Blog / Wireless What?? – Simplify the WIFI!! Good news everybody! Just for a change, I figured I'd stop with all the doom and gloom. Today I'll be giving people a bit of actual, real good news. Someone, somewhere finally figured out that WIFI needs version numbers, rather than the abbreviations it's had up till now. October 29, 2018
Blog / Small Mistakes can be Costly! Email is rapidly becoming one of the primary methods for Attackers to initially infiltrate an organization. They can send infected attachments, conduct Phishing campaigns to gain login credentials, and more. It's simple to use and doesn't require a lot of specialized or expensive resources to setup (like designing a piece of custom malware.) September 19, 2018
Blog / WiFi Authentication Vulnerability: SPECIAL PRIORITY ALERT – PLEASE READ!! There's a new attack targeting WiFi networks. Researchers found it by accident, while doing investigations into the new WPA3 Authentication Standard (published in January this year.) This is NOT a virus or malware, but rather a method through which a potential Hacker could gain access to Private and Public WiFi networks. From there, data could be stolen or corrupted by Ransomware or another virus. August 21, 2018
Blog / AVOID GOING CHROMATOSE! Google recently released an update for Chrome that marks all HTTP websites as being Unsecured. This is entirely accurate, as the information flowing between your computer and the server is unencrypted. This means someone could be in the middle, monitoring the traffic, and reading everything that's going on. August 10, 2018
Blog / USE THE FORCE, LUKE! – New Cyber Security Threat Seems to Conjure Passwords from Thin Air It should come as no surprise that I am a committed Star Wars fan. I remember watching the first Star Wars movie at a drive-in located in West Edmonton. The sound coming from the tin-cup speaker hung on the window frame was abysmal, but no one cared; in 1977 this was epic! Of course, Star Wars was the proverbial game-changer - and we all knew that Luke could never turn to the Dark Side. August 01, 2018
Blog / BAD DAY AT THE BREACH – How to Respond to a Security Breach Data Breaches are a fairly common thing these days. Part of my own routine is to keep tabs on the news. A lot of what I watch for are high profile vulnerabilities and issues that may affect the TRINUS Customer base. At the same time, I look out for things that are less obvious, but may be of interest to our IT Support Technicians. July 05, 2018

/Partners /Systems /Certifications

TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.