IRAN AND CYBERSECURITY

This is not a political treatise…  By Thomas Andersen  President TRA Consulting, Inc.  In the regional conflicts involving superpowers, a lot of companies large and small get caught in the mix.  If you have been following the news at all, you know that the USA and Iran have been in an escalation of words and actions…

Details

O365 SUPERIORITY OVER GSUITE

I’m a little partial, but that doesn’t change the fact…  By Thomas Andersen  President TRA Consulting, Inc.  In the war of email providers, let’s get real.  If you are running G-Suite, you are doing your company a disservice.  It really just isn’t that good.  Let’s go through some of the technical basics.  Security: By default, O365 has SPF…

Details

MINI COMPUTERS OR WORKSTATIONS?

Do you like to save money?  By Thomas Andersen  President TRA Consulting, Inc.  Let’s talk bottom line.  As a guy who is a technician at heart, I want you (my customer) to have THE BEST experience possible at work.  I want you to work efficiently.  I want to decrease downtime.  I want to boost your productivity.  But as…

Details

WINDOWS 7

WINDOWS 7 End of Life Jan 14, 2020 I like Windows 7.  I’m old fashioned!  By Thomas Andersen  President TRA Consulting, Inc.   Look, I really hope this isn’t the first time you are hearing about Windows 7 End of Life (EOL); but it may be time for me to throw my voice into the ring.  You have to give…

Details

Tips to Secure Your Network

This is by no means a be all, end all guide…  I am writing this blog article because I want to give whoever reads it a few easy-to-implement tips to secure their network against attack. You can implement some of these strategies yourself, if you are a do-it-yourselfer and feel confident in your abilities; or you…

Details

Do I Know You?

Insider Threats There are a lot of opinions about hackers – who they are, what they want, where they come from, how they do what they do, what recourse we have.  But what kind of thought is given to the “Insider Threat”?  What’s the big idea?  It used to be that the only thing between…

Details

The UNLV-UNR Cooperative Farming Project 

Giving Back To The Educational Community   The UNLV-UNR Cooperative Farming Project   Not a case study, but a brief overview   A few months ago, TRA Consulting, Inc. participated in a project to retrofit a cooperative agricultural venture of UNLV-UNR with a modern and robust outdoor WiFi system which would cover 13 irrigation timers scattered around the property.  They had previously…

Details

Phishing Defined

Phishing is the fraudulent use of electronic communications to deceive and take advantage of users. Phishing attacks attempt to gain sensitive, confidential information such as usernames, passwords, credit card information, network credentials, and more. By posing as a legitimate individual or institution via phone or email, cyber attackers use social engineering to manipulate victims into performing specific actions—like…

Details