Notice: Undefined index: option in /var/www/html/jc.infradapt.com/plugins/system/fixfrontedit/fixfrontedit.php on line 20 John Reilly - Page 108

Infradapt Blog

This is some blog description about this site

John Reilly is Managing Partner at Infradapt, LLC. Prior to joining Infradapt, he was the President of Vital IT Solutions, Inc., where among other roles, he developed a methodology and approach for performing risk and compliance assessments.



Prior to Infradapt, Mr. Reilly founded Vital IT Solutions, Inc., Mr. Reilly worked with Expanets, Inc., as a Senior Converged Account Executive, specializing in VoIP and Security, and a Subject Matter Expert (SME) on HIPAA. His Expanets’ achievements included national Sales awards including Millionaire’s Club and pioneering VoIP deployments for regional clients.

Mr. Reilly also has direct work experience in the banking industry, where he worked in Sales and Management, and in manufacturing, where he worked as an Accountant. John earned his BS in Accounting at Gwynedd-Mercy College, while also studying Negotiation, Decision Making, and Creative Problem Solving. He holds a SANS GIAC security certification and is a member of the Philadelphia Chapter of InfraGard.


 

3 Easy Ways to Go Incognito In Google Chrome

3 Easy Ways to Go Incognito In Google Chrome
Strict Standards: Declaration of JParameter::loadSetupFile() should be compatible with JRegistry::loadSetupFile() in /var/www/html/jc.infradapt.com/libraries/joomla/html/parameter.php on line 512

b2ap3_thumbnail_incognito_mode_400.jpgThe Internet can be a dangerous place. Sometimes you want to keep your identity a secret on the web. Now, your reasons for doing so aren’t any of our business, but you should know that there are several ways to access this secretive function in Google Chrome. Here are three ways you can take advantage of Google Chrome's Incognito mode to browse the web in an anonymous fashion.

Continue reading
0 Comment

Not Even Google is Exempt From Data Loss Disasters

Not Even Google is Exempt From Data Loss Disasters

b2ap3_thumbnail_lightning_google_data_center_400.jpgWhen you store your data in the cloud, you assume it will be safe and that nothing bad will happen to it. But what if the real clouds hovering above your virtual cloud are literally full of lightning? Google experienced this last month when one of its data centers in Belgium fell to the wrath of Zeus.

Continue reading
0 Comment

Tip of the Week: Adjust Windows 10’s Privacy Settings to Keep Your Information Secure

Tip of the Week: Adjust Windows 10’s Privacy Settings to Keep Your Information Secure

b2ap3_thumbnail_windows_10_privacy_400.jpgIt would be prudent to begin by saying that Windows 10 is far and away the most refined version of Windows ever created. In a lot of ways, it's like using a souped-up version of Windows 7, with a sprinkling of Windows 8/8.1 metro on top. Beneath the surface, however, is a vast information-collecting infrastructure that has many users left worried about their privacy. There are even conspiracy theories suggesting that Windows 10 is a vessel used by the NSA in order to collect all the information on every user.

Continue reading
0 Comment

Hillary Clinton Learns the Hard Way Why Network Security Best Practices Must Be Followed

Hillary Clinton Learns the Hard Way Why Network Security Best Practices Must Be Followed

b2ap3_thumbnail_hillary_server_snafu_400.jpgWith the United States’ Presidential election ramping up, it’s hard to go anywhere without seeing Hillary Clinton’s face. The former U.S. secretary of state and first lady, Clinton is making her second attempt at the Presidency. She has gained some negative attention recently in regards to emails she had sent from a personal email address when she was the United States’ top diplomat and it’s opened up some questions about data security at the highest reaches of government.

Continue reading
0 Comment

3 Benefits of Outsourced IT That Let You Do More For Less

3 Benefits of Outsourced IT That Let You Do More For Less

b2ap3_thumbnail_companys_it_budget_400.jpgCost drives business, this much cannot be denied. When the technology your business relies on fails, you have to get it repaired or replaced quickly in order to keep the resulting downtime from damaging your business. The traditional method of computer repair is much like when your car is in disrepair. When your technology isn’t working properly, your organization reacts to the problem by calling your friendly neighborhood computer repair guy.

Continue reading
0 Comment

Joomla! Debug Console

Errors

Session

Profile Information

Memory Usage

Database Queries