Notice: Undefined index: option in /var/www/html/jc.infradapt.com/plugins/system/fixfrontedit/fixfrontedit.php on line 20 John Reilly - Page 128

Infradapt Blog

This is some blog description about this site

John Reilly is Managing Partner at Infradapt, LLC. Prior to joining Infradapt, he was the President of Vital IT Solutions, Inc., where among other roles, he developed a methodology and approach for performing risk and compliance assessments.



Prior to Infradapt, Mr. Reilly founded Vital IT Solutions, Inc., Mr. Reilly worked with Expanets, Inc., as a Senior Converged Account Executive, specializing in VoIP and Security, and a Subject Matter Expert (SME) on HIPAA. His Expanets’ achievements included national Sales awards including Millionaire’s Club and pioneering VoIP deployments for regional clients.

Mr. Reilly also has direct work experience in the banking industry, where he worked in Sales and Management, and in manufacturing, where he worked as an Accountant. John earned his BS in Accounting at Gwynedd-Mercy College, while also studying Negotiation, Decision Making, and Creative Problem Solving. He holds a SANS GIAC security certification and is a member of the Philadelphia Chapter of InfraGard.


 

A New Plan Might Make Software Reverse-Engineering Far More Difficult for Hackers

A New Plan Might Make Software Reverse-Engineering Far More Difficult for Hackers
Strict Standards: Declaration of JParameter::loadSetupFile() should be compatible with JRegistry::loadSetupFile() in /var/www/html/jc.infradapt.com/libraries/joomla/html/parameter.php on line 512

b2ap3_thumbnail_software_re-engineering_400.jpgHackers make life difficult for even the most innocent Internet user, and it’s all thanks to a nasty little trick called reverse-engineering. This is when a hacker picks apart the code that makes up a program, then scans it for vulnerabilities or exploitations. A new type of security measure is being developed to protect against the reverse-engineering of software.

Continue reading
0 Comment

Tip of the Week: 5 Ways to Put the Power Back In Your PowerPoint Presentations

Tip of the Week: 5 Ways to Put the Power Back In Your PowerPoint Presentations

b2ap3_thumbnail_presentation_power_400.jpgPresentations are a necessary, albeit time-consuming, responsibility that you have as a business owner. Thankfully, there are simple tools like Microsoft PowerPoint available to help make your job a little easier. Unfortunately, it’s very easy to make a boring or less-than-great presentation, which can hamper the audience’s ability to let the message sink in. Here are five ways to make sure that your next PowerPoint is as effective as possible.

Continue reading
0 Comment

Does Your Business Understand the Difference Between Data and Information?

Does Your Business Understand the Difference Between Data and Information?

b2ap3_thumbnail_information_is_made_of_data_400.jpgIT requires several factors in order to function properly. First of all, it can’t exist without information, and this information can’t exist without data. Technology is what creates data so that your company can take advantage of changes in the industry and business environment. It might seem like a lot to take in, but understanding the flow of data is necessary for a business owner. Otherwise, you won’t be able to take advantage of it to jumpstart sales and profitability.

Continue reading
0 Comment

Tip of the Week: How to Integrate 2-Step Verification with Your Google Account

Tip of the Week: How to Integrate 2-Step Verification with Your Google Account

b2ap3_thumbnail_authentication_security_400.jpgIt seems like you can’t go a week without hearing about some new security vulnerability or massive data breach. Naturally, this leads the average computer user to feel nervous, especially when dealing with sensitive information. With only a password standing between you and your account, hackers can easily access it if you’re careless. Two-factor authentication is the key to maximizing your online security.

Continue reading
0 Comment

Don’t Let the Printer Make a Mess of Your Network

Don’t Let the Printer Make a Mess of Your Network

b2ap3_thumbnail_printer_server_mula_400.jpgWhen a print job doesn’t go exactly how you need it to, it’s normal to call your printer some choice words, which may include one of the many colorful synonyms for excrement. Perhaps this stems from a printing network and a toilet having a lot in common. How’s that you ask? Let’s clear the air and find out.

Continue reading
0 Comment

Joomla! Debug Console

Errors

Session

Profile Information

Memory Usage

Database Queries