Blog / Resetting Passwords Properly Resetting Passwords Resetting passwords can be dangerous when done wrong. Staying modern and on top of trends is important in any profession, but particularly cybersecurity. Situations can develop quickly, as quickly as computers can process things sometimes, so it’s important to be as prepared as possible by actively seeking out reports on attacks, exploit campaigns, and any […] July 04, 2023
Blog / Inventory Control and Security Inventory Control When it comes to inventory control, make sure you know who tracks what. The importance for strong inventory control processes is the same for businesses regardless of whether they offer goods, services, or both. Sure, plenty of costs and capital are bound in products (which of course is why those who do sell manufactured goods) […] June 27, 2023
Blog / The Importance of Understanding Email URL email checker hacker image It’s hard for computers to detect phishing attempts. Email is everywhere, but particularly in business, but people often forget just how recent a change this really is. For example, I (and I’m sure at least a portion of my readers) remember a time before big companies like London Drugs or Walmart even had websites, let […] June 20, 2023
Blog / Two Key Components of Wi-Fi Wi-Fi Signal Image Getting Wi-Fi policies right is just as important as setting it up securely. It wasn’t that long ago that having a wireless network in your business was a novel rarity, but nowadays? Not having wireless everywhere in your business is just rare as having it used to be. Much like email, Wi-Fi has become ubiquitous, even though […] June 13, 2023
Blog / A Few Tricks For Good Business Policies Business Policies Good business policies are essential for successful business. Cybersecurity has two main aspects. First are the familiar technical aspects like antimalware, web filtering, firewalls and all the rest. What often gets forgotten about are the non-technical aspects, but things like business policies and management attitudes play pivotal roles when it comes to cybersecurity. Policies are […] June 06, 2023
Blog / Use Risk Assessments Before Providing Access Risk Assessments on dial Risk assessments let you evaluate the risks of offering external access. Any time you consider providing access to something inside your network it’s important to handle the situation properly. Usually though, the only thing most people think about is the business need or why doing so might be useful. But making a decision solely on […] May 30, 2023
Blog / Some New Cyberinsurance Requirements Changing cybersinsurance requirements New cyberinsurance requirements mean getting coverage could be getting harder. As TRINUS’s head of cybersecurity, I’m regularly helping clients fill out cybersinsurance applications, so I get to see all sorts of forms from plenty of different insurance companies. I also make it a point to stay informed about all the latest cybersecurity and insurance information. […] May 23, 2023
Blog / Good News For Cyberinsurance Clients cyberinsurance clients making cyberinsurance claims Cyberinsurance clients can trust their policies to protect them again. Insurance providers have long included act of war clauses in policies of all sorts, including life and property insurance, and now, they’re hitting their cyberinsurance clients with them.  Of course, in the physical world it’s fairly easy to say whether an attack is or is […] May 16, 2023
Blog / Fire Season Has Started In Alberta Computers backups in fire As wildfire season is upon us, and we witness the unfortunate impact it has on numerous businesses, the importance of having a robust disaster recovery plan and reliable backups cannot be stressed enough. That’s why we felt compelled to address three vital aspects of effective backups that deserve your immediate attention: Safeguard Your Backups during […] May 09, 2023
Blog / Time to start planning to upgrade to Windows 11 Windows 11 logo on a computer and cell phone screen Windows 10 end of life is approaching. Software may not be able to literally die, but software end-0f-life is a real thing.  That means the organization that originally created it will no longer be improving or patching it. No more updates, no more support, nothing. This applies to operating systems as well most other software […] May 02, 2023

/Partners /Systems /Certifications

TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.