Infradapt Blog

This is some blog description about this site

John Reilly is Managing Partner at Infradapt, LLC. Prior to joining Infradapt, he was the President of Vital IT Solutions, Inc., where among other roles, he developed a methodology and approach for performing risk and compliance assessments.



Prior to Infradapt, Mr. Reilly founded Vital IT Solutions, Inc., Mr. Reilly worked with Expanets, Inc., as a Senior Converged Account Executive, specializing in VoIP and Security, and a Subject Matter Expert (SME) on HIPAA. His Expanets’ achievements included national Sales awards including Millionaire’s Club and pioneering VoIP deployments for regional clients.

Mr. Reilly also has direct work experience in the banking industry, where he worked in Sales and Management, and in manufacturing, where he worked as an Accountant. John earned his BS in Accounting at Gwynedd-Mercy College, while also studying Negotiation, Decision Making, and Creative Problem Solving. He holds a SANS GIAC security certification and is a member of the Philadelphia Chapter of InfraGard.


 

Monitoring and Automation Make for a More Secure System

Monitoring and Automation Make for a More Secure System

Information technology, in many ways, is a necessary evil. Sure, modern businesses more or less require it to remain competitive, but it also opens up your business to a multitude of threats. Maintaining your security is made much easier with automated monitoring tools. Today, we’ll discuss how to use these tools to protect your business.


The Situation at Hand
Let’s face it, there is a mammoth amount of cyberthreats out there that could potentially infiltrate your business during your daily goings-on. What’s worse, it only takes one to find a weak point in your security and cause you and your business no small amount of trouble - and as though that wasn’t enough, this mammoth amount of cyberthreats is always growing and adapting to be more effective.

Frankly, unless your entire staff is devoted to maintaining the business’ security, it is highly unlikely that your business can keep up with the threats to it.

Unless…
There are a few solutions to this quandary - the first of which being the monitoring services that a trusted MSP like Infradapt can provide. With the assistance of top-of-the-line automated tools to help detect and identify threats to your security, our team can ensure that your business remains safe.

Why Automation Helps
One of the reasons that our automated tools are so effective is that the slim chance of human error on our end is effectively mitigated. Rather than having our eyes trying to detect the minute warning signs of impending issues or threats, we have systems and software that utilize artificial intelligence and machine learning to catch threats before they darken your door, so to speak.

As a result, you can devote less of your valuable time, energy, and focus on keeping threats out, and more time on innovating and optimizing other, income-generating parts of your business.

If you would like assistance in setting up an automated system or would like to discuss our monitoring solutions a little further, please give us a call at 800.394.2301.

Continue reading
0 Comment

ALERT: Change Your Twitter Password, Says Twitter

ALERT: Change Your Twitter Password, Says Twitter

Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation seriously.


On Thursday, May 3, it came to light that there was an internal log upon which an undisclosed number of account passwords were recorded without any protection. As a result, this unknown amount of passwords can no longer be considered secure, even though there is no apparent evidence that any data breach has occurred.

Twitter uses a process called hashing to protect their passwords, as many companies do. However, a bug created a log of passwords before they were hashed, leaving them fully legible. This bug has since been resolved.

In response to this situation, Twitter is being proactive and recommending that all of its users change their passwords, just in case. To do so, log in to your account in your browser, access Settings and privacy, and from there, Password. It is also a good idea to enable two-factor authentication by accessing Settings and privacy, clicking into Account. Once there, click on the “Set up login verification” button and follow the instructions. You will find yourself on a Login verification screen, where you can activate the means to generate another authentication code.

While disaster seems to be averted this time, you should not hesitate to change your password as soon as possible, and makes sure that all of your online accounts have strong passwords in place. For more information about keeping your identity safe online, call the IT professionals at Infradapt at 800.394.2301.

 

Continue reading
0 Comment

What Star Wars can Teach About Mentorship

What Star Wars can Teach About Mentorship

The Star Wars saga has many recurring themes - the struggle between desire and destiny, good and evil, impulse and discipline. However, a theme that particularly stands out throughout the series is the examination of the relationship between student and teacher. This theme is similar to the relationship that an IT provider should strive to have with their clients.


For today’s Star Wars Day blog, we’ll review some of the lessons that a professional can learn from the Star Wars films, as well as what the insights that the relationships shared by the characters can reveal about being a mentor, as well as the mentored. To do so, we’ll examine some moments and characters from the complete series thus far - Episodes I through VIII - and the stand-alone Rogue One.

WARNING: this article may spoil a few key moments from the series, so continue at your own caution.

How to Be a Mentor, According to Star Wars
There is no shortage of those who could be considered mentors throughout the series. From Qui-Gon Jinn and Obi-Wan/Old Ben Kenobi, Luke Skywalker and Leia Organa, and finally, Yoda, many characters accept the mantle of mentor… albeit begrudgingly, at times.

