Notice: Undefined index: option in /var/www/html/jc.infradapt.com/plugins/system/fixfrontedit/fixfrontedit.php on line 20 John Reilly - Page 12

Infradapt Blog

This is some blog description about this site

John Reilly is Managing Partner at Infradapt, LLC. Prior to joining Infradapt, he was the President of Vital IT Solutions, Inc., where among other roles, he developed a methodology and approach for performing risk and compliance assessments.



Prior to Infradapt, Mr. Reilly founded Vital IT Solutions, Inc., Mr. Reilly worked with Expanets, Inc., as a Senior Converged Account Executive, specializing in VoIP and Security, and a Subject Matter Expert (SME) on HIPAA. His Expanets’ achievements included national Sales awards including Millionaire’s Club and pioneering VoIP deployments for regional clients.

Mr. Reilly also has direct work experience in the banking industry, where he worked in Sales and Management, and in manufacturing, where he worked as an Accountant. John earned his BS in Accounting at Gwynedd-Mercy College, while also studying Negotiation, Decision Making, and Creative Problem Solving. He holds a SANS GIAC security certification and is a member of the Philadelphia Chapter of InfraGard.


 

Email Attachments are Schrӧdinger’s New Cat

Email Attachments are Schrӧdinger’s New Cat
Strict Standards: Declaration of JParameter::loadSetupFile() should be compatible with JRegistry::loadSetupFile() in /var/www/html/jc.infradapt.com/libraries/joomla/html/parameter.php on line 512

Have you ever heard of the physicist Erwin Schrӧdinger? He is most well-known for explaining a paradox related to quantum physics which involves a cat. Even though the theory behind Schrӧdinger’s cat is meant to explain something quite different, it can still be applied to a lot of different concepts. In particular, when explaining email security.

Continue reading
0 Comment

How to Spot Three Forms of Phishing Attacks

How to Spot Three Forms of Phishing Attacks

One of the crazy things about hackers is that they will do whatever it takes to ensure that they steal as much information and sensitive data as possible. One of the more innovative ways that hackers spread threats is through spam. Unwanted messages have grown from simple annoyances, to the spread of unwanted software and malware, all the way to sophisticated attacks on targeted individuals known as phishing attacks. Do you have ways to secure your business?

Continue reading
0 Comment

Introducing the Three Types of Cloud Solutions

Introducing the Three Types of Cloud Solutions

Cloud computing is an ever-growing industry, and it’s only going to grow more popular as time goes on. More businesses than ever have started to adopt the cloud in at least some capacity. Is your company one of the few that haven’t yet moved to the cloud? If so, you’ll want to at least consider it, as your business could gain considerable benefits from doing so.


Depending on the type of business you run, as well as its specific needs, the type of cloud you implement will vary in scope, size, and build. There are typically three different types of the cloud: public, private, and hybrid. Each of them comes with their own specific strengths and weaknesses.

Public Cloud
The public cloud is meant to help businesses with a limited budget gain access to crucial elements of the cloud, including storage, access to applications or services, and networking. Generally speaking, the public cloud is primarily used to provide entry-level cloud access to businesses of all kinds. Examples of the public cloud include services like Microsoft’s Office 365 suite, as well as Google’s G Suite, both of which provide productivity suites and storage to businesses through cloud distribution. What the public cloud offers in terms of efficiency and ease of setup can often make up for the lack of customization that many businesses find with it.

Private Cloud
Private clouds are generally more customized to suit the needs of your business, whereas public clouds are meant to be used more as a general solution. Private clouds are hosted on-site, managed by an in-house IT department, and require more attention. Compared to the public cloud, private clouds are generally implemented by businesses that know specifically what they need and how they want it set up.

Hybrid Cloud
The hybrid cloud is considered to be somewhere in the middle of the public and private, affording small businesses the benefits of both with little drawback, if any at all. Often times, hybrid clouds are implemented for the purposes of having a customized infrastructure without all of the responsibilities of managing one. A managed service provider like Infradapt can manage and maintain your cloud infrastructure on its own in-house network so that you don’t have to. To learn more, reach out to us at 800.394.2301.

Continue reading
0 Comment

Tip of the Week: ‘Secure’ Browsing Doesn’t Mean ‘Private’

Tip of the Week: ‘Secure’ Browsing Doesn’t Mean ‘Private’

Internet browsers, by in large, provide enough security for the average user to come out unscathed. Nowadays, people deal with many more threats than they once did, but by in large, users stay secure when using today’s most popular browsers. Privacy, however, is a whole different matter.

Continue reading
0 Comment

IRS to CPAs - Hackers are Targeting You

IRS to CPAs - Hackers are Targeting You

The IRS has issued a warning to tax professionals to step up their cyber security to prevent sensitive taxpayer information from being stolen. CPA firms, large and small, are being targeted by hackers and identity thieves, especially during the high traffic tax season.

Continue reading
0 Comment

Joomla! Debug Console

Errors

Session

Profile Information

Memory Usage

Database Queries