WINDOWS 7

WINDOWS 7 End of Life Jan 14, 2020 I like Windows 7.  I’m old fashioned!  By Thomas Andersen  President TRA Consulting, Inc.   Look, I really hope this isn’t the first time you are hearing about Windows 7 End of Life (EOL); but it may be time for me to throw my voice into the ring.  You have to give…

Read more

Tips to Secure Your Network

This is by no means a be all, end all guide…  I am writing this blog article because I want to give whoever reads it a few easy-to-implement tips to secure their network against attack. You can implement some of these strategies yourself, if you are a do-it-yourselfer and feel confident in your abilities; or you…

Read more

Learning and Constant Improvement 

As an IT professional, I spend most of the year working within my comfort zone.  Mitigating realized threats and potential threats; training and coaching my staff; developing relationships; doing project work; working with vendors and partners.   I really enjoy what I do.  The life of an IT Pro never gets dull.  On the flip-side, it is…

Read more

Do I Know You?

Insider Threats There are a lot of opinions about hackers – who they are, what they want, where they come from, how they do what they do, what recourse we have.  But what kind of thought is given to the “Insider Threat”?  What’s the big idea?  It used to be that the only thing between…

Read more

The UNLV-UNR Cooperative Farming Project 

Giving Back To The Educational Community   The UNLV-UNR Cooperative Farming Project   Not a case study, but a brief overview   A few months ago, TRA Consulting, Inc. participated in a project to retrofit a cooperative agricultural venture of UNLV-UNR with a modern and robust outdoor WiFi system which would cover 13 irrigation timers scattered around the property.  They had previously…

Read more

Phishing Defined

Phishing is the fraudulent use of electronic communications to deceive and take advantage of users. Phishing attacks attempt to gain sensitive, confidential information such as usernames, passwords, credit card information, network credentials, and more. By posing as a legitimate individual or institution via phone or email, cyber attackers use social engineering to manipulate victims into performing specific actions—like…

Read more