In order to be a mentor, there are two requirements that each of these characters present during the series. Likewise, many characters also exhibit just one or the other characteristic. Yet, as they do not exemplify both qualities, they don’t quite qualify as a true mentor. We will explore these characters in more detail later.

These two requirements are to be a committed educator, as well as an equally committed leader. Each of the mentors listed above have had the opportunity to be both, and rose to the occasion. Qui-Gon took the initiative to take a young slave into his care, campaigning to the Jedi Council for the ability to teach him. When Qui-Gon was dispatched by Darth Maul, Obi-Wan rose to the occasion and took up Anakin Skywalker as his padawan learner.

Years after Anakin succumbed to his fear and hubris to be reborn as Darth Vader, Obi-Wan continued to be a mentor under the name Ben Kenobi, teaching the Skywalker of the next generation how to embody the principles of the Jedi. Once this Skywalker, Luke, had learned to be a leader, he teamed up with his long lost sister, Princess Leia Organa, to defeat the Empire. While Leia continued to lead an underground organization committed to fighting the Empire’s last remnants, Luke retreated to a sanctuary to ensure he was able to train the next worthy Jedi.

Finally, we would be amiss if we neglected to mention Yoda’s involvement as a leader throughout the saga. From the very beginning of the story, Yoda was a respected leader of the Jedi Order, proving his worth on the battlefield and in the Senate. When the Empire rose, he retreated to his home planet in wait of the next generation of Jedi to train. He then passed on, but returned as a Force ghost to impart his wisdom again, later in the series’ timeline.

Lining Up Star Wars Mentorship with Our Own (and with The Odyssey)
As one might imagine, the concept of mentorship has been around for much longer than Star Wars has been. In fact, we get the word “mentor” from a character in Homer’s epic poem, The Odyssey. Mentor was entrusted by the protagonist, Odysseus, to care for his son in his absence, and later assisted the young prince Telemachus in reuniting with his long-lost father by serving as his guide and, well, mentor.

In this way, Mentor serves a very similar purpose as many of the characters from Star Wars. By teaching another character and acting as a leader, he allows the protagonists to succeed in their quest - or, in the terminology more likely to be used in Star Wars, their mission. Furthermore, like the mentors to be found in Star Wars, Mentor shares a few characteristics with the mentors we see in the business world.

What Makes a Mentor, a Mentor
We’ve already established that a mentor should be a sort of amalgamation of a teacher, and a leader. This is admittedly a tricky balance to find, until you describe what kind of leader and teacher makes a mentor.

First, as a leader, you have to be able to be supportive as you take charge. As you work with a mentee, commit the time that the mentee needs to grow and devote your full attention to them. Just as Ben Kenobi understood Luke’s rage and bitterness after his aunt and uncle were slaughtered by the Empire’s stormtroopers, you need to be able to emphasize with your acolyte and guide them towards the higher purpose you can see them achieving.

As a teacher, it is important to also challenge those who you mentor. Not only should you assign tasks for your student to complete, these tasks should test the limits of their ability and set a standard that you expect them to meet. As Yoda challenged Luke to lift his X-wing fighter out of the swamps of Dagobah, he wasn’t coddling his student. Neither should you.

It is also important that, as their teacher, you review the lessons that have been imparted. These discussions will not only help ensure the information is retained, it will also encourage your mentee to draw their own conclusions. Remember, teachable moments happen all the time - it’s up to you to embrace them.

Finding Poor Examples in Rogue One
Alternatively, Rogue One offers a few examples of how to very much not be a positive leader. At the very beginning of the film, protagonist Jyn Urso’s father, Galen, is pressured into returning into the Empire’s service and designing the ultimate superweapon: the planet-destroying Death Star. In addition to being forced to work on a project he detests, he is stuck in a thoroughly unpleasant work environment. Oh, and did we mention that his wife was murdered and his daughter lost to him during the attack?

It should be no wonder, then, that instead of being loyal to his ‘employers,’ Galen instead decides to sabotage their operation from the inside. Hiding a critical weakness in the Death Star and sending word of it to the Rebel Alliance, Galen embodies the corporate espionage that a disgruntled employee could leverage against your business. A good leader sees the value in keeping an employee happy in two ways - first, it helps to keep that employee engaged and productive, and secondly, it reduces, if not eliminates, any ill will toward the organization.

In another example of the Empire’s failings in Rogue One, the antagonists of the film also leverage shady office politics to get a leg up on their superiors. For instance, Director Krennic elects to go over his commander’s head and out of the traditional chain of command, reporting directly to Darth Vader. As a commanding officer himself, Krennic serves as an example of what happens when office politics supersede the typical chain of command - and winds up being Force-choked into oblivion for his troubles. While it is highly unlikely that deviating from the chain of command will get you strangled like Krennic, it certainly doesn’t reflect well on you and shows a distinct lack of leadership and respect for the chain of command.

All this only goes to show that lessons in leadership can be found anywhere you look - even in a galaxy far, far away. Do you have any Jedi masters or mentors in your life? What have you learned from them? Share your thoughts in the comments, and may the Fourth be with you!

