Notice: Undefined index: option in /var/www/html/jc.infradapt.com/plugins/system/fixfrontedit/fixfrontedit.php on line 20 John Reilly - Page 145

Infradapt Blog

This is some blog description about this site

John Reilly is Managing Partner at Infradapt, LLC. Prior to joining Infradapt, he was the President of Vital IT Solutions, Inc., where among other roles, he developed a methodology and approach for performing risk and compliance assessments.



Prior to Infradapt, Mr. Reilly founded Vital IT Solutions, Inc., Mr. Reilly worked with Expanets, Inc., as a Senior Converged Account Executive, specializing in VoIP and Security, and a Subject Matter Expert (SME) on HIPAA. His Expanets’ achievements included national Sales awards including Millionaire’s Club and pioneering VoIP deployments for regional clients.

Mr. Reilly also has direct work experience in the banking industry, where he worked in Sales and Management, and in manufacturing, where he worked as an Accountant. John earned his BS in Accounting at Gwynedd-Mercy College, while also studying Negotiation, Decision Making, and Creative Problem Solving. He holds a SANS GIAC security certification and is a member of the Philadelphia Chapter of InfraGard.


 

Tip of the Week: How to Use Technology in a Sanitary Fashion

Tip of the Week: How to Use Technology in a Sanitary Fashion
Strict Standards: Declaration of JParameter::loadSetupFile() should be compatible with JRegistry::loadSetupFile() in /var/www/html/jc.infradapt.com/libraries/joomla/html/parameter.php on line 512

b2ap3_thumbnail_sanitary_practices_400.jpgThese days, with the Ebola virus on everyone's mind, sanitation is a major issue. Enacting proper sanitation procedures is a must for any public place, especially in the office. Unbeknownst to most office workers, one of the biggest transmitters of germs is frequently-handled technology. Therefore, it's imperative that you properly use your technology in a sanitary fashion. Here's how.

Continue reading
0 Comment

Warning: Cryptowall 2.0 Ransomware is as Bad as They Come

Warning: Cryptowall 2.0 Ransomware is as Bad as They Come

b2ap3_thumbnail_ransomware_cryptowall_400.jpgBe advised, there's a new digital threat on the scene that you and your employees need to be aware of. Known as Cryptowall 2.0, it's a wicked virus that has the potential to encrypt and steal your files, making it the scariest thing to hit your front door this Halloween season.

Continue reading
0 Comment

Grading the New iPhone 6 and 6+ On a Curve

Grading the New iPhone 6 and 6+ On a Curve

b2ap3_thumbnail_iphone_six_and_six_plus_400.jpgThe Apple iPhone 6 and 6+ are here! Are you enough of an Apple fan to have waited in line for hours to get your very own? To date, the new iPhone is so popular that it's on backorder and difficult to get a hold of. Is the latest iPhone worth the hype? Let's take a look at the specs and find out.

Continue reading
0 Comment

Russian “Sandworm” Hack Reveals 5-Year Cyber Espionage Campaign

Russian “Sandworm” Hack Reveals 5-Year Cyber Espionage Campaign

b2ap3_thumbnail_watch_out_for_sandworms_400.jpgA cyber espionage campaign called "Sandworm" has been discovered recently. The hacking attack, said to be based in Russia, has been targeting government leaders and organizations since as early as 2009. The researchers responsible for the discovery, iSight Partners, came to this conclusion after examining the code used in the campaign.

Continue reading
0 Comment

Tip of the Week: How to Decide on a VoIP Plan to Fit Your Business

Tip of the Week: How to Decide on a VoIP Plan to Fit Your Business

More businesses are switching to Voice over Internet Protocol (VoIP) in order to consolidate their communication tools and save money on their phone bill. Before you make the switch, you will first want to understand your different VoIP options so that you will have a plan that fits your company's communication needs. Here are some tips to get you started with VoIP.

Continue reading
0 Comment

Joomla! Debug Console

Errors

Session

Profile Information

Memory Usage

Database Queries