Blog / Can Your Cybersecurity Posture Stand Up to… Cats? A flexible, adaptable cybersecurity posture is key. Keeping up-to-date on the latest and most dangerous cybersecurity attacks is a key part of my responsibilities at TRINUS. This means plenty of online research about breaches and other cybersecurity events the world over (hackers typically know no borders). By tracking these events, cybersecurity professionals like myself get […] October 10, 2023
Blog / Phishing Attacks Are Overtaking Ransomware The hacks you need to defend against these days are phishing attacks. When it comes to hackers’ preferred cybersecurity attacks, the computer industry goes through phases. For a long time malware was the main agitator, and the main advice you heard was just to put antiviral software everywhere. Over the past few years there’s been […] October 03, 2023
Blog / Filtering websites is important for any organization. How filtering websites works and what are the limitations? It’s almost common knowledge these days that filtering websites is an important task for pretty much every business. But why? It’s not just to keep employees productive or off Facebook. It’s actually about liability, and not just the kind that crops up when one employee catches […] September 26, 2023
Blog / Microsoft is Disabling Old Windows TLS Encryption. Disabling TLS could break nothing, or everything! Recently Microsoft announced they were going to be disabling TLS 1.0 and 1.1. This may sound like gibberish to you but the implications are significant. But before I get into why this is a big deal, I’ll explain what TLS actually is. TLS stands for ‘Transport Layer Security’ […] September 19, 2023
Blog / When cybersecurity incidents hit close to home. What can we learn from local cybersecurity incidents? Whether you know it or not, cybersecurity affects all of us, even you and even if you’re not even online! That’s because you don’t need to be online for your data to be put at risk. If you’ve ever even just interacted with a business or service […] September 12, 2023
Blog / Network Security Basics When it comes to network security, any service connecting to the internet can be leveraged. One of the most common questions about network security that cybersecurity specialists get is how hackers can attack an organization. The unfortunate truth is that pretty much any connection a machine has to the outside world can be used as […] August 29, 2023
Blog / Cloud vs. Onsite Servers What are the pros and cons of cloud servers as opposed to onsite ones? Cloud servers and services have long been touted as the ultimate server solution for both individuals and businesses. For one, their upfront costs are substantially lower than buying a server, and for another they come with their own infrastructure (a secured […] August 22, 2023
Blog / How much life does your computer hardware have left? Waiting for computer hardware to break is bad replacement policy. Although it’s rarely top-of-mind at the time, we all typically consider how long a product will last, even if we never calculate a precise time length or put it into words. That’s all fine and dandy for private life, but it’s a different story when […] August 15, 2023
Blog / A Refresher On Canada’s Antispam Legislation (CASL) Understanding CASL rules can save you plenty of headaches. As regular readers know by now, compliance is a huge part of the cybersecurity domain or job scope. Yes, there’s plenty of patching and updating firewalls for ransom/malware protection, but pretty much every business today offers some kind of online payment program or collects private information, […] August 01, 2023
Blog / Changes to Privacy Legislation are on their way. Understand where you are now versus where the regulations are going. Long time readers will know that we like to sometimes discuss privacy and security legislation. For example, the Payment Card Industry Data Security Standards (PCI-DSS) regulations come up periodically, which is a set of rules that applies to organizations that accept plastic for payment, […] July 18, 2023
Post navigation
/Partners /Systems /Certifications
TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.