how to protect yourself In case you hadn’t heard, the big news in computer security right now are FragAttacks. FragAttacks (Fragmentation and Aggregation Attacks) consist of 12 separate vulnerabilities revolving around how wireless devices split up and transmit data. Wired connections send each packet of data individually, but this process is too wasteful for wireless connections, which combine the […] May 18, 2021
Blog / Secret doesn’t mean secure No one could really blame you for thinking that the internet is basically just a collection of email and websites. After all, websites are pretty much the only things most search engines (including Google) return. When websites are the only thing most people ever get presented with, it’s easy to understand why some people might […] May 11, 2021
Blog / Actively Monitoring Cybersecurity Solutions It’s well known that antiviral software should be installed on all your computers. It’s also well known that it should be setup on your firewalls along with your intrusion prevention system. What’s not very well understood is that things like this need to be looked in on from time to time. There’s an assumption that […] May 04, 2021
Blog / Shunning Shared Administrator Accounts One of the most effective ways to compromise anything is to misuse the authority of those in charge. This applies to politics, business, computers, or anywhere with an hierarchy or authority structure of any kind. Any secure environment should have some kind of authentication, double-checks, or other additional measures to prevent both accidental and intentional […] April 26, 2021
Blog / Protecting Your Personal Privacy in an Online World keyboard with button replaced by blue privacy button No one likes to have “The Man” looking over their shoulder all the time. A certain degree of monitoring is required and even expected for that extra layer of security (like cameras in the office, login monitoring, etc.), but when does it become too much? When is enough, well, enough? And how much tracking actually […] April 19, 2021
Blog / Facebook scraped for massive amounts of data In case you haven’t heard, Facebook has had a data breach. A big one. How big? A little over 500 million records (about 20% of it’s users). In fact it was so big that the website haveibeenpwned.com added a totally new search feature when the information was posted. So yeah, it was pretty big. But how did […] April 12, 2021
Blog / The Cloud: Soft, Fluffy, and Secure “The Cloud” is often touted as being the greatest thing since sliced bread. It’s amazing! It’s fast, it’s secure, it’s inexpensive, and it’s [insert your favourite feature here]! Honestly with the list of great features and things it can do, it’s a wonder that anyone buys there own computers anymore, right? But is the Cloud […] April 04, 2021
Blog / Disaster Recovery and Business Continuity plans What do you do in the event of a fire in office? Not a small one mind you, a big one. What about a flood? Have you considered an earthquake? What do you do (as a business) when things go horribly, terribly, massively, wrong? You turn to your Disaster Recovery(DR) and/or Business Continuity(BC) plans. These […] March 29, 2021
Blog / What is Social Engineering? When most people think about hacking they normally picture something out the movies. You know the scene; some hooded hacker at a keyboard performing all sorts of technological wizardry to get around a computer’s defenses. Unfortunately that’s also exactly how most organizations set up their hacking defenses. The problem is there’s a hole in that […] March 22, 2021

/Partners /Systems /Certifications

TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.