Blog / Don’t Mistake Cyber Resiliency for Cyber Security Cyber Resiliency on keyboard button with wrenches Have you ever considered your organization’s cyber resiliency? Don’t feel bad if you said no. In fact, the truth is you probably have but just didn’t know it. That’s partly because cyber resiliency is a fairly broad ranging subject that encompasses multiple topics. In a nutshell, cyber resilience is an organization’s ability to resist or […] November 09, 2021
Blog / Not Having Acceptable Use Policies is not Acceptable Employees signing acceptable use policies Of all the different IT policies your organization may have (password, remote work, privacy, BYOD, social media, etc.), one that often gets overlooked is the acceptable use policy. The reasons are many and mostly understandable. After all, employees already know they shouldn’t be visiting risque or other potentially dangerous websites on the company time, right? […] November 04, 2021
Blog / Have you heard of the Principle of Least Privilege? Fingerprint refused access to files representing the Principle of Least Privilege There’s lots of advice to be given about how to set up your computer security. The toolbox is massive, with plenty of different models to choose from. A security model or framework, like the Principle of Least Privilege, is just an outline that doesn’t contain specific items (like “enable this exact settings” and such). Instead, […] November 02, 2021
Blog / Password Policies Are More Than Just Paperwork password policies as part of protecting online privacy There are plenty of regulations out there when it comes to your organization’s electronic security. The most common ones I’ve encountered are PIPA (Personal Information Protection Act, an Alberta regulation that governs the protection of personal information),  PIPEDA (Personal Information Protection and Electronic Documents Act, a federal version of the Albertan act) and PCI-DSS (Payment […] October 26, 2021
Blog / A Cyber Insurance Primer for SMBs Cyber Insurance button No matter the size of your business, you’re never too big to take a hit. Between major breaches like the Kaseya incident earlier this year, and the thousands of minor breaches and ransoms SMBs suffer through that never make the headlines, it’s not hard to recognize that the valuable data assets which inform your strategic […] October 21, 2021
Blog / How to approach computer and IT security Road sign about IT security approaches How do you approach IT security? Where do you start and what should you do? These are great questions that people ask all the time because IT security is an understandably specialized field that requires more training than natural skill. There’s a lot that you need to know before you even start to get good […] October 19, 2021
Blog / Don’t Take the Windows 11 Upgrade (Yet) Windows 11 logo on a computer and cell phone screen As you likely already know, Microsoft recently released the latest version of their famous operating system, Windows 11, on October 5th. Microsoft’s own blog breaks down the features and details about their plans for a tiered rollout over the remainder of 2021 and 2022. And as you also likely already know, we at TRINUS are […] October 14, 2021
Blog / Are you important enough to get hacked? There’s an interesting misconception out there—a myth, if you will—that your organization is too small and unimportant to be worth hacking or being held to a ransomware demand. It’s comforting to believe, for any reason, that your organization won’t suffer an attack. It may not be true, but it’s comforting. I think this belief comes […] October 12, 2021
Blog / Organizational Change Management vs Technological (Pt. 2) Organization Change Management Concept As we all know, change is one of those few truly inevitable aspects of our lives. Regardless of whether you embrace the steady streams of new features in app updates or resent them for changing your app up just as you got used to it, the fact is change waits for no one. Nowhere is […] October 07, 2021
Blog / Watering Hole Attacks: What they are and how to avoid them Watering hole attacks represented by a do not drink sign I’ve talked about many different kinds of attacks over the course of this newsletter. Ransomware gets a lot of attention (since it’s such a common attack), but I’ve also talked about phishing, social engineering, cross-site scripting and other types of attacks. It’s important to understand the vocabulary of computer security if you don’t want to […] October 05, 2021

/Partners /Systems /Certifications

TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.