Uncategorized

Coronavirus Malware

How hackers exploit times of extreme anxiety? Hello and my name is Thomas Andersen, and I am President of TRA…

5 years ago

IRAN AND CYBERSECURITY

This is not a political treatise…  By Thomas Andersen  President TRA Consulting, Inc.  In the regional conflicts involving superpowers, a lot…

5 years ago

O365 SUPERIORITY OVER GSUITE

I’m a little partial, but that doesn’t change the fact…  By Thomas Andersen  President TRA Consulting, Inc.  In the war…

5 years ago

MINI COMPUTERS OR WORKSTATIONS?

Do you like to save money?  By Thomas Andersen  President TRA Consulting, Inc.  Let’s talk bottom line.  As a guy…

5 years ago

WINDOWS 7

WINDOWS 7 End of Life Jan 14, 2020 I like Windows 7.  I’m old fashioned!  By Thomas Andersen  President TRA Consulting, Inc.  …

5 years ago

Tips to Secure Your Network

This is by no means a be all, end all guide…  I am writing this blog article because I want…

5 years ago

Learning and Constant Improvement

As an IT professional, I spend most of the year working within my comfort zone.  Mitigating realized threats and potential…

5 years ago

Do I Know You?

Insider Threats There are a lot of opinions about hackers – who they are, what they want, where they come…

5 years ago

The UNLV-UNR Cooperative Farming Project

Giving Back To The Educational Community   The UNLV-UNR Cooperative Farming Project   Not a case study, but a brief overview   A few months…

5 years ago

Phishing Defined

Phishing is the fraudulent use of electronic communications to deceive and take advantage of users. Phishing attacks attempt to gain sensitive,…

5 years ago

This website uses cookies.