Do I Know You?

Insider Threats There are a lot of opinions about hackers – who they are, what they want, where they come from, how they do what they do, what recourse we have.  But what kind of thought is given to the “Insider Threat”?  What’s the big idea?  It used to be that the only thing between…

Details

The UNLV-UNR Cooperative Farming Project 

Giving Back To The Educational Community   The UNLV-UNR Cooperative Farming Project   Not a case study, but a brief overview   A few months ago, TRA Consulting, Inc. participated in a project to retrofit a cooperative agricultural venture of UNLV-UNR with a modern and robust outdoor WiFi system which would cover 13 irrigation timers scattered around the property.  They had previously…

Details

Phishing Defined

Phishing is the fraudulent use of electronic communications to deceive and take advantage of users. Phishing attacks attempt to gain sensitive, confidential information such as usernames, passwords, credit card information, network credentials, and more. By posing as a legitimate individual or institution via phone or email, cyber attackers use social engineering to manipulate victims into performing specific actions—like…

Details

Balancing Humans And Society

There are no shortage of philosophies when it comes to computer and network security. Keeping data secure and private should be the number one priority for all those philosophies. One thing that is usually missing from these philosophies are the human component. As IT Technicians, most of the time we forget that the users we…

Details

Windows 10 Preview

Windows 10 is slated to come out later this year, with the goal of not just superseding the oft maligned windows 8 (and windows 8.1), but actually replacing it. Microsoft will offer Windows 10 as a free upgrade to users with devices. This is good for consumers who love their device and want to try…

Details

You’re Doing It Wrong

The list of the worst password for 2014 just came out, and it looks like the people’s favorite worst passwords are still at the top: “password” and 123456”. Other winners (or losers) are ‘12345’ (#3), ‘qwerty’ (#5), ‘abc123’ (#14), ‘football’ (#10), and my favorite ‘letmein’ (#13). In my career as an IT professional, I’ve seen…

Details

The Threat Within

What’s the biggest threat to a company’s network security? Viruses? Hackers? Worms? The NSA? It’s none of the above. The weakest point are the users. That’s right, the same people that you trust to use the computers that you want to protect are the ones that are putting it at risk, according to a recent…

Details

Beware of the Predator

As if there weren’t enough challenges for growing small and medium size businesses, there is another one to add to their list: Enterprise level malware software at affordable prices. Up to recently, the majority of Data breaches have been targeted at big corporation (Target, Staples, Home Depot, etc.), however now the targets have shifted to…

Details

Beware of the Predator

As if there weren’t enough challenges for growing small and medium size businesses, there is another one to add to their list: Enterprise level malware software at affordable prices. Up to recently, the majority of Data breaches have been targeted at big corporation (Target, Staples, Home Depot, etc.), however now the targets have shifted to…

Details

POODLE in the middle

Looks like the trend of security flaws in encryption protocols continues. Heartbleed, Bash Shellshock, and now POODLE. POODLE stands for Padding Oracle On Downgraded Legacy Encryption. This basically means that on encrypted HTTPS connections, applications like browsers will be forced to default down from TLS to SSL 3.0 even when the application supports all the…

Details