Blog / Amway’s Evil Twin Sister Amway’s Evil Twin Sister Latest ransomware encourages victims to sacrifice their friends and colleagues. I’m sure most of you will remember Amway, it seemed impossible to avoid a friend or colleague that was selling their products in the home.  The marketing scheme was simple, but effective – as an Amway dealer, you were to leverage […] December 29, 2016
Blog / The BIGGER They are … The BIGGER They are … The harder they fall – Botnet attack brings down DYN, Twitter, Netflix, Amazon Our story today – dear readers – begins innocently enough with a very simple virus that penetrated several Internet-enabled devices that still had the default manufacturer’s passwords.  These were dumb devices like printers, routers, security (IP) cameras, […] December 26, 2016
Blog / You Have Mail! You Have Mail! Canada Post SCAM leads to malware infection A client recently received an Email that appeared to be from Canada Post claiming that they had a package waiting for delivery.  It has the usual information about the delivery; ID number, date and time, and a payment amount.  There is even a link to […] December 12, 2016
Blog / The Devil You Know… The Devil You Know … IT Manager does malicious damage to local college You may have picked up on a recent news investigation report from CBC and others about the massive trouble at Norquest College.  It appears that back in February, 2013 a disgruntled IT Manager perpetrated two fraud schemes against senior staff as a backlash […] December 10, 2016
Blog / It’s BUDGET Time It’s BUDGET Time The leaves change colour and it’s time to start thinking about budgets. Many of our clients are municipalities who operate with a fiscal year and that coincides with the calendar year.  That means they need to start preparing budgets in the fall to insure their elected officials have time to review and […] September 10, 2016
Blog / The BIG Phone Book: How do Email and website requests find you? The BIG Phone Book How do Email and website requests find you? We were recently transitioning a client to a new Email system.  It required that some settings be changed in their DNS to point to the new provider.  The matter was complicated by the addition of another technology provider who also needed to change […] August 22, 2016
Blog / Who is Calling Please? Aggressive Phone Solicitation Preys on Old Fears Who is Calling Please? Aggressive Phone Solicitation Preys on Old Fears A client called us yesterday to question the security and stability of their network.  The call wasn’t really serious as the long-standing client knows we have their network support and security under good control.  But they did want to report a new twist on […] August 10, 2016
Blog / What Did You Say? Firewall 101 What is a Firewall Anyway? I recently had a client ask me a question: What is a firewall?  I was somewhat taken aback as I had just Emailed them about the virtues of Advanced Persistent Threat (APT) Blocking service that we were recommending for the Dynamic Filtering Services on their Watchguard firewall … I might […] July 27, 2016
Blog / I Hate Passwords! Lax Password Enforcement is still a Priority Concern We hear the phrase I Hate Passwords in one form or another with monotonous regularity. I think I have muttered it under my breath several times recently. I decided to take inventory. Between personal and business, I added up the number of accounts that require some sort […] July 21, 2016
Blog / Katy, Bar the Door – Literally Physical Security Begins with a Simple Change in Door Locks Katy Bar the Door is a strange phrase with it’s origins in the story of Catherine Douglas from Scottish history of the 15th century. She used her arm to block a door that was left unbolted as the King and court escaped from would-be assassins. She […] July 14, 2016

/Partners /Systems /Certifications

TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.