Blog / The Scary Side of Cybersecurity Marketing Cybersecurity marketing Selling fear is far too common. As an industry, Cybersecurity is an incredibly young industry that really only became mainstream over the past two decades. Being such a young industry means the tactics that make sales are still being played around with. Unfortunately, a lot of those tactics currently seem to be built on buzz […] November 22, 2022
Blog / The Evolving Realities of Cyberinsurance cyberinsurance premiums are on the rise The cyberinsurance industry is changing. Cyberinsurance is proving to be a great source for topical cybersecurity newsletters. Recently I wrote about how cyberinsurance now includes physical protection of electronic data as a consideration. Then there was the case of the insurance company that lost a lawsuit for denying a ransomware claim with the excuse that […] November 15, 2022
Blog / The Three Biggest Cybersecurity Threats You Need To Know Different cybersecurity threats displayed onscreen Not all cybersecurity threats are made equal. We live in an age of relative plenty, at least as far as computer technology goes. With each new generation of hardware, software, and smart devices, our ability to leverage technology has never been more powerful. Unfortunately, that’s a double-edged sword, because despite all the useful applications out […] November 08, 2022
Blog / A Brief Dive Into PIPA’s Take On Passwords Note to remind people to be changing passwords Are you legally required to be regularly changing them? In last week’s newsletter I talked about a PIPA requirement regarding passwords that had serious implications when combined with PCI-DSS. That investigation led to a couple of other useful questions, so I figured it might be a good idea to dig into the details of it. […] November 01, 2022
Blog / Why is Changing Passwords Regularly So Important? Changing Passwords highlighted on keyboard For many, changing passwords isn’t just best practices; it’s the law. Regular readers of this newsletter will know, Alberta’s PIPA legislation has been a featured topic in this newsletter from time to time. I’ve also mentioned PCI-DSS more than once as well. However what I want to point out now is that PIPA and PCI-DSS […] October 25, 2022
Blog / Have You Checked What’s On Your Roof? drones with network intrusion equipment payload Drones are being weaponized with network intrusion equipment. Thanks to the rapid pace of technology, staying on top of the latest news is an absolute must for providing effective cybersecurity. A lot of that focus is on watching for vulnerabilities in important software, active attack campaigns, and problematic software patches (here’s looking at you, Windows). […] October 18, 2022
Blog / The Value of Segregated Networks Visualization of segregated networks and how segregating your networks works Don’t assume your internal network is a safe. Segregated networks are a complicated affair, but there’s a good analogy to help explain  the idea; it’s like building a plant conservatory. Plants are separated according to a set of criteria, and have walkways between each type of plant that allow limited traffic through, in a sheltered […] October 11, 2022
Blog / Cyber security is not like the movies Attack Failed Although it is fast-paced and high stakes. Cyber security is a fast-paced business, and it’s important to keep tabs on current trends, tactics, and possible problem updates. That means I spend more time than you might think reading about about various breaches, and many of them read the same as all the rest. However, every […] October 04, 2022
Blog / Has your password been pwned? pwned Don’t wait for a breach to find out. Passwords are the cornerstone of good security, and should be supported with two- or multi-factor authentication. However, as you can read about in our recent newsletter about the Uber breach, MFA isn’t a magic wand that fixes all password issues. Good password hygiene and habits are still […] September 27, 2022
Blog / Uber’s Two-factor Failure UBER logo on broken phone for 2fa failure Using TFA properly means configuring it right and training personnel. Did you know Uber was recently hacked? The ride-share and now food delivery giant admitted a contractor’s credentials had been compromised and hackers were able to gain access to sensitive information. Don’t worry yet; although the damage is still being ascertained, the hackers apparently couldn’t […] September 20, 2022

/Partners /Systems /Certifications

TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.