Blog / Why is Network Segregation Important? Don’t let the bad guys weaponize your own network against you. One of the common results of the security audits I perform is the recommendation to segregate the client’s networks. In fact, network segregation is often viewed as just a way to organize or devices and usually gets put into the pile of other IT […] July 12, 2022
Blog / Insuring Yourself Against Cyber War The devil is in the details, or in this case, the changing fine print. Recently I wrote about how an insurance company tried to deny a payout by claiming the ransomware was an act of war. That was four months ago, near the start of the still-ongoing Russian/Ukrainian conflict and while I haven’t mentioned it […] June 28, 2022
Blog / Incident Response Plans vs Disaster Recovery Plans Are they really all that different? Having a solid incident response plan and disaster recovery plan are required by multiple regulatory frameworks and legislations (PIPA, PIPEDA and PCI-DSS all require them). These plans form the basis for how organizations deal with the situation when things go rather badly wrong. It’s important to have them in […] June 21, 2022
Blog / What’s the worst cyber attack to get hit by? Not all digital assaults are coded the same. When it comes to targeting an organization for a cyber attack, hackers sadly have plenty of options. Things like Dedicated Denial of Service (DDoS) attacks, viruses, business email compromise, are just a few major selections from a list that goes on and on. However, if I had […] June 14, 2022
Blog / Is Your IT Team at Risk for Burnout? The Scope of Cyber Issues Keeps Expanding At a recent international cybersecurity conference, Canada’s newly appointed new head of the Centre for Cyber Security described his first months on the job as a “dizzying” experience, referring to a plethora of large scale incidents over a relatively short period of time. For those of you who […] June 09, 2022
Blog / Some facts about wireless communications Dispelling a few common misconceptions When it comes to computers, the general public often makes the mistaken assumption that computers are far more intelligent than they really are. It’s an easy assumption to fall for; just look at the amazing things they can do and accomplish! With a bit of setup you can press a […] June 07, 2022
Blog / Cyber Insurance Premiums Are On Their Way Up Way, way up. Cyber insurance is a surprisingly recent new addition to the cyber security toolbox. It’s pretty simple; if you suffer a cyber attack, your insurance should help recover at least some of the damages inflicted by it. Despite how new cyber insurance is, it’s become a standard recommendation for businesses to have at […] May 31, 2022
Blog / What is a hackers worst nightmare? Answer: businesses that actually update their applications. There’s plenty of advice that gets thrown around for securing your organization; have good passwords, manage your mobile devices, keep an eye on your antimalware logs, etc. How do you tell what is actually good advice? Well, in my opinion, the best advice is what has proven to […] May 24, 2022
Blog / Mandatory Breach Reporting You have to be looking for breaches to report them. PIPA, PIPEDA and HIPAA are all sets of regulations that involve some form of mandatory breach reporting. There are rules surrounding how much time you have to report a breach to the government as well as to those affected by it. Of course, there are […] May 17, 2022
Blog / The Importance of Staying Up To Date What does that mean for IT security? One of the most common mantras in IT security is “Stay up to date.” You’ll find it in every set of tips because it’s pretty much a standard recommendation that gets made in every facet of IT in general. Generally speaking, this is intended to mean that you […] May 10, 2022
Post navigation
/Partners /Systems /Certifications
TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.