Notice: Undefined index: option in /var/www/html/jc.infradapt.com/plugins/system/fixfrontedit/fixfrontedit.php on line 20 Security

Infradapt Blog

This is some blog description about this site

If You’re Running Older Versions of Internet Explorer, Java, or Flash, Your PC is at Risk

If You’re Running Older Versions of Internet Explorer, Java, or Flash, Your PC is at Risk
Strict Standards: Declaration of JParameter::loadSetupFile() should be compatible with JRegistry::loadSetupFile() in /var/www/html/jc.infradapt.com/libraries/joomla/html/parameter.php on line 512

b2ap3_thumbnail_hold_off_on_interent_explorer_400.jpgIt’s important that your business uses the most recent version of any operating systems and software solutions used by your workforce, but Internet Explorer “fans” have had a rough start to 2016. Nearly a quarter of all Windows PCs are still using unsupported versions of Internet Explorer, half of which are still running Windows XP.

Continue reading
0 Comment

How an End User Might Accidentally Undermine Your Security: 10 Innocent Mistakes

How an End User Might Accidentally Undermine Your Security: 10 Innocent Mistakes

b2ap3_thumbnail_innocent_mistakes_400.jpgIf you’re like every other small business out there, you know that the more employees you hire, the more technology that you have to procure. However, when you have more end-users, you provide more avenues for threats to slip into your network infrastructure unnoticed. When all it takes is one simple mistake from a single end-user, how can you minimize the chances of falling victim to an untimely hacking attack?

Continue reading
0 Comment

Tip of the Week: The Top 5 Mistakes that Ruin Mobile Devices

Tip of the Week: The Top 5 Mistakes that Ruin Mobile Devices

b2ap3_thumbnail_how_did_you_break_your_phone_400.jpgTo get the most life out of your smartphone, you’re going to want to properly take care of it. Of course, this is easier said than done for a small device that’s prone to being dropped and subject to the many dangers of being transported. Here are five smartphone practices to avoid if you want your device to last.

Continue reading
0 Comment

Alert: New Petya Ransomware Spreads via Fake Online Resumes

Alert: New Petya Ransomware Spreads via Fake Online Resumes

b2ap3_thumbnail_ransomware_petya_400.jpgNext time you see an unsolicited resume in your email, it’s worth scrutinizing before you just click on it. It could be a nasty new ransomware called Petya.

Continue reading
0 Comment

It’s the End of the Line for Microsoft SQL Server 2005 - Are You Prepared?

It’s the End of the Line for Microsoft SQL Server 2005 - Are You Prepared?

b2ap3_thumbnail_microsoft_sql_eos_date_passed_400.jpgDo you know which database management system is used by your company’s servers? Obviously your end users aren’t expected to know the answer to this question, but this is something that you, as a business owner, need to be aware of. If you don’t keep track of which database software you’re using, you might accidentally wait too long and wind up running an unsupported piece of software. For example, you need to move away from SQL Server 2005 (which is now unsupported) as soon as possible.

Continue reading
0 Comment

Joomla! Debug Console

Session

Profile Information

Memory Usage

Database Queries