Blog / Disaster Recovery and Business Continuity plans Disaster Recovery Plans ready to be activated by a big red button! What do you do in the event of a fire in office? Not a small one mind you, a big one. What about a flood? Have you considered an earthquake? What do you do (as a business) when things go horribly, terribly, massively, wrong? You turn to your Disaster Recovery(DR) and/or Business Continuity(BC) plans. These […] March 29, 2021
Blog / What is Social Engineering? When most people think about hacking they normally picture something out the movies. You know the scene; some hooded hacker at a keyboard performing all sorts of technological wizardry to get around a computer’s defenses. Unfortunately that’s also exactly how most organizations set up their hacking defenses. The problem is there’s a hole in that […] March 22, 2021
Blog / Phishing Emails – Effective for hackers, hard to detect for filters Phishing Training Phishing emails and spam both come at you through the same medium: email. That means the defenses against both are also the same. It’s down to your spam filtering to keep you protected from spam and other harmful email messages. Spam filtering checks can be configured as either hard or soft checks. The terms hard and soft don’t refer […] March 15, 2021
Blog / URGENT—Exchange Server Vulnerability Update On Wednesday March 3rd we detailed a server “zero-day” security vulnerability discovered in Exchange Server 2010, 2013, 2016 and 2019. At the time it was noted that while the vulnerability had been exploited prior to the patches being available, Microsoft had suspected that only a handful of high-profile organizations had been compromised by a Chinese […] March 09, 2021
Blog / “Zero-day” security vulnerability discovered on Microsoft Exchange servers On Tuesday March 2nd Microsoft released notice of a “zero-day” security vulnerability discovered in Exchange Server 2010, 2013, 2016 and 2019. Zero-day vulnerabilities are vulnerabilities in software that have been present since initial release of the software. These vulnerabilities are often discovered after they are exploited for malicious purposes and there is little defense against them […] March 03, 2021
Blog / Cyber Security Newsletter: The Incident Response Plan Having an Incident Response plan (IRP) is important for any business. You need to have a plan for dealing with big issues (like ransomware) beforehand. Making it up as you go along is a great way to ensure that you make mistakes. In a lot of cases the majority of effort is focused on getting […] March 02, 2021
Blog / Water treatment security – It’s not just up to the contractor I was reading an article the other day about how a water treatment plant in Florida was recently hacked. Someone connected to the remote software (Teamviewer) used to connect to a machine that handled mixing the water, then cranked up the levels of sodium hydroxide (lye) to dangerous levels (more then 100 times normal). Thankfully […] February 21, 2021
Blog / The Importance of Software Restriction and Inventory People like stuff that is familiar to them. Oftentimes they’ll have a favourite automobile manufacturer, restaurant, or brand of soda. This means they’ll choose their preferred option over others, if given the chance. I myself have a soft spot in my heart for Volkswagen vehicles. This is because I am over 6 feet tall (you’d […] February 15, 2021

/Partners /Systems /Certifications

TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.