Continue reading
0 Comment

Tip of the Week: Working from Google Home

Tip of the Week: Working from Google Home

It is no secret that Google can serve a great utility in the office through its many services and applications. However, have you ever considered how the Google Assistant can, well, assist you through devices like your smartphone and the assorted smart speakers that Google has produced? For today’s tip, we’ll review how some of the features of the Google Assistant can lend you a hand in the professional environment.


Basic Automation
Since productivity is one of the top goals in almost any office, it only makes sense to first focus on how using Google Home can boost your productivity through automation. While the device can serve many purposes on its own, it truly blossoms as a productivity tool through integrations with other devices and services.

For example, if you have equipped your office with smart lights or smart thermostats, you can adjust your office’s environment simply by telling Google to make the change you want. As a result, you can take greater control over your business environment without interrupting your productivity. After all, doesn’t it take much less time and effort to simply say, “Hey Google, turn off the lights in the conference room,” or “Hey Google, set temperature to 73 degrees,” than it would to interrupt what you were doing and go manually make the same changes?

More Advanced Automation (Kind Of)
If you’re at all familiar with the web service IFTTT, you can integrate it with your Google Home device to automate a variety of outcomes, based on predetermined triggers. It’s right in IFTTT’s name: If This, Then That.

Using IFTTT, you can connect your Google Home (or whichever Google device you’re using) to design your own commands that require the use of the Google Home. All you have to do is set “this” to be the Google Assistant, and choose the trigger you want your command to use. These triggers will all be of the spoken word variety, and each command can feature a few different variations. Once you’ve assigned the words to the command, click Create Trigger. To add the desired action you want automated, click through “that.”

You can then search through the available channels that you can trigger through your Google Assistant, select the one you want, and fill in the required configuration fields. Once you hit finish, your automated action will be active and ready to go when you are.

Activating More Commands
The Google Home devices have other utilities baked in that can be of some use to you in an office setting, especially if multiple devices are in use.

For instance, if your office is large and you can’t get ahold of someone through message or phone call, your Google Home device can function as an intercom. By accessing the Assistant on your smartphone, you can command the Google Home to “broadcast” and it will replay whatever message you speak into it afterwards to any Home devices connected to your account.

Of course, the Google Home devices are receptive to commands from multiple users, with up to six accounts being able to use the devices in their own way. The Google Home will even customize their answers based on the user making the request through its Voice Match training.

Finally, if a visitor to the office has something to share over the Google Home, the Guest mode allows them to connect directly to the device, without needing to connect to Wi-Fi. This means that you can keep your Wi-Fi password to yourself, and not give it out to every visitor to your office.

How else can you think of to use the Google Home to augment your day-to-day activities in the office? Share your ideas in the comments!

Continue reading
0 Comment

this is a test

this is a test

this is a test blog 

What is Lorem Ipsum?
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.


Why do we use it?
It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout. The point of using Lorem Ipsum is that it has a more-or-less normal distribution of letters, as opposed to using 'Content here, content here', making it look like readable English. Many desktop publishing packages and web page editors now use Lorem Ipsum as their default model text, and a search for 'lorem ipsum' will uncover many web sites still in their infancy. Various versions have evolved over the years, sometimes by accident, sometimes on purpose (injected humour and the like).

 

Where does it come from?
Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old. Richard McClintock, a Latin professor at Hampden-Sydney College in Virginia, looked up one of the more obscure Latin words, consectetur, from a Lorem Ipsum passage, and going through the cites of the word in classical literature, discovered the undoubtable source. Lorem Ipsum comes from sections 1.10.32 and 1.10.33 of "de Finibus Bonorum et Malorum" (The Extremes of Good and Evil) by Cicero, written in 45 BC. This book is a treatise on the theory of ethics, very popular during the Renaissance. The first line of Lorem Ipsum, "Lorem ipsum dolor sit amet..", comes from a line in section 1.10.32.

The standard chunk of Lorem Ipsum used since the 1500s is reproduced below for those interested. Sections 1.10.32 and 1.10.33 from "de Finibus Bonorum et Malorum" by Cicero are also reproduced in their exact original form, accompanied by English versions from the 1914 translation by H. Rackham.

Where can I get some?
There are many variations of passages of Lorem Ipsum available, but the majority have suffered alteration in some form, by injected humour, or randomised words which don't look even slightly believable. If you are going to use a passage of Lorem Ipsum, you need to be sure there isn't anything embarrassing hidden in the middle of text. All the Lorem Ipsum generators on the Internet tend to repeat predefined chunks as necessary, making this the first true generator on the Internet. It uses a dictionary of over 200 Latin words, combined with a handful of model sentence structures, to generate Lorem Ipsum which looks reasonable. The generated Lorem Ipsum is therefore always free from repetition, injected humour, or non-characteristic words etc.

 

Continue reading
0 Comment