Coronavirus Malware

4 years ago

How hackers exploit times of extreme anxiety? Hello and my name is Thomas Andersen, and I am President of TRA…

IRAN AND CYBERSECURITY

4 years ago

This is not a political treatise…  By Thomas Andersen  President TRA Consulting, Inc.  In the regional conflicts involving superpowers, a lot…

O365 SUPERIORITY OVER GSUITE

4 years ago

I’m a little partial, but that doesn’t change the fact…  By Thomas Andersen  President TRA Consulting, Inc.  In the war…

MINI COMPUTERS OR WORKSTATIONS?

4 years ago

Do you like to save money?  By Thomas Andersen  President TRA Consulting, Inc.  Let’s talk bottom line.  As a guy…

WINDOWS 7

4 years ago

WINDOWS 7 End of Life Jan 14, 2020 I like Windows 7.  I’m old fashioned!  By Thomas Andersen  President TRA Consulting, Inc.  …

Tips to Secure Your Network

4 years ago

This is by no means a be all, end all guide…  I am writing this blog article because I want…

Learning and Constant Improvement

4 years ago

As an IT professional, I spend most of the year working within my comfort zone.  Mitigating realized threats and potential…

Do I Know You?

5 years ago

Insider Threats There are a lot of opinions about hackers – who they are, what they want, where they come…

The UNLV-UNR Cooperative Farming Project

5 years ago

Giving Back To The Educational Community   The UNLV-UNR Cooperative Farming Project   Not a case study, but a brief overview   A few months…

Phishing Defined

5 years ago

Phishing is the fraudulent use of electronic communications to deceive and take advantage of users. Phishing attacks attempt to gain sensitive,…

This website uses cookies.