Blog / The Evolving Realities of Cyberinsurance cyberinsurance premiums are on the rise The cyberinsurance industry is changing. Cyberinsurance is proving to be a great source for topical cybersecurity newsletters. Recently I wrote about how cyberinsurance now includes physical protection of electronic data as a consideration. Then there was the case of the insurance company that lost a lawsuit for denying a ransomware claim with the excuse that […] November 15, 2022
Blog / The Three Biggest Cybersecurity Threats You Need To Know Different cybersecurity threats displayed onscreen Not all cybersecurity threats are made equal. We live in an age of relative plenty, at least as far as computer technology goes. With each new generation of hardware, software, and smart devices, our ability to leverage technology has never been more powerful. Unfortunately, that’s a double-edged sword, because despite all the useful applications out […] November 08, 2022
Blog / Three Easy Data Maintenance Tips data maintenance concept shown through circuit board and tools on laptop screen Keeping Data Clean Doesn’t Have To Be Hard For the last couple of newsletters we’ve been taking a quasi-detailed look at good data hygiene practices. Now alas, here we are at the end. We started off with a brief overview of the value of good data hygiene and a discussion of the general meaning of […] November 03, 2022
Blog / A Brief Dive Into PIPA’s Take On Passwords Note to remind people to be changing passwords Are you legally required to be regularly changing them? In last week’s newsletter I talked about a PIPA requirement regarding passwords that had serious implications when combined with PCI-DSS. That investigation led to a couple of other useful questions, so I figured it might be a good idea to dig into the details of it. […] November 01, 2022
Blog / Why is Changing Passwords Regularly So Important? Changing Passwords highlighted on keyboard For many, changing passwords isn’t just best practices; it’s the law. Regular readers of this newsletter will know, Alberta’s PIPA legislation has been a featured topic in this newsletter from time to time. I’ve also mentioned PCI-DSS more than once as well. However what I want to point out now is that PIPA and PCI-DSS […] October 25, 2022
Blog / 4 Steps to Cleaner Data Data Cleansing Concept of a wiper going across 1s and 0s Data cleansing is an important part of good data hygiene. Because it can inform so many important business and strategic decisions, it’s essential for businesses and other organizations to maintain complete and valid data sets for whatever information you routinely collect and analyze. A single piece of data will often inform multiple decisions, such as […] October 20, 2022
Blog / Have You Checked What’s On Your Roof? drones with network intrusion equipment payload Drones are being weaponized with network intrusion equipment. Thanks to the rapid pace of technology, staying on top of the latest news is an absolute must for providing effective cybersecurity. A lot of that focus is on watching for vulnerabilities in important software, active attack campaigns, and problematic software patches (here’s looking at you, Windows). […] October 18, 2022
Blog / The Value of Segregated Networks Visualization of segregated networks and how segregating your networks works Don’t assume your internal network is a safe. Segregated networks are a complicated affair, but there’s a good analogy to help explain  the idea; it’s like building a plant conservatory. Plants are separated according to a set of criteria, and have walkways between each type of plant that allow limited traffic through, in a sheltered […] October 11, 2022
Blog / All About Data Hygiene data hygiene concept Don’t let decaying data damage your business. We’ve talked about the high value of data plenty of times before, so we’re not going to go on about how important it is for your data to be well-protected. That’s what our friendly neighbourhood cyber-man’s cybersecurity newsletter is for. Instead we’re going to take the next few […] October 06, 2022
Blog / Cyber security is not like the movies Attack Failed Although it is fast-paced and high stakes. Cyber security is a fast-paced business, and it’s important to keep tabs on current trends, tactics, and possible problem updates. That means I spend more time than you might think reading about about various breaches, and many of them read the same as all the rest. However, every […] October 04, 2022

/Partners /Systems /Certifications

TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.