Blog / Have You Checked What’s On Your Roof? drones with network intrusion equipment payload Drones are being weaponized with network intrusion equipment. Thanks to the rapid pace of technology, staying on top of the latest news is an absolute must for providing effective cybersecurity. A lot of that focus is on watching for vulnerabilities in important software, active attack campaigns, and problematic software patches (here’s looking at you, Windows). […] October 18, 2022
Blog / The Value of Segregated Networks Segregated Networks Concept Don’t assume your internal network is a safe. Segregated networks are a complicated affair, but there’s a good analogy to help explain  the idea; it’s like building a plant conservatory. Plants are separated according to a set of criteria, and have walkways between each type of plant that allow limited traffic through, in a sheltered […] October 11, 2022
Blog / All About Data Hygiene data hygiene concept Don’t let decaying data damage your business. We’ve talked about the high value of data plenty of times before, so we’re not going to go on about how important it is for your data to be well-protected. That’s what our friendly neighbourhood cyber-man’s cybersecurity newsletter is for. Instead we’re going to take the next few […] October 06, 2022
Blog / Cyber security is not like the movies Attack Failed Although it is fast-paced and high stakes. Cyber security is a fast-paced business, and it’s important to keep tabs on current trends, tactics, and possible problem updates. That means I spend more time than you might think reading about about various breaches, and many of them read the same as all the rest. However, every […] October 04, 2022
Blog / Has your password been pwned? pwned Don’t wait for a breach to find out. Passwords are the cornerstone of good security, and should be supported with two- or multi-factor authentication. However, as you can read about in our recent newsletter about the Uber breach, MFA isn’t a magic wand that fixes all password issues. Good password hygiene and habits are still […] September 27, 2022
Blog / Compliance as a Service Compliance as a Service Getting compliance right is worth the price. It seems like everything comes as a service these days. The most well known of these is likely SaaS, or Software as a Service, of which there are hundreds of thousands of variants these days when you include everything from Microsoft 365 to monthly game and app subscriptions. […] September 22, 2022
Blog / Uber’s Two-factor Failure UBER logo on broken phone for 2fa failure Using TFA properly means configuring it right and training personnel. Did you know Uber was recently hacked? The ride-share and now food delivery giant admitted a contractor’s credentials had been compromised and hackers were able to gain access to sensitive information. Don’t worry yet; although the damage is still being ascertained, the hackers apparently couldn’t […] September 20, 2022
Blog / What’s the Deal with Email Security? Encrypted email After 20 years email has got to be secure by now, right? Not so very long ago, email was a fresh, new tool that the kids in college were raving about that nobody outside academia cared about. Back in the 80s and early 90s many organizations didn’t use email at all. Obviously a lot has […] September 13, 2022
Blog / 4 Reasons to Invest in Technology Training technology training concept Keep your teams’ technology skills sharp. Change may be inevitable, but it usually creeps up on us. Technology in specific, however, seems to change and advance overnight. In fact, the rapid pace of technological growth makes maintaining and improving technology skills all the more important, which means it’s easier than ever to fall behind. Fortunately, […] September 08, 2022
Blog / Drive With Your Eyes Open Security Monitoring Keeping an eye on your organization’s security requires focus and attention. When it comes to protecting your organization, there are some common, almost universally understood requirements. Installing a firewall at the edge of your network is both an obvious security requirement and an obvious example. It’s the same when it comes to installing antimalware software. […] September 06, 2022

/Partners /Systems /Certifications

TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.