Knowledge Base

Knowledge Base

  • Knowledge Base HOME
    Knowledge Base HOME Where you can find all the latest articles to the Intrada Knowledge Base.
  • Categories
    Categories Displays all the different categories within the Intrada Knowledge Base.
  • Tags
    Tags Tags are setup to help find articles related to a specific focus.
  • Users
    Users Meet the Staff and see what they have to share.
1061

b2ap3_thumbnail_responsive-traditional-design.jpgResponsive Web Design (RWD) is an approach where design and development should respond to the user’s behavior and their environment. The environment is based on screen size, platform and device orientation. The technology uses a mix of flexible grids, layouts, images and an intelligent use of Cascading Style Sheets (CSS). Based on the device used to access the site, the website will automatically switch to accommodate for resolution, image size and scripting abilities. This would eliminate the need for different templates based on the device used to access the website.

Traditional Web Design or Web 2.0 allows for unlimited design and function delivery. Through the advancement of HyperText Markup Language (HTML), Extensible HyperText Markup Language (XHTML), JavaScript (JS), and Cascading Style Sheets (CSS), Intrada can quickly deliver a simple landing page or advance online applications by using standard platforms.

A website's success is not solely based on the technology it uses, but more so, it's ability to provide for customers what they need and to engage potential prospects to become new clients. Intrada breaks down the development process and assigns the appropriate team of professional individuals to focus on specific aspects of the process.

Last modified on Continue reading
0
1480

Locky VirusA new ransomware, Locky, has been discovered and is causing problems for computer users everywhere. The Locky ransomware encrypts your data files, locks you out of them and then demands .5 bitcoins to decrypt your files. This virus is particularly nasty due to its ability to encrypt files on unmapped network shares.

In addition to locking your files, Locky will completely change your file name, making it that much more difficult to restore the right data.

Worried about getting the Locky ransomware on your computer? Here are some more details about the virus:

  1. Locky is installed through email, particularly fake invoices Currently, Locky is installed through an invoice. You will receive an email with a subject containing an invoice and an attached document. When the document is opened, the text is scrambled and you will have to enable macros to make the text readable.
  2. The virus will encrypt your data The moment you enable macros within the file, Locky is on your computer. It begins to encrypt your data and change the file names. It will scan all local drives and unmapped network shares to find files.
  3. Recovery instructions will appear Your wallpaper will change to instructions on how to retrieve your data. This is the ransom note for your data. You will be instructed to visit a decrypter page, purchase bitcoins and send them to an address. Once your payment is made, you are provided the way to decrypt your files.

Locky is an easy trap to fall into because missing an invoice or not making a payment is something most people try to avoid. Remember to be conscious of emails from unknown senders, specifically when they have attachments.

If you do fall victim to the Locky virus, contact Intrada Technologies. Diagnostics are free at Intrada and Virus/Malware Removals start at just $69.95!

Last modified on Continue reading
0
1369

The Monthly “Steal” by David Steele

The Monthly “Steal” is a bit of relevant technology information intertwined with personal thoughts, opinions and some real life experiences. It is written by David “Steele” and is free, hence a “steal” from a “Steele”.

206 Hospitals in 29 States were hacked effecting 4.5 million patient records in 2015. According to an article recently published in the Washington Post in February, a Los Angeles hospital paid $17,000 in bitcoin ransom to unload computer records.

 

“The quickest and most efficient way to restore our systems and administrative functions was to pay the ransom and obtain the decryption key,” Hollywood Presbyterian Medical Center CEO Allen Stefanek said. “In the best interest of restoring normal operations, we did this.”

Digital FingerprintBut hospitals are not the only target. JPMorgan Chase, Home Depot and Target were all victims of cyber-attacks in 2014.   It is no secret that personal information is valuable; the FBI released an article that indicated that in 2013, over 2 million health care records were compromised which was 31% of all reported data breaches. Cyber criminals are selling the information on the black market at a rate of $50 for each partial electronic health record (EHR), compared to $1 for a stolen social security number or credit card number.

