Coronavirus Malware
How hackers exploit times of extreme anxiety? Hello and my name is Thomas Andersen, and I am President of TRA Consulting, Inc.
DetailsHow hackers exploit times of extreme anxiety? Hello and my name is Thomas Andersen, and I am President of TRA Consulting, Inc.
DetailsThis is not a political treatise… By Thomas Andersen President TRA Consulting, Inc. In the regional conflicts involving superpowers, a lot of companies large and small get caught in the mix. If you have been following the news at all, you know that the USA and Iran have been in an escalation of words and actions…
DetailsI’m a little partial, but that doesn’t change the fact… By Thomas Andersen President TRA Consulting, Inc. In the war of email providers, let’s get real. If you are running G-Suite, you are doing your company a disservice. It really just isn’t that good. Let’s go through some of the technical basics. Security: By default, O365 has SPF…
DetailsDo you like to save money? By Thomas Andersen President TRA Consulting, Inc. Let’s talk bottom line. As a guy who is a technician at heart, I want you (my customer) to have THE BEST experience possible at work. I want you to work efficiently. I want to decrease downtime. I want to boost your productivity. But as…
DetailsWINDOWS 7 End of Life Jan 14, 2020 I like Windows 7. I’m old fashioned! By Thomas Andersen President TRA Consulting, Inc. Look, I really hope this isn’t the first time you are hearing about Windows 7 End of Life (EOL); but it may be time for me to throw my voice into the ring. You have to give…
DetailsThis is by no means a be all, end all guide… I am writing this blog article because I want to give whoever reads it a few easy-to-implement tips to secure their network against attack. You can implement some of these strategies yourself, if you are a do-it-yourselfer and feel confident in your abilities; or you…
DetailsAs an IT professional, I spend most of the year working within my comfort zone. Mitigating realized threats and potential threats; training and coaching my staff; developing relationships; doing project work; working with vendors and partners. I really enjoy what I do. The life of an IT Pro never gets dull. On the flip-side, it is…
DetailsInsider Threats There are a lot of opinions about hackers – who they are, what they want, where they come from, how they do what they do, what recourse we have. But what kind of thought is given to the “Insider Threat”? What’s the big idea? It used to be that the only thing between…
DetailsGiving Back To The Educational Community The UNLV-UNR Cooperative Farming Project Not a case study, but a brief overview A few months ago, TRA Consulting, Inc. participated in a project to retrofit a cooperative agricultural venture of UNLV-UNR with a modern and robust outdoor WiFi system which would cover 13 irrigation timers scattered around the property. They had previously…
DetailsPhishing is the fraudulent use of electronic communications to deceive and take advantage of users. Phishing attacks attempt to gain sensitive, confidential information such as usernames, passwords, credit card information, network credentials, and more. By posing as a legitimate individual or institution via phone or email, cyber attackers use social engineering to manipulate victims into performing specific actions—like…
Details