Blog / How Much Cybersecurity Is Too Much? An image of multiple locks demonstrating how much cybersecurity is required these days The Cost of Efficiency Depends on How Much Cybersecurity is Required. While the technicalities of cybersecurity are often tricky, some aspects are fairly straightforward. Like pretty much every other aspect of our lives–be it added luggage searches at airports, payment cards and turnstiles in bus terminals, or even just locking the deadbolt on your way […] July 02, 2024
Blog / Computer Maintenance and Its Importance Miniature men fixing and providing tech support and computer maintenance for a motherboard Repairs and replacements are only part of proper computer maintenance. It should go without saying that regular maintenance is important no matter what you’re talking about. For example, good vehicle maintenance means regular oil changes, changing bald tires, and checking your brakes. There’s plenty else involved, but these three examples of proper automobile upkeep also […] June 18, 2024
Blog / The State of Cybersecurity – May 2024 The current state of cybersecurity This week we’re pleased to offer a special edition of our IT newsletter, The State of Cybersecurity, by TRINUS CEO and our very own IT guru, Kevin White. Rob Bot, Grace, and your Friendly Neighbourhood Cyber-man will return with a new video newsletter next week. Despite an increasing awareness of cyber security incidents, two common […] June 11, 2024
Blog / Multi-Factor Authentication Makes Multilayered Security Possible Passwords and Multi-Factor Authentication Are Complements, Not Replacements. Historic technicalities aside, users have always needed to provide two pieces of information when logging into a computer: their username, and its associated password. However, a relatively new process known as multi-factor authentication (MFA) is threatening to change that. Technology in general—and information technology (IT) specifically—develops at […] May 28, 2024
Blog / Beware the Fine Print When Making Cyber Insurance Claims Image showing concept of how cyber insurance claims are denied. Don’t Let Insurers Deny Your Cyber Insurance Claims The process for making cyber insurance claims is almost identical to making auto insurance claims, and as anyone who’s been on the receiving end of a denied auto-claim can attest, the devil is deep in the details; you can only take your car to the dealership for […] May 07, 2024
Blog / The Stormy Side of Cloud Services Storm Clouds Representing Cloud Services Causing Problems Some Cloud Services Could Lead to Turbulence For Your Organization Cloud services have become incredibly prolific over the last few years. Different clouds have appeared in various forms over the decades, but recently they’ve become substantially more popular and can be found in organizations of every size. It’s reached the point that some organizations and […] April 30, 2024
Blog / The End of Windows 10 Windows 11 upgrade prompt on desktop screen Are you ready for Windows 11? On October 14, 2025, Windows 10 will reach its End-of-Life (EoL). To be fair, that doesn’t sound troubling since it’s well over a year away still. But perhaps a better way to phrase the statement, at least when it comes to your computer fleet’s OS, would be to say […] April 16, 2024
Blog / Setting Up Secure Water Treatment Plants Water Treatment Plants in a rural field The Dangers of Unsecured Water Treatment Plants Water treatment plants are everywhere. That’s because there are serious challenges involved in transporting water. For one, it flows downhill easily, but sending it uphill is a different story and requires pipes, pumps, and the energy to run them. Pipelines are expensive and impractical, and there are plenty […] April 02, 2024
Blog / Clear Communication Is Crucial When Things Go Wrong Incident Response Policies Notification Incident Response Policies and why your business needs one. Before getting into the details, let me be clear; one of the most important reasons why your organization needs an Incident Response Policy, or IRP, is for compliance. But I’ve written a lot about the importance of compliance with regulations like Alberta’s privacy legislation PIPA or […] March 19, 2024
Blog / Living in the Age of AI An AI face looking down on a person. Do you have policies regarding the use of AI? Recently I wrote about how artificial intelligence, or AI, was used to help create a deep fake that successfully scammed an organization out of a sizeable $35 million (CAD). Tools like ChatGPT and OpenArt have been growing in their scope, accuracy, flexibility, and importantly, business popularity, […] March 12, 2024

/Partners /Systems /Certifications

TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.