Blog / New Website that Reflects Our New Look! Trinus - Managed IT services website screenshot TRINUS is excited to announce the launch of our new website. We’ve restructured and reorganized our marketing presence to better reflect the passion of our team and the services we provide. October 02, 2017
Blog / A Treasure Hunt A Treasure Hunt Microsoft can request an audit of your licensed software Who doesn’t like the thrill of a summer Treasure Hunt.  Most often, I remember them from a church or company picnic, or a birthday party.  Sometime after the sandwiches and soft drinks, the hunt would be organized in the nearby bushes.  The prizes […] July 06, 2017
Blog / Fool Me Once, Shame on You … Fool Me Once, Shame on You … New ransomware virus follows same pattern as WannaCry Just about everyone is familiar with the idiom, fool me once, shame on you, fool me twice, shame on me. It’s one of life’s little lessons that we learn. No one likes to be tricked, but not learning from the […] June 28, 2017
Blog / The Tax Man cometh The Tax Man cometh Same old scam looks like a notice about a tax credit As someone who has worked in the business world for several decades, I’ve had the occasional visit from CRA – the Canada Revenue Agency (aka: the Tax Man). None of the visits were to present me with a refund cheque, […] June 22, 2017
Blog / It’s the Government, Man! It’s the Government, Man! Government of Canada issue warnings about the Internet of Things Devices I’m old enough to remember the Hippies of the 60’s – although I was a bit young to really understand what was going on.  It was a time when the Baby Boomers were into their teens and early 20s – […] June 14, 2017
Blog / Keep your Smartphone Clean Keep your Smartphone Clean Forgotten APPs collect on your phone long after their usefulness I am attending a conference this week in Grande Prairie.  It’s a chance to meet several clients and discuss their IT needs away from the busyness of their offices.  We attend about 1/2 dozen conferences each year.  This year, the organizers […] June 09, 2017
Blog / ZIP It! ZIP It! Popular File Archive format is a dangerous Email attachment In high school, I had one colourful teacher who was a bit rough around the edges.  She was a good teacher, but she had a blue-collar way of speaking that left her students wondering where they were – the classroom or the warehouse loading […] June 01, 2017
Blog / Hasta la vista, baby Hasta la vista, baby An easy way to create great passwords that are tough to crack Who doesn’t remember Arnold’s famous phrase from Terminator 2: Judgement Day. It’s not high art, but it is iconic. Arnold used it frequently during his political career. Sir Lawrence Olivier could never deliver a line like that.  But, is […] May 24, 2017
Blog / WannaCry Cryptoware Virus WannaCry Cryptoware Virus Latest Cryptoware virus uses familiar methods to attack computers globally I haven’t been back from vacation for much more than a week, and already I have lots to write about. The most recent fixation in the computer world is the WannCry virus. May 16, 2017
Blog / More Travel Woes – right from the comfort of your own home More Travel Woes – right from the comfort of your own home Latest Email SCAM targets unsuspecting travelers who use online airline check-in My Dad worked for airlines for most of his adult life; Air Canada and Pacific Western Airlines. Employees got a PERC of free airline passes (4 per year) for travel anywhere the […] April 07, 2017
Blog / Geek Travel Kit Geek Travel Kit What to take with you on your next trip to stay in touch During my last trip overseas, I found myself lugging around lots of overweight luggage. When it came to lifting my luggage, the look of the check-in agents at the airports was always the same – disdain.  I didn’t think […] March 29, 2017
Blog / Tales from the Jungle Tales from the Jungle How we take our pervasive technology for grantedI have returned! As many of you know, I spent the past 2-plus weeks traveling to – and working with – a client in Papua New Guinea. It’s not our normal sort of IT and Network support work, but rather training and enhancements to […] March 22, 2017
Blog / Travel Plans Travel Plans SmartPhones and Laptops can be examined at border crossings I am getting ready for some overseas travel next week, and as it’s a business trip that involves technology, I am taking a lot of it with me – 2 laptops, a tablet, and of course my SmartPhone. There was a timely information segment […] March 02, 2017
Blog / Hot Potato! Hot Potato! Regular backups are a necessary evil that no one wants to deal with By far the most common question/complaint we get when talking to clients concerns backups. It’s almost universally accepted that they need to be done, but few want the responsibility of taking care of them. February 22, 2017
Blog / TRINUS is a Proud Participant in the Stony Plain & Spruce Grove Chambers of Commerce M-2-M Discount Programs By participating in the respective Spruce Grove and Stony Plain & District Chambers of Commerce Member-2-Member Discount Programs, Parkland County business owners and their employees enjoy special savings and discounts offered by the companies affiliated to them. During challenging economic times, it is more important than ever to find innovative and economical solutions to reward […] February 16, 2017
