Notice: Undefined index: option in /var/www/html/jc.infradapt.com/plugins/system/fixfrontedit/fixfrontedit.php on line 20 John Reilly - Page 153

Infradapt Blog

This is some blog description about this site

John Reilly is Managing Partner at Infradapt, LLC. Prior to joining Infradapt, he was the President of Vital IT Solutions, Inc., where among other roles, he developed a methodology and approach for performing risk and compliance assessments.



Prior to Infradapt, Mr. Reilly founded Vital IT Solutions, Inc., Mr. Reilly worked with Expanets, Inc., as a Senior Converged Account Executive, specializing in VoIP and Security, and a Subject Matter Expert (SME) on HIPAA. His Expanets’ achievements included national Sales awards including Millionaire’s Club and pioneering VoIP deployments for regional clients.

Mr. Reilly also has direct work experience in the banking industry, where he worked in Sales and Management, and in manufacturing, where he worked as an Accountant. John earned his BS in Accounting at Gwynedd-Mercy College, while also studying Negotiation, Decision Making, and Creative Problem Solving. He holds a SANS GIAC security certification and is a member of the Philadelphia Chapter of InfraGard.


 

5 Gmail and Outlook Tricks to Cut Corners On Your Email Time

5 Gmail and Outlook Tricks to Cut Corners On Your Email Time
Strict Standards: Declaration of JParameter::loadSetupFile() should be compatible with JRegistry::loadSetupFile() in /var/www/html/jc.infradapt.com/libraries/joomla/html/parameter.php on line 512

b2ap3_thumbnail_email_tricks_400.jpgWe all know how annoying email can be at times. Your inbox is constantly being filled with new messages, and before you know it, you have no idea what you've responded to or what needs to be responded to. To make matters worse, the average office worker spends roughly two hours staring at their email inbox and responding to messages. Not only is this counterproductive, but is also a massive time-wasting practice.

Continue reading
0 Comment

DecryptCryptoLocker Provides Fix for Nasty Ransomware

DecryptCryptoLocker Provides Fix for Nasty Ransomware

b2ap3_thumbnail_decryptolocker_400.jpgA few months ago, we mentioned that a ransomware called CryptoLocker was spreading at a dangerous rate due to the GameOver Zeus malware. The ransomware would lock down files on victims' computers until a fee was paid, but not anymore. Now, with the help of FireEye and Fox-IT, a solution has been created called DecryptCryptoLocker.

Continue reading
0 Comment

Is it Time for the PC to Make a Comeback?

Is it Time for the PC to Make a Comeback?

b2ap3_thumbnail_pc_sales_are_rebounding_400.jpgOver the past few years, we've seen a revolution in the computer market as mobile device sales skyrocketed and PC sales slumped. If this trend were to continue for just a few more years, PCs would have possibly become extinct. However, as is the case with any trend, it appears things in the computer world may be normalizing.

Continue reading
0 Comment

ITaaS: Transform Your IT Department Into a Service!

ITaaS: Transform Your IT Department Into a Service!

b2ap3_thumbnail_managed_services_provider_400.jpgWhat are managed IT services all about? You've heard about how businesses are saving on their IT costs by outsourcing their technology needs, but how does this service work? The money-saving answer comes from this radical new approach to treating IT as a Service!

Continue reading
0 Comment

Old Devices Can Compromise Security

Old Devices Can Compromise Security

b2ap3_thumbnail_device_security_400.jpgAs a responsible business owner, you know that using the latest technology and running updated software is a key component to your company's network security. However, your employees may not value the latest tech like you do, which could result in a major data breach, despite your best efforts to keep your company current.

Continue reading
0 Comment

Joomla! Debug Console

Errors

Session

Profile Information

Memory Usage

Database Queries