O365 SUPERIORITY OVER GSUITE

I’m a little partial, but that doesn’t change the fact…  By Thomas Andersen  President TRA Consulting, Inc.  In the war of email providers, let’s get real.  If you are running G-Suite, you are doing your company a disservice.  It really just isn’t that good.  Let’s go through some of the technical basics.  Security: By default, O365 has SPF…

Read more

MINI COMPUTERS OR WORKSTATIONS?

Do you like to save money?  By Thomas Andersen  President TRA Consulting, Inc.  Let’s talk bottom line.  As a guy who is a technician at heart, I want you (my customer) to have THE BEST experience possible at work.  I want you to work efficiently.  I want to decrease downtime.  I want to boost your productivity.  But as…

Read more

WINDOWS 7

WINDOWS 7 End of Life Jan 14, 2020 I like Windows 7.  I’m old fashioned!  By Thomas Andersen  President TRA Consulting, Inc.   Look, I really hope this isn’t the first time you are hearing about Windows 7 End of Life (EOL); but it may be time for me to throw my voice into the ring.  You have to give…

Read more

Tips to Secure Your Network

This is by no means a be all, end all guide…  I am writing this blog article because I want to give whoever reads it a few easy-to-implement tips to secure their network against attack. You can implement some of these strategies yourself, if you are a do-it-yourselfer and feel confident in your abilities; or you…

Read more

Learning and Constant Improvement 

As an IT professional, I spend most of the year working within my comfort zone.  Mitigating realized threats and potential threats; training and coaching my staff; developing relationships; doing project work; working with vendors and partners.   I really enjoy what I do.  The life of an IT Pro never gets dull.  On the flip-side, it is…

Read more

Do I Know You?

Insider Threats There are a lot of opinions about hackers – who they are, what they want, where they come from, how they do what they do, what recourse we have.  But what kind of thought is given to the “Insider Threat”?  What’s the big idea?  It used to be that the only thing between…

Read more

The UNLV-UNR Cooperative Farming Project 

Giving Back To The Educational Community   The UNLV-UNR Cooperative Farming Project   Not a case study, but a brief overview   A few months ago, TRA Consulting, Inc. participated in a project to retrofit a cooperative agricultural venture of UNLV-UNR with a modern and robust outdoor WiFi system which would cover 13 irrigation timers scattered around the property.  They had previously…

Read more

Phishing Defined

Phishing is the fraudulent use of electronic communications to deceive and take advantage of users. Phishing attacks attempt to gain sensitive, confidential information such as usernames, passwords, credit card information, network credentials, and more. By posing as a legitimate individual or institution via phone or email, cyber attackers use social engineering to manipulate victims into performing specific actions—like…

Read more