Blog / A Case Study About a Russian State-Sponsored Attack Quickly installing updates and performing regular maintenance could have stopped a Russian state-sponsored attack. I’ve used the last couple of newsletters to give gentle reminders that, due to the war in the Ukraine, organizations should be paying more attention to their cyber security. Recently the US released details on how a Russian state-sponsored attack managed […] March 22, 2022
Blog / Smart Cities: The Future of Municipal IT Today Smart devices have become an integral part of our daily lives. Even if you’re not an early adopter or frenetic techie in love with all things IoT, chances are you still own a smart phone of some kind that’s likely even within reach while your reading this. Meanwhile, smart TVs and connected hubs like Amazon’s […] March 17, 2022
Blog / Improving Your Cyber Security Posture Is there an easy, cost-effective way of improving your cyber security posture? Yes, but many organizations don’t do it. When people talk about an organization’s cyber security posture, they’re talking about how prepared that organization is to deal with any cyber security disruption. This covers substantially more than the brand of of antivirus software you […] March 15, 2022
Blog / What the War in Ukraine Means for your Cyber Security Much has been made in the western media about the cyber component of the war in Ukraine. Technology experts are watching the first conflict between two developed nations in the 21st century to see how cyber space has been weaponized both offensively and defensively to support a military engagement. While the media and their associated […] March 10, 2022
Blog / Don’t fall victim to fallout Just to get it out of the way, I’d like to start this newsletter by assuring you right off the bat that this will not be about politics. This is a cyber security newsletter and only a cyber security newsletter. However, there’s no denying some of what’s going on in the real world does have real […] March 08, 2022
Blog / The Inside Scoop on Digital Transformation Digital transformation is one of those IT business phrases that gets bandied around a lot but doesn’t mean much to those on the outside. In fact, you could almost call it a buzzword. After all, loathe as I am to start one of these articles with “Webster’s defines ‘buzzword’ as…”, the famous dictionary does describe […] March 03, 2022
Blog / The Importance of IP Address Restrictions It probably comes as no surprise that Russia is currently on pretty much everyone’s cyber security radar. There are bot nets and hacking originating from (and targeted at) Russia like you wouldn’t believe right now. Well, maybe you would considering what Russia’s getting up to these days, but the thing is this has been going […] March 01, 2022
Blog / Ransomware Update: Insiders and Unix Attacks It’s no secret around the TRINUS offices that I’m not a fan of writing about ransomware. Don’t get me wrong, I could write a new ransomware update pretty much every week; it’s a massive cyber security topic with potentially massive consequences for those who don’t take it seriously. Unfortunately, it’s also hard not to come […] February 22, 2022
Blog / The Evolving Medical IoT Landscape The Internet of Things (IoT) has existed in one form or another for a fair while now. As is typical with such things, it’s origin varies depending on your perspective. For some, it started in 1985 with the first ARPANET connected Coca-Cola vending machine. For others, it was in 1999 when Kevin Ashton coined the […] February 17, 2022
Blog / Common Cyber Attacks You Should Know About If you’ve ever overheard computer experts talking amongst themselves, then you know it can often seem like they are speaking a different language. The world of computers has always been a hotbed of acronyms, abbreviations, and strange names. Sometimes there’s a clever joke involved, like how the acronym GNU which stands for “GNU’s Not Unix!” […] February 15, 2022
Post navigation
/Partners /Systems /Certifications
TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.