Notice: Undefined index: option in /var/www/html/jc.infradapt.com/plugins/system/fixfrontedit/fixfrontedit.php on line 20 John Reilly - Page 144

Infradapt Blog

This is some blog description about this site

John Reilly is Managing Partner at Infradapt, LLC. Prior to joining Infradapt, he was the President of Vital IT Solutions, Inc., where among other roles, he developed a methodology and approach for performing risk and compliance assessments.



Prior to Infradapt, Mr. Reilly founded Vital IT Solutions, Inc., Mr. Reilly worked with Expanets, Inc., as a Senior Converged Account Executive, specializing in VoIP and Security, and a Subject Matter Expert (SME) on HIPAA. His Expanets’ achievements included national Sales awards including Millionaire’s Club and pioneering VoIP deployments for regional clients.

Mr. Reilly also has direct work experience in the banking industry, where he worked in Sales and Management, and in manufacturing, where he worked as an Accountant. John earned his BS in Accounting at Gwynedd-Mercy College, while also studying Negotiation, Decision Making, and Creative Problem Solving. He holds a SANS GIAC security certification and is a member of the Philadelphia Chapter of InfraGard.


 

Keyboard, Video, Mouse: How to Choose a KVM Switch for Your Business

Keyboard, Video, Mouse: How to Choose a KVM Switch for Your Business
Strict Standards: Declaration of JParameter::loadSetupFile() should be compatible with JRegistry::loadSetupFile() in /var/www/html/jc.infradapt.com/libraries/joomla/html/parameter.php on line 512

b2ap3_thumbnail_keyboard_video_mouse_400.jpgA business's IT infrastructure is complex and confusing. Just like a puzzle, it is made up of several vastly different pieces that come together to perform a particular function. One of the things that ties an IT infrastructure together is a KVM switch. Without a quality KVM switch, your network might fail to operate properly. Here are a few tips to help you choose the right KVM solution for your business.

Continue reading
0 Comment

Tip of the Week: 13 Time-Saving Shortcuts for Microsoft Outlook

Tip of the Week: 13 Time-Saving Shortcuts for Microsoft Outlook

b2ap3_thumbnail_outlook_logo_400.jpgMicrosoft Outlook is a common mail solution for businesses, but it can be tricky to use without utilizing keyboard shortcuts. Just like Microsoft Word, Outlook has several key commands that can be used to jumpstart your productivity and save time, which can be better spent on other activities, like training exercises or more important tasks.

Continue reading
0 Comment

How to Protect Yourself from a Haunted Computer

How to Protect Yourself from a Haunted Computer

b2ap3_thumbnail_halloween_pc_haunting_400.jpgNaturally, if you saw your lamp levitate, you would believe it to be the work of a ghoul and you would cry out in terror. What then would you believe if you saw your PC’s cursor begin to move on its own? In a spooky scenario like this, your computer isn’t haunted. It’s hacked. In the real world, the latter is the scarier of the two.

Continue reading
0 Comment

Tip of the Week: 8 Tips to be an Expert Googler

Tip of the Week: 8 Tips to be an Expert Googler

b2ap3_thumbnail_search_tips_to_win_400.jpgHave you ever tried to search for something on Google, only to be disappointed that you couldn't find what you were looking for? You might think you're being extremely specific, but in reality, you're not doing anything different from the average joe. Googling is an art lost to the ages, a secret technique of legend. But, not really. Here are some tips to help you get more out of the world's most popular search engine.

Continue reading
0 Comment

Zero Trust: Is this a Wise Data Security Policy?

Zero Trust: Is this a Wise Data Security Policy?

b2ap3_thumbnail_no_trust_data_protection_400.jpgSometimes it seems like the Internet is plotting against you, and nothing is safe, ever. Even if you don't have any thugs waiting to steal your data, there are hackers - thieves - who will steal it anyway, waiting to take it when you least expect it. One of the most secure ways to protect your company's digital assets is to enact a "zero trust" policy for your network.

Continue reading
0 Comment

Joomla! Debug Console

Errors

Session

Profile Information

Memory Usage

Database Queries