Learning and Constant Improvement 

As an IT professional, I spend most of the year working within my comfort zone.  Mitigating realized threats and potential threats; training and coaching my staff; developing relationships; doing project work; working with vendors and partners.   I really enjoy what I do.  The life of an IT Pro never gets dull.  On the flip-side, it is…

Read more

Do I Know You?

Insider Threats There are a lot of opinions about hackers – who they are, what they want, where they come from, how they do what they do, what recourse we have.  But what kind of thought is given to the “Insider Threat”?  What’s the big idea?  It used to be that the only thing between…

Read more

The UNLV-UNR Cooperative Farming Project 

Giving Back To The Educational Community   The UNLV-UNR Cooperative Farming Project   Not a case study, but a brief overview   A few months ago, TRA Consulting, Inc. participated in a project to retrofit a cooperative agricultural venture of UNLV-UNR with a modern and robust outdoor WiFi system which would cover 13 irrigation timers scattered around the property.  They had previously…

Read more

Phishing Defined

Phishing is the fraudulent use of electronic communications to deceive and take advantage of users. Phishing attacks attempt to gain sensitive, confidential information such as usernames, passwords, credit card information, network credentials, and more. By posing as a legitimate individual or institution via phone or email, cyber attackers use social engineering to manipulate victims into performing specific actions—like…

Read more