Notice: Undefined index: option in /var/www/html/jc.infradapt.com/plugins/system/fixfrontedit/fixfrontedit.php on line 20 John Reilly - Page 100

Infradapt Blog

This is some blog description about this site

John Reilly is Managing Partner at Infradapt, LLC. Prior to joining Infradapt, he was the President of Vital IT Solutions, Inc., where among other roles, he developed a methodology and approach for performing risk and compliance assessments.



Prior to Infradapt, Mr. Reilly founded Vital IT Solutions, Inc., Mr. Reilly worked with Expanets, Inc., as a Senior Converged Account Executive, specializing in VoIP and Security, and a Subject Matter Expert (SME) on HIPAA. His Expanets’ achievements included national Sales awards including Millionaire’s Club and pioneering VoIP deployments for regional clients.

Mr. Reilly also has direct work experience in the banking industry, where he worked in Sales and Management, and in manufacturing, where he worked as an Accountant. John earned his BS in Accounting at Gwynedd-Mercy College, while also studying Negotiation, Decision Making, and Creative Problem Solving. He holds a SANS GIAC security certification and is a member of the Philadelphia Chapter of InfraGard.


 

Tip of the Week: Use This Chrome Extension to Avoid Online Movie Spoilers

Tip of the Week: Use This Chrome Extension to Avoid Online Movie Spoilers
Strict Standards: Declaration of JParameter::loadSetupFile() should be compatible with JRegistry::loadSetupFile() in /var/www/html/jc.infradapt.com/libraries/joomla/html/parameter.php on line 512

b2ap3_thumbnail_spoiler_alert_400.jpgThe Internet is a great and wondrous thing, giving us information about pretty much anything we could ever hope for. However, this is a dangerous thing for those who want to go about their entertainment “spoiler-free.” In other words, you want to be pleasantly surprised when you watch your favorite movies or TV shows. Sometimes the Internet isn’t so kind toward that goal. Well, here’s a somewhat viable solution: the Spoiler Alert extension for Google Chrome.

Tags:
Continue reading
0 Comment

Why it’s Beneficial to Know What Your Network’s Firewall Does

Why it’s Beneficial to Know What Your Network’s Firewall Does

b2ap3_thumbnail_firewall_security_400.jpgYour network’s firewall plays a vital role in protecting your business’s mission-critical assets from external threats. As one of the most basic PC security layers, it would be silly to function without one. Granted, having a firewall and knowing what it protects you from are two different things entirely. To maximize your business’s data security infrastructure, you should pay close attention to how each individual part of your security solution works, including your firewall.


What a Firewall Does
As the first security entity that threats come up against, the firewall is a prominent part of your network security strategy. It analyzes the data that flows in and out of your network, making sure that threats aren’t sneaking in or out. You can consider it a bouncer for your network, making sure that only safe information passes to and from your network.

As defined by Gartner’s IT glossary:

A firewall is an application or an entire computer (e.g., an Internet gateway server) that controls access to the network and monitors the flow of network traffic. A firewall can screen and keep out unwanted network traffic and ward off outside intrusion into a private network. This is particularly important when a local network connects to the Internet. Firewalls have become critical applications as use of the Internet has increased.

Basically, the best part of your firewall solution is that it keeps the threats out of your network, while still allowing you to use your network without any hassles. Even the average PC user can benefit from a firewall solution. Considering how most computers and devices aren’t nearly as wary about sharing their information as they should be, it’s important that you are using one at all times. This is the precise reason why many businesses choose to integrate separate hardware-based security solutions that are capable of being deployed to your entire IT infrastructure, not just individual workstations and servers.

Why Firewalls Are Necessary
The Internet is an unpredictable place full of threats, like viruses, malware, spyware, phishing attacks, and so much more. If left unchecked, these threats can steal information, render your infrastructure inoperable, lock down your systems for ransom; pretty much anything is game for hackers. This is why you need to keep threats out of your system at all costs, and a firewall is the first big step toward doing so. If your organization handles sensitive data like Social Security numbers, credit card information, and personal records, you need to make sure that your business is extra secure; otherwise, you could run into some trouble by violating HIPAA, PCI, and other compliance regulations.

