Triella’s Security Offerings – Part 3 – The Silver Standard

Clients with greater security concerns should operate at the Silver Standard.  The Silver standard includes all the items listed in the Bronze Standard, plus the following: What is included in the Silver Standard? There are 12 services included in the Silver Standard. Each service is described below: Computer Encryption This refers to the encryption of [...]

Triella’s Security Offerings – Part 2 – The Bronze Standard

At Triella we believe that all firms should operate with a minimum level of Bronze Standard. What services are included in the Bronze Standard? There are a total of 7 services that we have included in the Bronze Standard. These services form the base of establishing security standards at a firm. All the services are [...]

Triella’s Security Offerings – Part 1

The risks are real The threat landscape continues to evolve and with it brings more challenges for IT providers to protect their clients and data. Over the past few months we have seen IT providers get targeted by malware attacks which has crippled several of these firms. In turn all the clients that relied on [...]

Protecting Client Data During Border Crossings

Increasing the amount of information and inspection at border crossings is becoming more and more onerous. In particular, lawyers may be asked to provide access to their cell phones and laptop computers for "inspection" by border officers. What can lawyers do to protect the information of their clients? Here are a few suggestions: Smartphones Everyone [...]

Be Careful who you give your Computer Password to!

Why should I care? Say a "friend" drops over or someone you don't know needs to use a computer urgently.  They ask you for the password to the computer and you oblige by giving it to them.  This act could compromised your security. Many use Chrome for internet browsing. Chrome always offers to save passwords [...]

Latest Windows 10 Update may break your Bluetooth device!

Unsecure devices may no longer pair with Windows 10! The June cumulative Windows update can potentially break certain Bluetooth devices that Microsoft has flagged as unsafe. Several Windows updates in the past have caused unintentional breaks but this time Microsoft is deliberately blocking certain Bluetooth devices and warning users ahead of time. Security Update for [...]

How to Secure Your USB Drive

Why secure a USB drive? Encrypting a portable USB flash drive is a great way to prevent sensitive data falling into the wrong hands. This guide will demonstrate how to securely encrypt a USB flash drive within Windows so that the data stored on it cannot be read nor accessed without entering a secure password. [...]

Any.Run – Malware Analysis Tool

What are sandbox malware systems? Sandbox malware analysis systems are used to analyze suspicious files inside a realistic but isolated environment. This helps us to understand how malware files operate, the motivations behind the infection and to understand the goals of a breach. Any.Run Based out of Russia, Any.Run is a malware analysis tool that [...]

The Cost of Ransomware

How often does it happen? One business will be hacked every 14 seconds in 2019. Servers, computers, phones, files, everything you need to make your business function is a potential target. The result is to make all of your data unusable leaving you with very tough choices. This year ransomware is estimated to cost businesses [...]

Data Encryption

What is Data Encryption? Encryption is the process of encoding data so it can be read only by the intended recipient. This article discusses two main forms of encryption and provides insights on how a firm can start the process of encryption. Symmetric Encryption Symmetric encryption uses a single key to both encrypt and decrypt [...]