Notice: Undefined index: option in /var/www/html/jc.infradapt.com/plugins/system/fixfrontedit/fixfrontedit.php on line 20 Security

Infradapt Blog

This is some blog description about this site

How to Remove the Super Dangerous Superfish App from Your PC

How to Remove the Super Dangerous Superfish App from Your PC
Strict Standards: Declaration of JParameter::loadSetupFile() should be compatible with JRegistry::loadSetupFile() in /var/www/html/jc.infradapt.com/libraries/joomla/html/parameter.php on line 512

b2ap3_thumbnail_superfish_two_400.jpgAs seen by the recent Superfish app debacle, software that comes preinstalled on a new PC shouldn’t always be trusted. Most of the time, the innate software on a device can be trusted; but the Superfish application is an exception. This app, which came preinstalled on new Lenovo PCs between the months of September and December of 2014, can potentially compromise the security of your machine.

Continue reading
0 Comment

Approach Your BYOD Policy with Caution

Approach Your BYOD Policy with Caution

b2ap3_thumbnail_byod_strategy_400.jpgA common occurrence in the business world is the employee who wants to use their sweet new smartphone for the purposes of work. The average business owner might be ecstatic that the employee wants to get more done in the day, especially when the device isn’t on the company’s dime. However, some professionals forget that these smartphones aren’t immune to being misplaced or stolen.

Continue reading
0 Comment

Is it Time to Reevaluate Your VPN Strategy?

Is it Time to Reevaluate Your VPN Strategy?

b2ap3_thumbnail_private_computing_400.jpgWhen it comes to your data infrastructure, accessibility and mobility are two of the top necessities. Many businesses take advantage of a Virtual Private Network (VPN) to meet this requirement. A VPN has the ability to extend your company’s network virtually over the Internet, allowing remote users to access your infrastructure. However, considering the popularity of the cloud, it might be time to reevaluate your VPN solution and make sure it’s still relevant.

Continue reading
0 Comment

Hackers Reveal What Sony Movie Executives Really Think, and it’s Not Pretty

Hackers Reveal What Sony Movie Executives Really Think, and it’s Not Pretty

b2ap3_thumbnail_sony_data_leak_400.jpgOne of the most publicized hacks we have seen is last December’s breach of Sony Pictures Entertainment by the Guardians of Peace. In addition to the hackers exposing Sony’s budget, plans for layoffs, and 3,800 SSNs, they leaked personal emails from company executives. This incident should make every business owner a little nervous.

Continue reading
0 Comment

Tip of the Week: How to Use a Public PC Without Fear of Getting Hacked

Tip of the Week: How to Use a Public PC Without Fear of Getting Hacked

b2ap3_thumbnail_public_computers_400.jpgFor business professionals needing to access sensitive information, a public PC is never the first choice. We’ve all suspected it, and now there’s government-issued proof that hackers are targeting public computers. However, don’t be deterred from using public terminals; there are ways to get around hackers and their traps.

Continue reading
0 Comment

Joomla! Debug Console

Session

Profile Information

Memory Usage

Database Queries