Notice: Undefined index: option in /var/www/html/jc.infradapt.com/plugins/system/fixfrontedit/fixfrontedit.php on line 20 John Reilly - Page 117

Infradapt Blog

This is some blog description about this site

John Reilly is Managing Partner at Infradapt, LLC. Prior to joining Infradapt, he was the President of Vital IT Solutions, Inc., where among other roles, he developed a methodology and approach for performing risk and compliance assessments.



Prior to Infradapt, Mr. Reilly founded Vital IT Solutions, Inc., Mr. Reilly worked with Expanets, Inc., as a Senior Converged Account Executive, specializing in VoIP and Security, and a Subject Matter Expert (SME) on HIPAA. His Expanets’ achievements included national Sales awards including Millionaire’s Club and pioneering VoIP deployments for regional clients.

Mr. Reilly also has direct work experience in the banking industry, where he worked in Sales and Management, and in manufacturing, where he worked as an Accountant. John earned his BS in Accounting at Gwynedd-Mercy College, while also studying Negotiation, Decision Making, and Creative Problem Solving. He holds a SANS GIAC security certification and is a member of the Philadelphia Chapter of InfraGard.


 

Despite Technology’s Shortcomings, People Are Still the Root of Hacking Attacks

Despite Technology’s Shortcomings, People Are Still the Root of Hacking Attacks
Strict Standards: Declaration of JParameter::loadSetupFile() should be compatible with JRegistry::loadSetupFile() in /var/www/html/jc.infradapt.com/libraries/joomla/html/parameter.php on line 512

b2ap3_thumbnail_pc_hack_attack_400.jpgPeople often blame technology for not doing its job in the face of hacking attacks. While this is certainly true, only half of the fault lies with the technology. The other half, whether we like to admit or not, comes from the people using technology. This brings up an interesting ultimatum; only humans can prevent hacking attacks from happening altogether. If people don’t protect their data, it’s only natural that it will eventually get attacked.

Continue reading
0 Comment

Is Legacy Technology Preventing Your Business from Growing?

Is Legacy Technology Preventing Your Business from Growing?

b2ap3_thumbnail_frustrating_legacy_tech_400.jpgCan you remember the last time you did your company a solid and updated all of its hardware and software solutions? If your organization is still using machines from several years ago, it could be holding it back from reaching its full potential. We’ll say it again, think hard about when you last updated your technology, and we really, really hope that you aren’t still running Windows XP or machines from last century.

Continue reading
0 Comment

Unified Communications Can Improve Everyday Operations!

Unified Communications Can Improve Everyday Operations!

b2ap3_thumbnail_communications_solutions_400.jpgDoes your office take advantage of unified communications solutions to communicate efficiently within the workplace? If your employees aren’t taking advantage of the mission-critical communication applications your business provides for them, not only will it be frustrating to contact them, but it might also cause miscommunication; a common cause for error. Regardless the size of your workforce, your business can benefit from a unified communications solution.

Continue reading
0 Comment

Big Data is Saving the Biodiversity of Tropical Rainforests

Big Data is Saving the Biodiversity of Tropical Rainforests

b2ap3_thumbnail_big_data_rainforest_400.jpgWhen you think about Big Data, thoughts typically turn to how businesses use the technology to collect and analyze massive amounts of information for the purpose of making sweet profit. Although, there's much more to Big Data than making money; scientists are using the technology to help save the rainforest.

Continue reading
0 Comment

The Internet of Things is the Next Big Thing, Are You Ready?

The Internet of Things is the Next Big Thing, Are You Ready?

b2ap3_thumbnail_internet_of_things_security_400.jpgWhat comes to mind when you think about the Internet of Things? Tech enthusiasts around the world see hordes of connected devices taking advantage of mobile technologies to augment everyday life; but the realist sees a horde of devices that pose a considerable threat to network security. How can your business ensure maximum security in the face of such a phenomenon?

Continue reading
0 Comment

Joomla! Debug Console

Errors

Session

Profile Information

Memory Usage

Database Queries