Blog / Is Your Organization Ready for November 1st? I find it's always good to start off a Newsletter by asking a question. This helps focus peoples' attention, as well as my own writing. It gives the Newsletter an immediate sense of direction. October 22, 2018
Blog / Small Mistakes can be Costly! Email is rapidly becoming one of the primary methods for Attackers to initially infiltrate an organization. They can send infected attachments, conduct Phishing campaigns to gain login credentials, and more. It's simple to use and doesn't require a lot of specialized or expensive resources to setup (like designing a piece of custom malware.) September 19, 2018
Blog / Back to School – A Bit of Computer History Shows Where We Might Be Headed Well, it's Back to School for the kids this week. They aren't the only ones who need to keep on learning. The major reason I got into computers in the first place, was because there's always something new to find out. For anyone who pursues a career in computers, this is one of the major draws. September 05, 2018
Blog / (DON’T) Support Your Local Phone Scammers!! Technical Support scams often claim to be from Microsoft or Windows. This happens so often, that Microsoft has a website that you can use to report a Microsoft support scam. August 30, 2018
Blog / WiFi Authentication Vulnerability: SPECIAL PRIORITY ALERT – PLEASE READ!! There's a new attack targeting WiFi networks. Researchers found it by accident, while doing investigations into the new WPA3 Authentication Standard (published in January this year.) This is NOT a virus or malware, but rather a method through which a potential Hacker could gain access to Private and Public WiFi networks. From there, data could be stolen or corrupted by Ransomware or another virus. August 21, 2018
Blog / AVOID GOING CHROMATOSE! Google recently released an update for Chrome that marks all HTTP websites as being Unsecured. This is entirely accurate, as the information flowing between your computer and the server is unencrypted. This means someone could be in the middle, monitoring the traffic, and reading everything that's going on. August 10, 2018
Blog / USE THE FORCE, LUKE! – New Cyber Security Threat Seems to Conjure Passwords from Thin Air It should come as no surprise that I am a committed Star Wars fan. I remember watching the first Star Wars movie at a drive-in located in West Edmonton. The sound coming from the tin-cup speaker hung on the window frame was abysmal, but no one cared; in 1977 this was epic! Of course, Star Wars was the proverbial game-changer - and we all knew that Luke could never turn to the Dark Side. August 01, 2018
Blog / Is your Remote Connection For Sale? Look what I found!! It is common for companies to set up Outside Access to their internal resources. Remote Desktop Protocol (RDP) is a simple method that is commonly used, to allow employees to connect from home and abroad. July 17, 2018
Blog / BAD DAY AT THE BREACH – How to Respond to a Security Breach Data Breaches are a fairly common thing these days. Part of my own routine is to keep tabs on the news. A lot of what I watch for are high profile vulnerabilities and issues that may affect the TRINUS Customer base. At the same time, I look out for things that are less obvious, but may be of interest to our IT Support Technicians. July 05, 2018
Blog / Ransomware is still around… and it’s also a lot closer to home than what you might think! Chances are the Prince Edward Island government wasn't aware that the website had been compromised, until someone complained about it. Most methods of monitoring a website simply confirm that a URL is responding. May 07, 2018
Post navigation
/Partners /Systems /Certifications
TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.