Blog / A ransomware guide worth $4.4 million USD? It turns out that, unlike in the movies, in real life the bad guys sometimes win. That’s how the Colonial pipeline ransomware situation got sorted out. In case you didn’t hear, a major oil pipeline operated by the Colonial Pipeline Company was recently shut down by ransomware. It was a major issue that caused a […] June 08, 2021
Blog / How good is your ransomware plan? In case you haven’t heard about it, the Colonial pipeline was recently shut down by a ransomware attack. The Colonial is a massive pipeline that stretches from Texas, over to the east coast of US, and then heads north up to Jersey. Details are sparse. Other than the fact that the pipeline has been shutdown […] June 01, 2021
Blog / Industrial control equipment vulnerabilities IT Security is much like any other industry; sometimes there are good days, sometimes there are dull days, and sometimes there are bad days. Now, because I work in IT security my definitions of good, bad, and dull may not be what you would expect. A “good day” is one where a new major vulnerability […] May 25, 2021
Blog / FragAttacks: What they are and how to protect yourself In case you hadn’t heard, the big news in computer security right now are FragAttacks. FragAttacks (Fragmentation and Aggregation Attacks) consist of 12 separate vulnerabilities revolving around how wireless devices split up and transmit data. Wired connections send each packet of data individually, but this process is too wasteful for wireless connections, which combine the […] May 18, 2021
Blog / Secret doesn’t mean secure No one could really blame you for thinking that the internet is basically just a collection of email and websites. After all, websites are pretty much the only things most search engines (including Google) return. When websites are the only thing most people ever get presented with, it’s easy to understand why some people might […] May 11, 2021
Blog / Actively Monitoring Cybersecurity Solutions It’s well known that antiviral software should be installed on all your computers. It’s also well known that it should be setup on your firewalls along with your intrusion prevention system. What’s not very well understood is that things like this need to be looked in on from time to time. There’s an assumption that […] May 04, 2021
Blog / Shunning Shared Administrator Accounts One of the most effective ways to compromise anything is to misuse the authority of those in charge. This applies to politics, business, computers, or anywhere with an hierarchy or authority structure of any kind. Any secure environment should have some kind of authentication, double-checks, or other additional measures to prevent both accidental and intentional […] April 26, 2021
Blog / Protecting Your Personal Privacy in an Online World No one likes to have “The Man” looking over their shoulder all the time. A certain degree of monitoring is required and even expected for that extra layer of security (like cameras in the office, login monitoring, etc.), but when does it become too much? When is enough, well, enough? And how much tracking actually […] April 19, 2021
Blog / Facebook scraped for massive amounts of data In case you haven’t heard, Facebook has had a data breach. A big one. How big? A little over 500 million records (about 20% of it’s users). In fact it was so big that the website haveibeenpwned.com added a totally new search feature when the information was posted. So yeah, it was pretty big. But how did […] April 12, 2021
Blog / The Cloud: Soft, Fluffy, and Secure “The Cloud” is often touted as being the greatest thing since sliced bread. It’s amazing! It’s fast, it’s secure, it’s inexpensive, and it’s [insert your favourite feature here]! Honestly with the list of great features and things it can do, it’s a wonder that anyone buys there own computers anymore, right? But is the Cloud […] April 04, 2021
Post navigation
/Partners /Systems /Certifications
TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.