Blog / Dealing With Problematic Password Security Practices Feature image for article about password security Password security can be a persistent problem. Passwords have been central to cybersecurity and user authentication since the dawn of the modern computing era, and the logic behind using them has remained the same; people can prove they are who they claim to be by providing information only the appropriate user would know. That’s why […] November 19, 2024
Blog / Multi-Factor Authentication Methods Are Important Tools Image of user being challenged by different multi-factor authentication methods Let’s talk about different multi-factor authentication methods When it comes to computers, user authentication is nothing new. It’s existed in one form or another since the beginnings of computer sciences. Back then things like storage space, memory, and CPU power had to be closely managed, so the many different multi-factor authentication methods we take for […] October 15, 2024
Blog / Let’s Talk About PCI-DSS Compliance PCI-DSS Compliance lettering for header image PCI-DSS Compliance Impacts Almost Every Organization. I’ve been writing for TRINUS for seven years now. Early in 2017, before articles about PCI-DSS compliance and when our newsletter topics were more broadly focused on all things information technology, I wrote about the realities of cyberbullying, and while researching it I discovered some surprising facts about Alberta […] October 01, 2024
Blog / Decrypting the Secrets of Drive Encryption Feature image of a padlocked hard drive demonstrating the concept of drive encryption What is drive encryption and what does it protect against? Although the term may sound new to some, drive encryption isn’t a particularly new cybersecurity concept. For example, Bitlocker, likely Microsoft’s best known drive encryption tool, has been available since at least 2016. In fact, it’s a proven and effective strategy for reducing risk exposure, […] August 13, 2024
Blog / How Much Cybersecurity Is Too Much? An image of multiple locks demonstrating how much cybersecurity is required these days The Cost of Efficiency Depends on How Much Cybersecurity is Required. While the technicalities of cybersecurity are often tricky, some aspects are fairly straightforward. Like pretty much every other aspect of our lives–be it added luggage searches at airports, payment cards and turnstiles in bus terminals, or even just locking the deadbolt on your way […] July 02, 2024
Blog / Computer Maintenance and Its Importance Miniature men fixing and providing tech support and computer maintenance for a motherboard Repairs and replacements are only part of proper computer maintenance. It should go without saying that regular maintenance is important no matter what you’re talking about. For example, good vehicle maintenance means regular oil changes, changing bald tires, and checking your brakes. There’s plenty else involved, but these three examples of proper automobile upkeep also […] June 18, 2024
Blog / The State of Cybersecurity – May 2024 The current state of cybersecurity This week we’re pleased to offer a special edition of our IT newsletter, The State of Cybersecurity, by TRINUS CEO and our very own IT guru, Kevin White. Rob Bot, Grace, and your Friendly Neighbourhood Cyber-man will return with a new video newsletter next week. Despite an increasing awareness of cyber security incidents, two common […] June 11, 2024
Blog / Multi-Factor Authentication Makes Multilayered Security Possible Passwords and Multi-Factor Authentication Are Complements, Not Replacements. Historic technicalities aside, users have always needed to provide two pieces of information when logging into a computer: their username, and its associated password. However, a relatively new process known as multi-factor authentication (MFA) is threatening to change that. Technology in general—and information technology (IT) specifically—develops at […] May 28, 2024
Blog / Beware the Fine Print When Making Cyber Insurance Claims Image showing concept of how cyber insurance and cyberinsurance claims are denied. Don’t Let Insurers Deny Your Cyber Insurance Claims The process for making cyber insurance claims is almost identical to making auto insurance claims, and as anyone who’s been on the receiving end of a denied auto-claim can attest, the devil is deep in the details; you can only take your car to the dealership for […] May 07, 2024
Blog / The Stormy Side of Cloud Services Storm Clouds Representing Cloud Services Causing Problems Some Cloud Services Could Lead to Turbulence For Your Organization Cloud services have become incredibly prolific over the last few years. Different clouds have appeared in various forms over the decades, but recently they’ve become substantially more popular and can be found in organizations of every size. It’s reached the point that some organizations and […] April 30, 2024

/Partners /Systems /Certifications

TRINUS is proud to partner with industry leaders for both hardware and software who reflect our values of reliability, professionalism and client-focused service.