One of the most important benefits of using a firewall is that it makes your business’s security initiatives proactive rather than reactive, meaning that you can keep potential issues in check, provided they’re found early enough. This helps you limit the damage done by potential security breaches, and helps you better manage damage control. Integrating a firewall is a vital first step, but you should also be aware of a Unified Threat Management solution, which includes antivirus, content filtering, spam blocker, and the ever-important firewall. For more information, contact Infradapt at 800.394.2301.

Continue reading

3 “as a Service” IT Offerings That Allow Your Business to Do More For Less

3 “as a Service” IT Offerings That Allow Your Business to Do More For Less

b2ap3_thumbnail_great_ideas_it_optimization_400.jpgYou know that you need a complete IT infrastructure in order to maximize the profitability of your company’s technology. Yet, you may have doubts that you’ve got it in your budget to afford all the necessary equipment and software. Thanks to the many “as a service” offerings of today’s market, virtually any business can afford to get their hands on the technology they need to succeed.


Essentially, “as a service” offerings provide companies the advantage of not having to pay upfront for IT expenses. Instead, the technologies are available at an affordable monthly rate, and these “as a service” solutions often come with oversight and assistance provided by a reliable IT company, like Infradapt. Here are three examples of “as a service” offerings that can revolutionize your company’s IT infrastructure and budget.

Software as a Service
The traditional approach to enterprise software is to purchase one copy for each workstation, or perhaps one version for your server that can be accessed by each connected PC operated by a licensed user. The problem with this approach is that it’s pricey to purchase the needed software, as well as to deploy the software to every workstation. Software as a Service removes these barriers by allowing you to subscribe to the software you need.

Microsoft Office 365 is a great example of this. Instead of having to buy and install one CD-ROM of each Office app that you need, simply purchase Office 365 accounts for your team. This will provide them with access to only the Office apps they need to do their jobs, and since Office 365 is cloud-based, you don’t have to install the software on your servers and your staff gains anytime/anywhere access.

Hardware as a Service
Hardware as a Service (HaaS) allows organizations to get their hands on the IT equipment they need, like server units, workstations, etc., by essentially leasing it. HaaS is very advantageous for businesses, especially if you have a difficult time coming up with enough capital to make a major IT purchase like a new server unit. In fact, paying for IT equipment through HaaS actually comes from your operating budget, which means that you can get the IT infrastructure of your dreams without having to dip into your capital funds. As a bonus, the IT company that you’re leasing the equipment from will often times service and upgrade the equipment as part of the terms of your lease, making it even more attractive to companies on a budget.

Infrastructure as a Service
With IaaS, you’re essentially getting all the benefits of SaaS and extending them across your entire computing platform. One common way that IaaS is achieved is by cloud computing. Thanks to the advancements afforded by the cloud, it’s now entirely possible to host your entire IT infrastructure in the cloud, or even part of it if that better suits your needs. The advantages of IaaS are many, including not having to pay for and maintain the hardware required to host a platform in-house. This will free up physical space in your office, save on electricity costs, and provide your staff with the means to access the hosted network from anywhere that has an Internet connection.

The money you will save by taking advantage of these three “as a service” offerings will revolutionize how your business approaches technology, and may even get you thinking about other aspects your business that you can turn into a service. This kind of outside-the-box service is what Infradapt specializes in. Call us today at 800.394.2301 to learn more.

Tags:
Continue reading

What if Your Worst Threat Comes From Inside Your IT Department?

What if Your Worst Threat Comes From Inside Your IT Department?

b2ap3_thumbnail_network_security_issues_400.jpg“The call is coming from inside the house!” This memorable quote is from the 1979 horror classic When a Stranger Calls. In the movie, this chilling information is presented to a woman after she has her call traced to locate the whereabouts of a stranger who was harassing her. To be sure, this would be a scary situation for anybody to experience; it would almost be as frightening as a network security breach--originating from inside your IT department!


You expect your IT department to be your best defense for safeguarding your network from threats, but, according to a report by Intermedia and Precision Sample, IT technicians are often the worst offenders at ignoring network security best practices. The study found that 32 percent of IT staff respondents admitted to giving away their login credentials, which is at a likelihood of 10 percent more than the average non-IT worker.

