Blog

The Not-So-Secret Secret

   By Ken Zimmer Director of Sales Trivalent Group, Inc. I have been in a sales role for nearly 17 years at Trivalent Group dating back to my time as an employee at Remex Corporation before that company merged with the original Trivalent to form Trivalent Group.  I have met with thousands of people in […]

John Hey on WOOD TV8 News: How to Protect Home Devices from Hackers

GRAND RAPIDS, Mich. (WOOD) — The recent cyber attacks on home devices has many wondering what they can do to keep hackers out, especially when it comes to baby monitors, routers, and home surveillance cameras. One website gives an unsettling look at unsecured cameras in Grand Rapids where anybody can see what’s going on inside people’s […]

It is Heaven: Using the Cloud to Challenge Big Business

Has anyone suggested you begin moving your business to the cloud? Cloud data storage or cloud computing? What is this anyhow? And isn’t it something for huge companies? In previous posts, we have explained what cloud computing is. Simply put, it is the offsite storage of your data and perhaps the software packages you use. The […]

John Hey on WOOD TV8 News: Cybersecurity Expert John Hey Explains DDOS attack

Be Proactive: How to Avoid Potential Network Failures

For SMBs, an IT network failure can be devastating because they don’t have the resources of large corporations to bounce back from such disasters. Preparation against such devastation may be the only course for them to avoid failure and survive with the least damage if failure occurs. SMBs must be proactive in recognizing the eventuality […]

Cybersecurity Isn’t Just the IT Department’s Job

It’s an astounding — and perhaps disheartening — statistic: 60 percent of small companies are unable to sustain their business within six months of a cybercrime attack, according to the U.S. National Cyber Security Alliance. To help avoid joining their ranks, John Hey and other information technology experts advise small business managers to foster a […]

Loss of Data: Causes and Prevention

The adoption of technology in the simplest of matters to the most complex problems has rendered us heavily dependent on it. We love paying our bills minutes before they are due. We enjoy seeing loved ones face-to-face on our computer screens. We can access and print our extremely sensitive records from government and financial websites […]

WOOD TV8: Experts Talk Cybersecurity at Conference in Grand Rapids

GRAND RAPIDS, Mich. (WOOD) — Hundreds of people got together in Grand Rapids Wednesday to learn more about cybersecurity and how to protect themselves and their companies from attacks. Executives, security professionals and students were among the people who showed up to the Michigan Cyber Security Conference to learn more about how to keep their […]

What is the Cloud: A Simple Analogy

You use the cloud and don’t even know it. Do you go to Amazon and create a wish list? Do you have an email account on Gmail? That is cloud computing. All your emails are stored on Google’s servers somewhere. They are on physical servers, of course, but they aren’t on your laptop. The advantage […]

Trivalent Group to Co-Host 2016 Michigan Cyber Security Conference Featuring the FBI and Industry Experts

GRANDVILLE, MICH. (September 20, 2016) — Trivalent Group, Michigan’s leading provider of managed services, cloud, IT services, business continuity, and managed networks, is hosting the 2016 Michigan Cyber Security Conference in partnership with the BBB Serving Western Michigan, the WMCSC (West Michigan Cyber Security Consortium), and the Michigan SBDC (Small Business Development Center).  The 3rd […]