Blog / If It Ain’t Broke, Don’t Fix It If It Ain’t Broke, Don’t Fix It Lack of proactive maintenance and replacements hits client hard My Dad always believed in preventative car maintenance.  Not only did he want to insure we had a good vehicle to use, he also loved to tinker with cars at the local garage. I got to tag along. This […] February 09, 2017
Blog / Be Prepared! Be Prepared! Contrasting approaches to Virus Countermeasures Impact Operations for 2 Clients I remember attending Boy Scouts as a youth.  The motto Be Prepared was drilled into us every week.  To reinforce it, they taught us lessons on how to build a campfire and cook over it, how to tie knots properly, and other skills […] February 06, 2017
Blog / You’re Busted! You’re Busted! Latest SPAM plays on basic human fear of getting caught speeding It was bound to happen sooner or later.  The hackers are sending out speeding tickets.  With just about every jurisdiction in North America using photo radar cameras to enforce speed limits and traffic laws, most of us are accustomed to receiving their […] January 30, 2017
Blog / Is Your Phone Number Unlisted? Is Your Phone Number Unlisted? Domain Name Registration SCAM Lures Clients Away From Legitimate Providers We just received our new phone book at home that is published by the Stony Plain Chamber of Commerce. Besides the nice Trinus computer ad, it has the traditional phone listings for all of the residents in the area. Our […] January 26, 2017
Blog / Life’s Little Irritations Life’s Little Irritations Windows 10 Update Service causes more problems than just user aggravation I was getting ready to leave the office last Friday; it was just before 5:00PM. Of course, I started to shut down my laptop and was presented with the message that “Windows is getting ready to update your computer; please do […] January 19, 2017
Blog / Now I Lay Me Down to Sleep … Now I Lay Me Down to Sleep … Complacent professional corporation is a ripe target for information theft I recently spent the better part of 2 days in a professional office in downtown Edmonton for meetings.  It wasn’t one of our clients; I was there representing someone else.  There was lots of downtime between sessions, […] January 16, 2017
Blog / More Stuff You Might Not Need More Stuff You Might Not Need Upcoming Trends in Technology from the Consumer Electronics Show About every other year, a colleague and I attend the Consumer Electronics Show (CES) in Las Vegas.  Yes, we have some fun, but the intent is to pick up on industry trends for future technologies that will be coming to […] January 13, 2017
Blog / Appropriate Technology Appropriate Technology Of paper, highlighters and calculators I recently had to prepare for a series of meetings.  My task was to review and distill about 5,000 pages of information into a timeline, picking out the important milestones and organizing them into something I could use for reference as the meetings progressed. The source documents were […] January 10, 2017
Blog / Pretty In Pink Pretty in Pink What’s it take to track down and eradicate a hacker attack … No, this is not a review of the 1986 movie starring Molly Ringwald; I’ve never even seen it – and from reading a few online reviews, I don’t want to. But it does refer to a recent episode whereby one […] January 02, 2017
Blog / Amway’s Evil Twin Sister Amway’s Evil Twin Sister Latest ransomware encourages victims to sacrifice their friends and colleagues. I’m sure most of you will remember Amway, it seemed impossible to avoid a friend or colleague that was selling their products in the home.  The marketing scheme was simple, but effective – as an Amway dealer, you were to leverage […] December 29, 2016
Blog / The BIGGER They are … The BIGGER They are … The harder they fall – Botnet attack brings down DYN, Twitter, Netflix, Amazon Our story today – dear readers – begins innocently enough with a very simple virus that penetrated several Internet-enabled devices that still had the default manufacturer’s passwords.  These were dumb devices like printers, routers, security (IP) cameras, […] December 26, 2016
Blog / Turn It Off Turn it Off Powering down computers at the end of the day can save more than power. It used to be that we’d recommend that clients restart their computers at least once a week; many people wanted to leave their computers on for extended periods of time, especially if they had complex configurations or a […] December 21, 2016
Blog / More Printer Woes More Printer Woes MFP Devices Keeps Infecting Corporate Network With Crypto-wall Virus We received an unconfirmed report from a client that a U.S. corporation was having trouble eradicating a crypto-wall virus from their network despite a wholesale restore from backups and a thorough anti-virus inspection of the workstations. It was the gift that kept on […] December 19, 2016
Blog / Mission Accomplished! Mission Accomplished! Twenty Ft. McMurray fire victims to receive refurbished computers for Christmas. No one can forget the devastation and panic the fires in the Ft. McMurray region caused this past summer. 80,000 plus people fled the area to get away from the raging fires that engulfed the region.  Hundreds of homes were destroyed, there […] December 14, 2016
