Blog / Incident Response Plans vs Disaster Recovery Plans Are they really all that different? Having a solid incident response plan and disaster recovery plan are required by multiple regulatory frameworks and legislations (PIPA, PIPEDA and PCI-DSS all require them). These plans form the basis for how organizations deal with the situation when things go rather badly wrong. It’s important to have them in […] June 21, 2022
Blog / What’s the worst cyber attack to get hit by? Not all digital assaults are coded the same. When it comes to targeting an organization for a cyber attack, hackers sadly have plenty of options. Things like Dedicated Denial of Service (DDoS) attacks, viruses, business email compromise, are just a few major selections from a list that goes on and on. However, if I had […] June 14, 2022
Blog / Is Your IT Team at Risk for Burnout? The Scope of Cyber Issues Keeps Expanding At a recent international cybersecurity conference, Canada’s newly appointed new head of the Centre for Cyber Security described his first months on the job as a “dizzying” experience, referring to a plethora of large scale incidents over a relatively short period of time. For those of you who […] June 09, 2022
Blog / Some facts about wireless communications Dispelling a few common misconceptions When it comes to computers, the general public often makes the mistaken assumption that computers are far more intelligent than they really are. It’s an easy assumption to fall for; just look at the amazing things they can do and accomplish! With a bit of setup you can press a […] June 07, 2022
Blog / Cyber Insurance Premiums Are On Their Way Up Way, way up. Cyber insurance is a surprisingly recent new addition to the cyber security toolbox. It’s pretty simple; if you suffer a cyber attack, your insurance should help recover at least some of the damages inflicted by it. Despite how new cyber insurance is, it’s become a standard recommendation for businesses to have at […] May 31, 2022
Blog / Refining Remote Work As we put COVID behind us, it’s clear the predictions it would change the work world were mostly true and most people are working from home more than ever. Sure, office buildings haven’t become the glittery mausoleums in empty city centers that look like they could have been taken from a post-apocalyptic film set as […] May 26, 2022
Blog / What is a hackers worst nightmare? Answer: businesses that actually update their applications. There’s plenty of advice that gets thrown around for securing your organization; have good passwords, manage your mobile devices, keep an eye on your antimalware logs, etc. How do you tell what is actually good advice? Well, in my opinion, the best advice is what has proven to […] May 24, 2022
Blog / Mandatory Breach Reporting You have to be looking for breaches to report them. PIPA, PIPEDA and HIPAA are all sets of regulations that involve some form of mandatory breach reporting. There are rules surrounding how much time you have to report a breach to the government as well as to those affected by it. Of course, there are […] May 17, 2022
Blog / IT Standards at Home and Abroad SMBs have global reach these days, making compliance even more complicated. In an age where cyber warfare and other digital threats abound, it’s in businesses best interests to keep their cyber security standards high. As the friendly neighbourhood cyber-man who pens our weekly cyber security newsletter and leads our security operations will tell you, all […] May 12, 2022
Blog / The Importance of Staying Up To Date What does that mean for IT security? One of the most common mantras in IT security is “Stay up to date.” You’ll find it in every set of tips because it’s pretty much a standard recommendation that gets made in every facet of IT in general. Generally speaking, this is intended to mean that you […] May 10, 2022
Post navigation
/Partners /Systems /Certifications
TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.