Blog / Municipal IT Budget Planning – Part 1: Introduction to Municipality Budget Planning This is part 1 of a 9-part series that will look at selected areas of interest to Municipalities, pertaining to IT Budget Planning. Please contact me if you would like copies of other articles. August 24, 2018
Blog / WiFi Authentication Vulnerability: SPECIAL PRIORITY ALERT – PLEASE READ!! There's a new attack targeting WiFi networks. Researchers found it by accident, while doing investigations into the new WPA3 Authentication Standard (published in January this year.) This is NOT a virus or malware, but rather a method through which a potential Hacker could gain access to Private and Public WiFi networks. From there, data could be stolen or corrupted by Ransomware or another virus. August 21, 2018
Blog / Captain Bligh Does WiFi – Public WiFi Needs to Be Done Right to Preserve your Reputation No WiFi is better than poor WiFi. Like politics and the weather, there is always something to complain about with Public WiFi. It's slow, it drops out frequently, you can't connect, you don't know the password, you can't watch videos; the grumblings are almost endless. A lot of the criticism is justified, as much of the service is genuinely poor. August 16, 2018
Blog / AVOID GOING CHROMATOSE! Google recently released an update for Chrome that marks all HTTP websites as being Unsecured. This is entirely accurate, as the information flowing between your computer and the server is unencrypted. This means someone could be in the middle, monitoring the traffic, and reading everything that's going on. August 10, 2018
Blog / OH NO! NOT YOU AGAIN! – Older File Types are Blocked as Being Potential Virus Carriers. A good friend of ours recently gave me a small plaque intended for my new office. Made from heavy black cast iron, it displays Oh No, Not You Again. I'm not sure this is appropriate for someone who spends most of their day meeting and communicating with Clients. Most likely, I'll mount it on a desk-stand and bring it out on special occasions. August 08, 2018
Blog / USE THE FORCE, LUKE! – New Cyber Security Threat Seems to Conjure Passwords from Thin Air It should come as no surprise that I am a committed Star Wars fan. I remember watching the first Star Wars movie at a drive-in located in West Edmonton. The sound coming from the tin-cup speaker hung on the window frame was abysmal, but no one cared; in 1977 this was epic! Of course, Star Wars was the proverbial game-changer - and we all knew that Luke could never turn to the Dark Side. August 01, 2018
Blog / GOOD, FAST, CHEAP: Pick Any Two – A Simple Business Axiom Can Lead to Better IT Systems Good, Fast, Cheap: Pick any Two - is a common business Axiom that's been around for ages. While you won't find this in any Business Administration textbooks, all Business Owners - and most Consumers know this pithy saying has its' roots in truth. You Get What You Pay For and There's No Free Lunch are Maxims centered around the same idea; there is a constant tension between quality, price, and speed-of-delivery for most - if not all products. July 26, 2018
Blog / Ransomware meets WikiLeaks! It was bound to happen sooner or later - the Cyber Criminals are now threatening public exposure of Ransomware data if the Ransom is not paid. Earlier this June, CarePartners - an Ontario-based Home-Care Medical Services provider was hit with a Ransomware Attack on it's server. This is nothing new; it happens thousands of times a day in many countries. What is new is the demand: pay up or risk having your Patient records exposed to the Public. This used to be the cry of a WikiLeaks Whistle Blower. July 18, 2018
Blog / Is your Remote Connection For Sale? Look what I found!! It is common for companies to set up Outside Access to their internal resources. Remote Desktop Protocol (RDP) is a simple method that is commonly used, to allow employees to connect from home and abroad. July 17, 2018
Blog / BAD DAY AT THE BREACH – How to Respond to a Security Breach Data Breaches are a fairly common thing these days. Part of my own routine is to keep tabs on the news. A lot of what I watch for are high profile vulnerabilities and issues that may affect the TRINUS Customer base. At the same time, I look out for things that are less obvious, but may be of interest to our IT Support Technicians. July 05, 2018
Post navigation
/Partners /Systems /Certifications
TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.