Trident Blog

Tridents new Security Operations Centre
Tuesday, October 23, 2018

Tridents new Security Operations Centre We are very pleased to announce the upcoming launch of our new Security Operations Centre (SOC). Headed by highly qualified and certified security professionals, the SOC is a centralized location from which all our security solutions can be deployed, monitored an  [Click Here To Read More] 

Top 10 Web Application Vulnerabilities
Tuesday, February 07, 2017

In a recent survey conducted across multiple industries in the United States it was found that over 50% of organisations had at least one serious vulnerability every single day of the year (White Hat Security, 2015)! Web applications have enabled organisations to build stronger relationships with their customers, suppliers and stakeholders   [Click Here To Read More] 

5 Great Tips to Strengthen Your Web Security
Friday, January 13, 2017

The preferred method for attacking businesses' online assets is via their web applications. According to a study released last year by HP, 69% of web applications scanned by the company had at least one SQL injection error, and 42% contained a cross-site scripting vulnerability. A White Hat Security Report (  [Click Here To Read More] 

Prevent Ransomware This Christmas Period
Monday, December 05, 2016

There’s nothing worse in the field of technology than having a criminal in control of your network. When a ransomware attack occurs, it can easily elevate from a potential data loss to potential identity theft to a data breach in the form of extortion. Many various types of ransomware such as Cryptolocker are on the rise across the web wi  [Click Here To Read More] 

Data is valuable, protect it!
Thursday, October 06, 2016

While banks and financial institutions have a lot to lose financially, people tend to forget how much Personal Identifiable Information (PII) smaller organisations hold and just how valuable that is! Think of all the PII a school holds on its staff, students, parents, past students, creditors and the wider community! What do we have of Value?   [Click Here To Read More] 

Rethinking IT Security
Sunday, July 17, 2016

For many years’ companies have been focussed on the security required to protect their IT investment and their data. Companies have installed firewalls and Anti-virus solutions and many would be quite confident that they have a good level of security in place. Unfortunately, today’s threat landscape has changed so rapidly and is no  [Click Here To Read More] 

Symantec Vulnerabilities Uncovered
Monday, July 11, 2016

Over the last week, the focus of IT professionals has been drawn towards Symantec, as details were released regarding more than two dozen vulnerabilities in its anti-virus software, many of which have been listed as "high" severity. The vulnerabilities cover most of the company's consumer and enterprise products, and some will need to be manual  [Click Here To Read More] 

IP Security Cameras in Schools – 5 things you may not have thought about
Wednesday, May 18, 2016

For the past 10 years I’ve been having discussions with many schools about using IP based security cameras in a large number of varied environments. Throughout this time I’ve come across a number of things that school’s maybe haven’t considered, or have incorrectly believed about the technology. To help, those of you  [Click Here To Read More] 

The First Line of Defence in Electronic Security
Saturday, April 30, 2016

The effective management of passwords is the first line of defence in the electronic security of any organisation. Benefits of a Password Procedure Appropriate access for all staff; Effective identity management and access auditing; Preservation and protection of personal information entrusted to your care; Protection of YOUR   [Click Here To Read More] 


Recent Posts