Notice: Undefined index: option in /var/www/html/jc.infradapt.com/plugins/system/fixfrontedit/fixfrontedit.php on line 20 John Reilly - Page 131

Infradapt Blog

This is some blog description about this site

John Reilly is Managing Partner at Infradapt, LLC. Prior to joining Infradapt, he was the President of Vital IT Solutions, Inc., where among other roles, he developed a methodology and approach for performing risk and compliance assessments.



Prior to Infradapt, Mr. Reilly founded Vital IT Solutions, Inc., Mr. Reilly worked with Expanets, Inc., as a Senior Converged Account Executive, specializing in VoIP and Security, and a Subject Matter Expert (SME) on HIPAA. His Expanets’ achievements included national Sales awards including Millionaire’s Club and pioneering VoIP deployments for regional clients.

Mr. Reilly also has direct work experience in the banking industry, where he worked in Sales and Management, and in manufacturing, where he worked as an Accountant. John earned his BS in Accounting at Gwynedd-Mercy College, while also studying Negotiation, Decision Making, and Creative Problem Solving. He holds a SANS GIAC security certification and is a member of the Philadelphia Chapter of InfraGard.


 

Approach Your BYOD Policy with Caution

Approach Your BYOD Policy with Caution
Strict Standards: Declaration of JParameter::loadSetupFile() should be compatible with JRegistry::loadSetupFile() in /var/www/html/jc.infradapt.com/libraries/joomla/html/parameter.php on line 512

b2ap3_thumbnail_byod_strategy_400.jpgA common occurrence in the business world is the employee who wants to use their sweet new smartphone for the purposes of work. The average business owner might be ecstatic that the employee wants to get more done in the day, especially when the device isn’t on the company’s dime. However, some professionals forget that these smartphones aren’t immune to being misplaced or stolen.

Continue reading
0 Comment

Is it Time to Reevaluate Your VPN Strategy?

Is it Time to Reevaluate Your VPN Strategy?

b2ap3_thumbnail_private_computing_400.jpgWhen it comes to your data infrastructure, accessibility and mobility are two of the top necessities. Many businesses take advantage of a Virtual Private Network (VPN) to meet this requirement. A VPN has the ability to extend your company’s network virtually over the Internet, allowing remote users to access your infrastructure. However, considering the popularity of the cloud, it might be time to reevaluate your VPN solution and make sure it’s still relevant.

Continue reading
0 Comment

What’s the Difference Between an IT Issue and an IT Problem?

What’s the Difference Between an IT Issue and an IT Problem?

b2ap3_thumbnail_it_realted_problems_400.jpgWe’ve been known to discuss the importance of proactive IT solutions and handling issues before they become problems. However, the difference between the two isn’t always as clear as it should be. The true value of our managed IT services can only be understood if the difference between the two can be distinguished.

Continue reading
0 Comment

3 Reasons to Consider Thin Clients in the Workplace

3 Reasons to Consider Thin Clients in the Workplace

b2ap3_thumbnail_thin_client_400.jpgHardware virtualization is an increasingly popular trend in the workplace, and it’s easy to see why. However, another viable option to save on electricity and operation costs presents itself with thin clients. With the advent of virtual desktops, it’s easier than ever to take advantage of thin clients in the office, but are they right for your business?

Continue reading
0 Comment

Are Mobile Devices Helping or Hampering Your Team’s Productivity?

Are Mobile Devices Helping or Hampering Your Team’s Productivity?

b2ap3_thumbnail_your_byod_policy_400.jpgMobile devices have become such a popular computing medium that they’ve infiltrated the workplace. While the business owner might feel that these mobile devices can help employees gain more regular access to corporate data for more working hours, these same devices could potentially eat up those work hours with time wasted on mobile gaming or other recreational apps. What’s the truth about BYOD? Let’s find out.

Continue reading
0 Comment

Joomla! Debug Console

Errors

Session

Profile Information

Memory Usage

Database Queries