Blog / Cheaper technology means less security The evolution of cameras as an example of cheaper technology As devices evolve, cheaper technology is leaving some vulnerable. As technology advances, what used to be cutting edge becomes commonplace and unmoving. Take cameras, for example. They used to be specialized and expensive, the sort of things only businesses and professionals used. Then came personal cameras like those touristy yellow-block Kodaks and the now famous […] October 17, 2023
Blog / Can Your Cybersecurity Posture Stand Up to… Cats? Cat attacking a company's cybersecurity posture by accident A flexible, adaptable cybersecurity posture is key. Keeping up-to-date on the latest and most dangerous cybersecurity attacks is a key part of my responsibilities at TRINUS. This means plenty of online research about breaches and other cybersecurity events the world over (hackers typically know no borders). By tracking these events, cybersecurity professionals like myself get […] October 10, 2023
Blog / Phishing Attacks Are Overtaking Ransomware Phishing attacks button with fishing hook on red-lit keyboard The hacks you need to defend against these days are phishing attacks. When it comes to hackers’ preferred cybersecurity attacks, the computer industry goes through phases. For a long time malware was the main agitator, and the main advice you heard was just to put antiviral software everywhere. Over the past few years there’s been […] October 03, 2023
Blog / Filtering websites is important for any organization. Filtering websites leading to a blocked screen How filtering websites works and what are the limitations? It’s almost common knowledge these days that filtering websites is an important task for pretty much every business. But why? It’s not just to keep employees productive or off Facebook. It’s actually about liability, and not just the kind that crops up when one employee catches […] September 26, 2023
Blog / Microsoft is Disabling Old Windows TLS Encryption. TLS encryption gears and a lock Disabling TLS could break nothing, or everything! Recently Microsoft announced they were going to be disabling TLS 1.0 and 1.1. This may sound like gibberish to you but the implications are significant. But before I get into why this is a big deal, I’ll explain what TLS actually is. TLS stands for ‘Transport Layer Security’ […] September 19, 2023
Blog / When cybersecurity incidents hit close to home. cybersecurity incidents represented by a shield with a green check deflecting an attack. What can we learn from local cybersecurity incidents? Whether you know it or not, cybersecurity affects all of us, even you and even if you’re not even online! That’s because you don’t need to be online for your data to be put at risk. If you’ve ever even just interacted with a business or service […] September 12, 2023
Blog / Network Security Basics Network Security concept with locks in green showing they're secure When it comes to network security, any service connecting to the internet can be leveraged. One of the most common questions about network security that cybersecurity specialists get is how hackers can attack an organization. The unfortunate truth is that pretty much any connection a machine has to the outside world can be used as […] August 29, 2023
Blog / Cloud vs. Onsite Servers A wireframe mockup of the cloud server farms used by providers What are the pros and cons of cloud servers as opposed to onsite ones? Cloud servers and services have long been touted as the ultimate server solution for both individuals and businesses. For one, their upfront costs are substantially lower than buying a server, and for another they come with their own infrastructure (a secured […] August 22, 2023
Blog / How much life does your computer hardware have left? old computer hardware in need of replacement Waiting for computer hardware to break is bad replacement policy. Although it’s rarely top-of-mind at the time, we all typically consider how long a product will last, even if we never calculate a precise time length or put it into words. That’s all fine and dandy for private life, but it’s a different story when […] August 15, 2023
Blog / A Refresher On Canada’s Antispam Legislation (CASL) CASL concept Understanding CASL rules can save you plenty of headaches. As regular readers know by now, compliance is a huge part of the cybersecurity domain or job scope. Yes, there’s plenty of patching and updating firewalls for ransom/malware protection, but pretty much every business today offers some kind of online payment program or collects private information, […] August 01, 2023

/Partners /Systems /Certifications

TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.