Notice: Undefined index: option in /var/www/html/jc.infradapt.com/plugins/system/fixfrontedit/fixfrontedit.php on line 20 John Reilly - Page 55

Infradapt Blog

This is some blog description about this site

John Reilly is Managing Partner at Infradapt, LLC. Prior to joining Infradapt, he was the President of Vital IT Solutions, Inc., where among other roles, he developed a methodology and approach for performing risk and compliance assessments.



Prior to Infradapt, Mr. Reilly founded Vital IT Solutions, Inc., Mr. Reilly worked with Expanets, Inc., as a Senior Converged Account Executive, specializing in VoIP and Security, and a Subject Matter Expert (SME) on HIPAA. His Expanets’ achievements included national Sales awards including Millionaire’s Club and pioneering VoIP deployments for regional clients.

Mr. Reilly also has direct work experience in the banking industry, where he worked in Sales and Management, and in manufacturing, where he worked as an Accountant. John earned his BS in Accounting at Gwynedd-Mercy College, while also studying Negotiation, Decision Making, and Creative Problem Solving. He holds a SANS GIAC security certification and is a member of the Philadelphia Chapter of InfraGard.


 

Study Finds that 45% of Virtual Machines Would Run More Efficiently in the Cloud

Study Finds that 45% of Virtual Machines Would Run More Efficiently in the Cloud
Strict Standards: Declaration of JParameter::loadSetupFile() should be compatible with JRegistry::loadSetupFile() in /var/www/html/jc.infradapt.com/libraries/joomla/html/parameter.php on line 512

By now you’ve surely heard about the benefits of cloud computing, but a new survey by TSO Logic might be just the proof you need to make the leap to the cloud. The survey analyzed 10,000 physical servers and 25,000 virtual machines, and the results are quite revealing!

Continue reading
0 Comment

Tip of the Week: Easy Ways to Train Your Staff About IT

Tip of the Week: Easy Ways to Train Your Staff About IT

You might wish that your employees know more about IT and its inner workings, and you’re not alone. SMBs often suffer from a lack of IT talent, and they might try to supplement this lack of proficiency by training employees on how to do basic computer tasks required to work effectively. Thankfully, you don’t have to rely on just your knowledge and that of your employees when it comes to maintaining your technology.

Continue reading
0 Comment

Rootkit Hacks are Nasty, But Preventable

Rootkit Hacks are Nasty, But Preventable

The challenge for business owners is that there are so many different types of online threats, it borders on impossible to protect themselves from all of them. All of these threats hold limitless possibility to ruin your organization’s operations, either short-term or long-term. One of the most common threats out there is called a rootkit hack, and it’s one that you certainly don’t want to mess around with.

Continue reading
0 Comment

Explaining Managed IT to Busy Business Owners

Explaining Managed IT to Busy Business Owners

As a business, you focus on providing a specific good or service to your area. This means spending a considerable amount of time trying to make your organization the go-to SMB for that particular service. All organizations specialize in a certain craft, but sometimes their skills may fall short of their needs in areas that lay outside this expertise. Outsourcing is a simple way for businesses to leverage skills that aren’t part of their expertise without taking the time to learn the skill themselves, and it’s an invaluable part of any business owner’s strategy.

Continue reading
0 Comment

Get to Know the 5 Most Common Cyber Threats

Get to Know the 5 Most Common Cyber Threats

As a technology-using business owner, it’s your responsibility to take the security of your organization’s data seriously. This entails knowing the finer details of the many security threats that are out and about on the Internet. Here is a list that includes many of the major threats that you’ll want to keep a lookout for in the business world, and what you can do to stop them.


Viruses
It’s not uncommon for a computer to get infected with a virus after some use. All it takes to get one is clicking on the wrong link or downloading an infected file. Viruses often cause both major and minor problems, with the least of your worries being a major slowdown. In many cases, viruses are the simplest of threats, and could be symptoms of much worse problems. If you suspect that your computer has been infected by a virus, make sure that you check for other problems as well.

Malware
Another major contender for most popular threat is malware, simply because of how incredibly varied the term is. “Malicious software,” is designed to perform a specific task, and as such, there are practically infinite types of malware out there. Some variants try to steal data, while others just want to destroy it. Regardless, you should do everything you can to keep malware out of your system. Antivirus and antimalware programs are great ways to eliminate threats that have made it into your infrastructure.

Trojans
Trojans, like their namesake (the Greek Trojan Horse), install backdoors on your device to allow for remote access. This is mainly so hackers can have a way into your device for a future hacking campaign or otherwise. In fact, trojans are often installed on a device during other, less serious hacking attacks, using a distraction that takes the focus away from the trojan being installed. If you want to ensure that you catch trojans on your network, you want only the most powerful antivirus solutions.

Ransomware
This is perhaps the most dreaded threat that there is in today’s business world. Ransomware is malware designed to encrypt your files using high-end encryption protocol, which then demands that you pay a fee for the decryption key. The only surefire way to get your data out of this situation safely is to restore a backup, but some organizations don’t even have this contingency available to them. Additionally, most ransomware moves around via spam, so it’s important that you make sure you have protection against it. This includes malicious links and attachments, as well as educating your team on what to look for.

Phishing and Spear Phishing
Phishing and advanced spear-phishing are designed to take advantage of the human aspect of your organization. Through technologies like email or phone calls, hackers will try to steal sensitive information or coax passwords or credentials out of unsuspecting users. Spam messages are often personalized to make them appear to be the real deal, even though they’re just messages designed to trick the user. Phishing messages often come in the form of threats from fake law enforcement or government agencies, which take advantage of the fear factor. These messages can be prevented with a spam filter that keeps them out of your inbox in the first place.

If you have concerns about the security of your organization’s infrastructure, reach out to us at 800.394.2301.

Continue reading
0 Comment

Joomla! Debug Console

Errors

Session

Profile Information

Memory Usage

Database Queries