Why is this? Richard Walters, Intermedia VP of Identity and Access Management, likens this risk to a lackadaisical attitude toward network security:

It’s nearly always that technical people are the worst offenders. They know how to get around various controls that an IT team will put in place. It’s sometimes done with the best intent, but nevertheless with a complete lack of consideration for the risk or security implications.

That’s not all. Here are three more findings from the study that a business owner should be concerned about.

  • Over one-quarter of IT professionals polled said they’ve permeated IT systems to which they were no longer allowed access to.
  • Over 30 percent said they would absolutely take data from a company they were leaving if they thought it could personally benefit their careers (this risk is three times higher than with non-IT personnel).
  • 93 percent of polled participants admitted to some sort of insecure IT practice; including data breaches, regulatory compliance failures, and deliberate sabotage.

Now, we’re not saying that you should look upon your in-house IT staff with suspicion. More likely than not, you’ve hired your IT staff because you feel like you can trust them, and if you’ve not fired them, then they’re probably doing something right. Although, this study shows that you can never be too careful when it comes to your network security.

Infradapt can help by providing your IT network with additional security oversight. With our remote monitoring service, we can spot any inconsistencies with logins, spot threats (both internal and external), and do much more to help secure your data. Our technicians are well versed in IT best practices, and whether you utilize in-house IT staff or you’re looking to have Infradapt completely handle all of your IT needs, the fact that the oversight we offer is professionally outsourced adds a helpful dynamic to your network security that you can feel confident about.

To learn more about how we can assist you with your company’s IT security needs, give us a call at 800.394.2301. We’ll take the time to get to know your IT needs. This way, partnering with us will be nothing like getting calls from a stranger!

Continue reading

The More Redundant Your IT is, the Better Off You Are

The More Redundant Your IT is, the Better Off You Are

b2ap3_thumbnail_backup_and_disaster_recovery_400.jpgWe live in a society where everything is always growing more powerful, and in turn, everything grows more complex. Nowhere is this more true than the technology industry. It’s easy to lose track of how much new technology you’ve added to your IT infrastructure over the years, but you know what they say; the more basic your infrastructure is, the better, for the sole purpose that it becomes much easier to maintain and manage. That said, redundancy actually makes things easier on your business continuity plan, instead of complicating it.


In IT, redundancy is actually a goal for your infrastructure. Redundancy pertains to data security and business continuity. Organizations want their data stored in multiple locations so as to make it easier to recover from potential issues that might come up. Essentially, achieving data redundancy is the same as taking proactive measures to keep your information safe in the event of a catastrophic data disaster, such as the failure of a mission-critical piece of hardware, or the theft of vital information from a hacking attack.

It’s important to take into account that most businesses who experience a deadly data disaster, and aren’t capable of recovering from it, will declare bankruptcy within a year of the incident. Your business basically has no choice but to ensure the redundancy of its data, and to make sure that it’s safe and secure from both internal and external threats, including data theft, user error, and especially hardware failure.

What your business needs to be taking advantage of is a comprehensive data backup and disaster recovery solution, specifically designed to augment a business continuity plan through redundant data storage. Your business needs to move forward knowing that in the worst-case scenario, you won’t lose your entire data infrastructure; instead, all you have to do is initiate a backup from the cloud, mitigating data loss and preventing downtime.

This is exactly what Infradapt’s backup and disaster recovery solution offers. Our BDR device is designed to offer a comprehensive data backup process and a seamless disaster recovery solution in one convenient package. You can have multiple backups take place throughout the day, and have these backups stored in off-site data centers and the cloud. You can shield your business from expensive and costly downtime by rapidly initiating your disaster recovery solution. In fact, in the event of a hardware failure or similar disaster, the deployment of your data occurs so quickly that the BDR device itself can temporarily take the place of your server, practically eliminating downtime while you search for replacement hardware.

For more information about how a BDR device can help your business’s data stay redundant and safe, give Infradapt a call at 800.394.2301.

Continue reading

Joomla! Debug Console

Errors

Session

Profile Information

Memory Usage

Database Queries