Blog / Where’s Your Information Coming From? What a Cross-Site Scripting Vulnerability Actually Means… It's important to understand the potential scope of this sort of attack and become aware that any of the tools you make use of, have web-based interfaces (like any firewall or switch in your network) which could be hiding something like this. July 06, 2020
Blog / Defending Against Unknown Vulnerabilities… You Gotta Keep’em Separated! Splitting up your network, so that only certain devices can talk to each other, is an uncomplicated and highly effective method of increasing your Security. Think of it like an organization in an office building... June 27, 2020
Blog / Why is Ransomware so Effective? Because They keep Changing it… In order to defend against Ransomware, it is no longer good enough to perform backups, monitor them, and install some software to detect their encryption... June 22, 2020
Blog / What Healthcare Providers Need To Know About Computer Security And Standards TRINUS Account Manager Jon Harmon was recently interviewed by Jean L. Eaton, BA Admin (Healthcare), CHIM, CC, Privacy Coach and Practice Management Mentor with Information Managers Ltd, on the following topic: “What Healthcare Providers Need To Know About Computer Security And Standards.” Here’s the Podcast, in the shape of a YouTube video: June 15, 2020
Blog / Keeping up with Current News… Helps to Spot the Phishing Scams! Scammers and Phishers will use any means they can to exploit you and get what they want. The easiest way to do so is to make use of big, important events that are happening in the world. This gives them that hint of legitimacy. June 15, 2020
Blog / Email Filtering – Doing it Right is Very Tricky… Email must be one of my biggest peeves, when it comes to dealing with problems. Email is not really that complicated, since there are only three kinds of snags: configuration issues, hardware failure, and Spam. Configuration issues do not happen very often, since email systems are not the sort of thing that get repeatedly tinkered […] June 05, 2020
Blog / Most Important Aspects of Electronic Security? – Monitor Your Computer Equipment and Keep Your Eyes Wide Open! Despite all the Security Advice out there, most of it is being ignored. This has become the accepted standard. A computer is no different than a car engine. If you leave it alone long enough, something will go wrong... May 22, 2020
Blog / Canadian Privacy Laws: Are You Approaching Them Right? This is a key question to ask, because in too many situations, the answer is: "Probably not." I've talked to several people who seem to think that Privacy Laws like PIPA and PIPEDA don't apply to them, or that the Anti-Spam Regulations are not pertinent. May 11, 2020
Blog / Good Things to Look for in Firewalls – Some Protect us from Bad Traffic Better than Others The term ‘Firewall’ is similar to the word ‘Vehicle.’ It’s an umbrella term given to network devices that sit at the edge of your network. Their purpose is to keep unwanted traffic from getting past them... May 06, 2020
Blog / Everyone’s Working From Home Now – It’s Time to Stop and Smell the Roses… Working from home is a real thing for so many of us and not something we can just grumble about by the water cooler from time to time... April 27, 2020
Post navigation
/Partners /Systems /Certifications
TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.