Blog / The Devil You Know… The Devil You Know … IT Manager does malicious damage to local college You may have picked up on a recent news investigation report from CBC and others about the massive trouble at Norquest College.  It appears that back in February, 2013 a disgruntled IT Manager perpetrated two fraud schemes against senior staff as a backlash […] December 10, 2016
Blog / It’s BUDGET Time It’s BUDGET Time The leaves change colour and it’s time to start thinking about budgets. Many of our clients are municipalities who operate with a fiscal year and that coincides with the calendar year.  That means they need to start preparing budgets in the fall to insure their elected officials have time to review and […] September 10, 2016
Blog / Hackers Strike Another Unsuspecting Victim Hackers Strike Another Unsuspecting Victim Northern Alberta Municipality network is shutdown for up to 2 weeks. There has been a lot of (unwanted) media attention given recently to a municipality in Northern Alberta who has been fighting an intrusion into their network.  According to news reports the problems started back in July, but reached a […] August 31, 2016
Blog / I Need a REALLY BIG computer I Need a REALLY BIG computer There is more to document management than just scanning files We received a call the other day from a client asking for a REALLY BIG computer and a scanner.  Now, we’ll all for selling some gear to a client, but we asked a few more questions to dig in […] August 24, 2016
Blog / The BIG Phone Book: How do Email and website requests find you? The BIG Phone Book How do Email and website requests find you? We were recently transitioning a client to a new Email system.  It required that some settings be changed in their DNS to point to the new provider.  The matter was complicated by the addition of another technology provider who also needed to change […] August 22, 2016
Blog / What Did You Say? Firewall 101 What is a Firewall Anyway? I recently had a client ask me a question: What is a firewall?  I was somewhat taken aback as I had just Emailed them about the virtues of Advanced Persistent Threat (APT) Blocking service that we were recommending for the Dynamic Filtering Services on their Watchguard firewall … I might […] July 27, 2016
Blog / I Hate Passwords! Lax Password Enforcement is still a Priority Concern We hear the phrase I Hate Passwords in one form or another with monotonous regularity. I think I have muttered it under my breath several times recently. I decided to take inventory. Between personal and business, I added up the number of accounts that require some sort […] July 21, 2016
Blog / Katy, Bar the Door – Literally Physical Security Begins with a Simple Change in Door Locks Katy Bar the Door is a strange phrase with it’s origins in the story of Catherine Douglas from Scottish history of the 15th century. She used her arm to block a door that was left unbolted as the King and court escaped from would-be assassins. She […] July 14, 2016
Blog / Anti-virus Software is prone to attacks by the way it scans files for viruses We recently became aware of a bug in the Symantec EndPoint anti-virus software that makes it prone to virus attacks. The vulnerability is common to just about all versions of Symantec anti-virus products including Norton, EndPoint, Email, and SharePoint AV products. The vulnerability has to do with the way Symantec checks executable (exe) files for […] July 08, 2016
Blog / Trinus Tech Tips Trinus 10 Tech Tips    1. When you get an email from your bank, PayPal, eBay, or anyone claiming that your account has a problem it is probably a phishing scam intended to get you to type in your password. DO NOT ever click on the links in the message. 2. Nobody will email you […] April 29, 2016
Blog / Trinus Recommendations for Windows 10 Trinus Recommendations for Windows 10 – March 29, 2016 Windows 10 is a free upgrade that is available until July 29th, 2016. If you are unsure if you should upgrade to Windows 10 – or what effect it will have on your computer or business, Trinus provides these recommendations. March 29, 2016
Blog / Technology for Learning Trinus is excited to announce that we are apart of the Bring Your Own Device (BYOD) initiative for the Parkland School Division.  All of the devices that we offer meet the requirements and guidelines for the devices needed in the classroom.  Our qualified technicians will help you child pick the best device for their needs and can […] March 08, 2016
Blog / Windows 10 Wifi Sense Windows 10 brings with it a host of new features designed to make using Windows 10 easier and better than all versions before it.  One of these new features however, dubbed “Wifi Sense” may not just make life easier but, could make your wireless network less secure. In a nutshell, Wifi Sense is a feature […] August 05, 2015
Blog / Windows 10 Hello: As you may know, Microsoft is releasing a new desktop Operating System (O/S) on July 29, 2015, called Windows 10. There are purported to be many advantages to this O/S  over the current Windows 7 or 8 that you use now.  Another significant advantage is that Windows 10 will be free of charge to existing Windows […] July 07, 2015

/Partners /Systems /Certifications

TRINUS is proud to partner with Industry Leaders for both hardware and software who reflect our values of reliability, professionalism and Client-focused service.