Blog / When’s a good time to use an administrator level login? Administrator level user permissions login and password screen To be clear, almost never. When you create a user in a system or software, they almost always have different levels/permissions or groups that you can associate them with. While the precise terminology may vary depending on the system, the core concepts are the same and different users will have different limitations on what they […] January 31, 2023
Blog / It’s Time to Upgrade to Windows 11 Windows 11 logo on a computer and cell phone screen Most versions of Windows 10 are already past their End of Life. Organizations often make the mistaken assumption software is forever. They use it because they always have and it’s always worked. That is, until there is a problem and when they look into it, lo and behold, the last time it was updated was […] January 24, 2023
Blog / Cybercrime may become uninsurable Cyberinsurance claim denied due to cybercrime Losses caused by criminal activity may no l0nger be covered in the near future. I have written about cyberinsurance changing several times in the past, including how a company settled their cyberinsurance lawsuit with their provider, how a pharmaceutical company won a massive lawsuit, and how Lloyds of London issued public recommendations for cyberinsurance providers. […] January 17, 2023
Blog / VIP Phishing Phishers are personalizing their attacks We wanted to bring your attention to a newer tactic being used by hackers targeting municipalities. By researching the names and other details of staff who work at municipalities, the attackers are able to create even more realistic and personalized phishing messages, with the goal of convincing users into wiring […] January 10, 2023
Blog / A Dark Web Primer Dark Web Scans It’s not as terrifying a place as you might think, and here’s why. It’s been said  that you can find anything on the internet, and it’s pretty much true. Websites like Amazon sell everything from food to computers, and you can purchase prescription glasses, cars, and even houses entirely online. Admittedly some brands intentionally don’t […] January 03, 2023
Blog / What are Botnets? Botnet network concept Are they really just a tool for the bad guys? Computers are complicated. Even the people who work with them all the time don’t know everything. Just look at the different fields in IT; cybersecurity, computer engineering, software development, and on and on. It’s impossible for any one person to understand every last detail. Due […] December 20, 2022
Blog / The Demise of a Dangerous Botnet Botnets text on top of a hacker's dark hoody It’s a Christmas Miracle! Botnets are generally considered a scourge in the security world. A collection of compromised computers and devices that receive instructions from a Command and Control Center, botnets are generally considered to be a scourge in the world of cybersecurity. How each device gets compromised can be highly variable and usually depends […] December 13, 2022
Blog / What do Browser Plugins and Mobile Apps Have in Common? infected iPhone They’re both more dangerous than you might think. While it’s true that topics like password security, ransomware, and phishing attacks are serious issues in the cybersecurity industry, big problems don’t just disappear, and their solutions are complicated. Not only that, but writing about them can get repetitive sometimes, which is why I try to only write […] December 06, 2022
Blog / Why Do You Need a Password Manager? Vault wireframe denoting a password manager Keeping credentials in a password manager makes protecting yourself easier. I’ve talked a lot in this newsletter about passwords from the point of view of an organization. This generally means having appropriate acceptable use and password policies around user behavior and device configuration. You don’t want your staff using personal passwords, simple passwords, and so […] November 29, 2022
Blog / What’s in Your Service Level Agreements? Service Level Agreements concept rendered as button with three settings Here are three key points service level agreements should cover. Service level agreements, also known as SLAs, are the legal backbone of most software applications (primarily enterprise-level) and IT companies. They spell out the specific terms of a service being provided. However, no two SLAs are the same, and will likely vary considerably depending on […] November 24, 2022

/Partners /Systems /Certifications

TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.