Blog / Contractor Relationships are Important – You’re Lending Them More than just Your Reputation… When a contractor performs work for any type of organization, they're acting as an extension of that outfit. This means that they are required to conform to all the very same regulatory restrictions that you're under (within reason of course.) July 06, 2019
Blog / RobbinHood & his MerryMenn Collect Ransom(ware) – Have a Plan of Action to Manage (Cyber) Outlaw Attacks… It's important to have a plan for what to do, in case you get infected with Ransomware. First off, assume you will be infected. Second, assume everything will be infected, then simply proceed from there. It's really not too hard... June 19, 2019
Blog / Cyber Security is Not a “Cost” … However, You Still Need to Pay. Instead of approaching Cyber Security as an expense, look at is as an investment. The payoff is hopefully you will never face a massive bill that you'll be forced to pay (such as EQUIFAX.) June 07, 2019
Blog / The Network Demilitarized Zone: Increasing Security by Design Proper setup and design of your network traffic flow will increase your Security, without the need to install additional software. It won't even increase the cost of your equipment by much. In some cases, it won't increase costs at all. May 24, 2019
Blog / RIDL Me This! – Major Intel Chip Vulnerability There's a new vulnerability that targets Intel chips. It's similar to the 'Spectre' and 'Meltdown' attacks, which made massive headlines last year, as you may remember. What's interesting is that while this one is in the news, it's not being talked about nearly as much. May 16, 2019
Blog / Extinguishing the IoT Insecurity Dumpster Fire – Regulations that Specifically Apply to IoT Devices The IoT Insecurity Dumpster Fire is currently burning happily, but it looks like there finally could be some hope of rain coming soon. Hopefully, this will improve things down the road. May 07, 2019
Blog / Keep Your Head Above The Cloud – Cyber Security is Really Foggy Out There… First, consider your own corporate network. The only limitations you have when it comes to making changes within it, is to make sure it still works. You can rearrange it however you like/need, whenever you want, as long as you have the money and time. April 25, 2019
Blog / EQUIFAX Breach Update: Post Mortem – April 17, 2019 Considering the colossal blunder EQUIFAX made, it seems likely it’s not the last that will be heard about this. We've already seen multiple countries update (and sometimes implement) Breach and Privacy-related laws/legislation. Some fines have been levied and several Class Action lawsuits have been filed. April 17, 2019
Blog / Windows of Opportunity for Ransomware – Offsetting Attacks with Proper Computer Monitoring Setting up proper monitoring isn't difficult, or expensive. If you're an expert, you can do it for free. For the rest of us (I include myself in this group), there's software that can easily take care of it, and it's cheap. Once the software is in place, it will send emails notifying your people of any activity that takes place. April 11, 2019
Blog / Your Weekends May Never be the Same Again! Most Cyber Attacks Occur on Weekends… No one wants to work on weekends, but in order to keep your company cyber-protected, this is an unfortunate reality. March 22, 2019
Post navigation
/Partners /Systems /Certifications
TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.