Notice: Undefined index: option in /var/www/html/jc.infradapt.com/plugins/system/fixfrontedit/fixfrontedit.php on line 20 John Reilly - Page 107

Infradapt Blog

This is some blog description about this site

John Reilly is Managing Partner at Infradapt, LLC. Prior to joining Infradapt, he was the President of Vital IT Solutions, Inc., where among other roles, he developed a methodology and approach for performing risk and compliance assessments.



Prior to Infradapt, Mr. Reilly founded Vital IT Solutions, Inc., Mr. Reilly worked with Expanets, Inc., as a Senior Converged Account Executive, specializing in VoIP and Security, and a Subject Matter Expert (SME) on HIPAA. His Expanets’ achievements included national Sales awards including Millionaire’s Club and pioneering VoIP deployments for regional clients.

Mr. Reilly also has direct work experience in the banking industry, where he worked in Sales and Management, and in manufacturing, where he worked as an Accountant. John earned his BS in Accounting at Gwynedd-Mercy College, while also studying Negotiation, Decision Making, and Creative Problem Solving. He holds a SANS GIAC security certification and is a member of the Philadelphia Chapter of InfraGard.


 

What If You Could Dodge the Capital Expenses of the Latest Technologies?

What If You Could Dodge the Capital Expenses of the Latest Technologies?
Strict Standards: Declaration of JParameter::loadSetupFile() should be compatible with JRegistry::loadSetupFile() in /var/www/html/jc.infradapt.com/libraries/joomla/html/parameter.php on line 512

b2ap3_thumbnail_save_your_company_money_400.jpgFinding the kind of IT management that your business deserves isn’t always easy, especially for the small or medium-sized business that works with a limited budget. Sometimes it might feel like you’re paying an exorbitant amount for the services you’re receiving. Well, it’s actually much easier to get the prices and services you deserve, all thanks to the advent of managed IT services and technology as a service offerings.

Continue reading
0 Comment

4 Ways You Can Protect Your Accounts from Hacking Attacks

4 Ways You Can Protect Your Accounts from Hacking Attacks

b2ap3_thumbnail_network_security_pracitices_400.jpgWe don’t need to explain how dangerous the Internet is. Behind a veil of deception is a horde of malicious entities that are practically begging you to make a mistake and allow them access to your infrastructure. If there’s one thing you should be sure of, it’s that a single mistake is all it takes to allow dangerous entities into your organization, like ransomware, viruses, malware, or even spyware.

Continue reading
0 Comment

10 of the Most Dangerous Domains on the Web

10 of the Most Dangerous Domains on the Web

b2ap3_thumbnail_domains_you_should_be_aware_of_400.jpgThe Internet is chuck full of malicious activity, but sometimes the difference between legitimate and illegitimate websites is so fine that it’s nigh impossible to discern the two. Well, we might be in luck; as it turns out, around 95 percent of the dangerous websites on the Internet can be identified by the top-level domains they use.

Continue reading
0 Comment

CryptoLocker Strikes Again: This Time, It Hits Gamers Where It Hurts

CryptoLocker Strikes Again: This Time, It Hits Gamers Where It Hurts

b2ap3_thumbnail_cryptolocker_400.jpgCan you believe it’s already been two years since Cryptolocker, a particularly nasty strain of ransomware, was released into the online environment? By encrypting files on a victim’s computer, and forcing them to pay a fee for their safe return, Cryptolocker has been a significant threat to both business and personal environments. Now, however, a particular strain of Cryptolocker is making gamers look like cybersecurity rookies.

Continue reading
0 Comment

Tip of the Week: My Company Device Has Been Lost or Stolen, Now What?

Tip of the Week: My Company Device Has Been Lost or Stolen, Now What?

b2ap3_thumbnail_lost_devices_can_be_a_major_problem_400.jpgMobile devices are one of the hottest items for thieves to target. According to reports from Consumer Reports and LoJack, 2013 saw the theft of two million laptops and three million handsets. What this means for you is that having your mobile device stolen is probably a lot more likely than you would think.

Continue reading
0 Comment

Joomla! Debug Console

Errors

Session

Profile Information

Memory Usage

Database Queries