Blog / Dealing With Problematic Password Security Practices Password security can be a persistent problem. Passwords have been central to cybersecurity and user authentication since the dawn of the modern computing era, and the logic behind using them has remained the same; people can prove they are who they claim to be by providing information only the appropriate user would know. That’s why […] November 19, 2024
Blog / Why is Application Whitelisting the King of Cybersecurity? A Brief History of Application Whitelisting. To understand the real value of application whitelisting, it’s important to remember the context of this lesser known but powerful cybersecurity defense tool. As you’ve likely already heard or know by now, the computers NASA used during the original Apollo missions were incredibly advanced for their time. But of […] November 05, 2024
Blog / When should you perform a cost-benefit analysis? A cost-benefit analysis is important for every project no matter how small. One tool often invoked to help keep organizations from making poor choices is the cost-benefit analysis, also know as a risk analysis. The idea is simple; instead of focusing mostly (or even sometimes exclusively) on the benefits of a proposed change, as we […] October 29, 2024
Blog / Let’s Talk About PCI-DSS Compliance PCI-DSS Compliance Impacts Almost Every Organization. I’ve been writing for TRINUS for seven years now. Early in 2017, before articles about PCI-DSS compliance and when our newsletter topics were more broadly focused on all things information technology, I wrote about the realities of cyberbullying, and while researching it I discovered some surprising facts about Alberta […] October 01, 2024
Blog / Monitoring Network Activity For Hidden Hackers Complacency is a risk when it comes to monitoring network activity. While an excellent cybersecurity program includes plenty of technical defenses like email filtering, firewalls, and the timely application of software security updates, most of the day-to-day work involves monitoring network activity and watching IT infrastructure for abnormal behaviour. However, monitoring isn’t so much a […] September 17, 2024
Blog / Cloud accounts are not local accounts Giving cloud accounts the cybersecurity attention they’re due. Cloud services used to be rare but have grown radically since their introduction, and many different kinds have been created over the years. There are data and file storage clouds which are likely the best known variety and include well-known products like OneDrive, iCloud, or Google Drive. […] August 27, 2024
Blog / Decrypting the Secrets of Drive Encryption What is drive encryption and what does it protect against? Although the term may sound new to some, drive encryption isn’t a particularly new cybersecurity concept. For example, Bitlocker, likely Microsoft’s best known drive encryption tool, has been available since at least 2016. In fact, it’s a proven and effective strategy for reducing risk exposure, […] August 13, 2024
Blog / Is There Such A Thing As Too Much Monitoring? Effective Monitoring is Efficient Monitoring One of the cornerstones of good cybersecurity is monitoring devices and their activity on your network. After all, you need to keep an eye on what’s happening with your organization’s machines if you hope to detect and defeat threats that have slipped by your defenses, and doing that means monitoring […] July 23, 2024
Blog / Decryption as a Service? Ransomwares’ latest decryption trick is just one reason to stay up-to-date about cybersecurity. When it comes to security it’s vitally important to ensure your defenses, and the procedures to support them, are actually useful. Any security system that isn’t properly supported and maintained—from physical security like keycard readers on locked doors to cybersecurity tools like […] July 16, 2024
Blog / The Importance of Locking Computers Physical security is too often overlooked When most people contemplate cybersecurity they think about the many technical considerations it entails, such as firewalls and malware detection meant to defend against hackers and remote attacks. However, each machines’ actual physical security is unfortunately too often overlooked. We briefly touched on this very subject last week with […] July 09, 2024
Post navigation
/Partners /Systems /Certifications
TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.