Blog / Resetting Passwords Properly Resetting Passwords Resetting passwords can be dangerous when done wrong. Staying modern and on top of trends is important in any profession, but particularly cybersecurity. Situations can develop quickly, as quickly as computers can process things sometimes, so it’s important to be as prepared as possible by actively seeking out reports on attacks, exploit campaigns, and any […] July 04, 2023
Blog / Inventory Control and Security Inventory Control When it comes to inventory control, make sure you know who tracks what. The importance for strong inventory control processes is the same for businesses regardless of whether they offer goods, services, or both. Sure, plenty of costs and capital are bound in products (which of course is why those who do sell manufactured goods) […] June 27, 2023
Blog / The Importance of Understanding Email URL email checker hacker image It’s hard for computers to detect phishing attempts. Email is everywhere, but particularly in business, but people often forget just how recent a change this really is. For example, I (and I’m sure at least a portion of my readers) remember a time before big companies like London Drugs or Walmart even had websites, let […] June 20, 2023
Blog / Two Key Components of Wi-Fi Wi-Fi Signal Image Getting Wi-Fi policies right is just as important as setting it up securely. It wasn’t that long ago that having a wireless network in your business was a novel rarity, but nowadays? Not having wireless everywhere in your business is just rare as having it used to be. Much like email, Wi-Fi has become ubiquitous, even though […] June 13, 2023
Blog / A Few Tricks For Good Business Policies Business Policies Good business policies are essential for successful business. Cybersecurity has two main aspects. First are the familiar technical aspects like antimalware, web filtering, firewalls and all the rest. What often gets forgotten about are the non-technical aspects, but things like business policies and management attitudes play pivotal roles when it comes to cybersecurity. Policies are […] June 06, 2023
Blog / Use Risk Assessments Before Providing Access Risk Assessments on dial Risk assessments let you evaluate the risks of offering external access. Any time you consider providing access to something inside your network it’s important to handle the situation properly. Usually though, the only thing most people think about is the business need or why doing so might be useful. But making a decision solely on […] May 30, 2023
Blog / Some New Cyberinsurance Requirements Changing cybersinsurance requirements New cyberinsurance requirements mean getting coverage could be getting harder. As TRINUS’s head of cybersecurity, I’m regularly helping clients fill out cybersinsurance applications, so I get to see all sorts of forms from plenty of different insurance companies. I also make it a point to stay informed about all the latest cybersecurity and insurance information. […] May 23, 2023
Blog / Fire Season Has Started In Alberta Computers backups in fire As wildfire season is upon us, and we witness the unfortunate impact it has on numerous businesses, the importance of having a robust disaster recovery plan and reliable backups cannot be stressed enough. That’s why we felt compelled to address three vital aspects of effective backups that deserve your immediate attention: Safeguard Your Backups during […] May 09, 2023
Blog / Email: Inhouse or Cloud Based? Email server Inhouse and Cloud email can’t both be right, right? Cloud services have long been touted as the future of computing. You don’t need to spend money on hardware, which is nice, but you do need to pay a monthly subscription. One of the other claims is that the security is improved. This can be true, […] April 18, 2023
Blog / Time to Catch Up on Exchange Patches Microsoft Exchange Patches for Servers Microsoft has announced they’re going to start enforcing policies about Exchange patches. It seems like Microsoft Exchange has been the focus of hacker attackers for a long time now, though considering how common it is and that focusing on common software maximizes hackers’ potential for “positive” results, it’s not exactly surprising. It’s the same reason […] April 04, 2023

/Partners /Systems /Certifications

TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.