Blog / RobbinHood & his MerryMenn Collect Ransom(ware) – Have a Plan of Action to Manage (Cyber) Outlaw Attacks… It's important to have a plan for what to do, in case you get infected with Ransomware. First off, assume you will be infected. Second, assume everything will be infected, then simply proceed from there. It's really not too hard... June 19, 2019
Blog / Cyber Security is Not a “Cost” … However, You Still Need to Pay. Instead of approaching Cyber Security as an expense, look at is as an investment. The payoff is hopefully you will never face a massive bill that you'll be forced to pay (such as EQUIFAX.) June 07, 2019
Blog / The Network Demilitarized Zone: Increasing Security by Design Proper setup and design of your network traffic flow will increase your Security, without the need to install additional software. It won't even increase the cost of your equipment by much. In some cases, it won't increase costs at all. May 24, 2019
Blog / RIDL Me This! – Major Intel Chip Vulnerability There's a new vulnerability that targets Intel chips. It's similar to the 'Spectre' and 'Meltdown' attacks, which made massive headlines last year, as you may remember. What's interesting is that while this one is in the news, it's not being talked about nearly as much. May 16, 2019
Blog / Extinguishing the IoT Insecurity Dumpster Fire – Regulations that Specifically Apply to IoT Devices The IoT Insecurity Dumpster Fire is currently burning happily, but it looks like there finally could be some hope of rain coming soon. Hopefully, this will improve things down the road. May 07, 2019
Blog / Keep Your Head Above The Cloud – Cyber Security is Really Foggy Out There… First, consider your own corporate network. The only limitations you have when it comes to making changes within it, is to make sure it still works. You can rearrange it however you like/need, whenever you want, as long as you have the money and time. April 25, 2019
Blog / EQUIFAX Breach Update: Post Mortem – April 17, 2019 Considering the colossal blunder EQUIFAX made, it seems likely it’s not the last that will be heard about this. We've already seen multiple countries update (and sometimes implement) Breach and Privacy-related laws/legislation. Some fines have been levied and several Class Action lawsuits have been filed. April 17, 2019
Blog / Windows of Opportunity for Ransomware – Offsetting Attacks with Proper Computer Monitoring Setting up proper monitoring isn't difficult, or expensive. If you're an expert, you can do it for free. For the rest of us (I include myself in this group), there's software that can easily take care of it, and it's cheap. Once the software is in place, it will send emails notifying your people of any activity that takes place. April 11, 2019
Blog / Your Weekends May Never be the Same Again! Most Cyber Attacks Occur on Weekends… No one wants to work on weekends, but in order to keep your company cyber-protected, this is an unfortunate reality. March 22, 2019
Blog / Slippery Software Security Surprises: Managing Your Operating System’s Updates Having a Windows Update server is great for managing the updates to your operating system. It even allows for a certain level of control, when it comes to Windows 10 Updates. It's all the other 3rd party software that can't be forgotten about. Having a similar system in place to manage updates to all that different software, will help reduce the amount of work that goes into keeping your corporate network protected. February 25, 2019
Post navigation
/Partners /Systems /Certifications
TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.