What’s amazing is that most companies still don’t take cyber security serious or value the importance of properly securing customer data. Companies install door access systems, alarm systems, locked server racks and camera systems all focused on physical security, but when asked how they are securing their customer data, there is often a lack of detail. Most IT companies and computer professionals practice “General Network Management” or “Best Practices”. There are general guidelines that, when followed correctly, produce safe and secure computer networks. Where most companies struggle is how to confirm that best practices are being followed, usage policies are enforced and employees, IT staff and vendors are trained and held accountable.  

In 1996, the Federal Government created the Health Insurance Portability and Accountability Act – HIPAA. The primary goal of the law is to make it easier for people to keep health insurance, protect the confidentiality and security of healthcare information and help the healthcare industry control administrative costs. The Rule requires appropriate safeguards to protect the privacy of personal health information, and sets limits and conditions on the uses and disclosures that may be made of such information without patient authorization. HIPAA focuses mainly on medical and patient rights but the same requirements located under the HIPAA Security Rule provide a solid foundation and accountability to ensure “General Network Management” or “Best Practices” are valid and are providing a solid network environment. Before, IT companies would send a network technician and tell them to secure the network. Now, they send in a network technician and say this network needs to be HIPAA or Payment Card Industry (PCI) compliant providing both the IT company and the customer with accountability.

Many companies may say, “but I don’t deal with medical so why do I need to be so secured. When IT companies are hired, they are trusted with financial information, personal information and company information. By applying a HIPAA or PCI compliance requirement to your network will force vendors and staff to be more aware and involved in both the physical and function security of information. In most cases, the cost to properly secure and manage a network is a fraction of the cost associated with a data breach or privacy violation.

Hospital-Map_20160422-145801_1.jpg

Resources:

FBI Cyber Division - April 8, 2014

The Washington Post - February 18, 2015

Cyber Attacks on U.S. Companies in 2014 - By Riley Walters - October 27, 2014

David Steele, Partner / Webmaster

This email address is being protected from spambots. You need JavaScript enabled to view it.
570-321-7370
FacebookTwitterLinkedIn Google+ RSS Feed

Last modified on Continue reading
0
706

Fish and Hook ScamsDon’t take the bait. There has been a huge increase in phishing scams received in emails that appear to be harmless or legitimate, but lure you into their net then steal your privacy, infect your computer or hold your data hostage.

This can be very damaging and costly to the company and computer network. The following information is provided to help you educate your staff and prevent damaging infections.

Common Phishing Hooks:

Email Link

LINKS IN THE EMAIL: links in the body of an email might look valid, but when you click on the link it takes you to a totally different address. If you hover over the “baited” link, most browsers will display the actual link you would be directed to in the bottom left corner.

At Symbol

EMAIL ADDRESS: Spammers use what is called “Spoofing” to present you with an email address that looks convincing, but it’s actually hiding the bogus email account. Common scams include emails stating there is a package waiting at the post office or there has been a questionable charge on your credit card and you must sign in to confirm the charge. I, personally, don’t click on any links in emails that relate to financial accounts such as credit cards or utilities. If I get an email – I open a browser and go to the site directly to verify account status or I call the company customer service line.

Grammar

GRAMMAR: Most scams have incomplete sentences, poor grammar, and lack of customer brand and contact information. If it does not seem right, there is a good chance it is not valid.

Email Attachment

ATTACHMENTS: Scammers will attach files that, when opened, will try to install malware and infect the computer. The best protection is not to open any attachments that you didn’t expect or were not sent from a valid source. Do not enable any macros or approve the installation of software.

Cloud Download

FREE SITES: Avoid websites that require you to install an application to access free files including fonts, music, videos, games or other applications. Validate the site is safe before downloading and installing any applications.

The latest lure in phishing scams is ransomware. The user is tricked into running a program or accessing a website that runs a program that will encrypt and lock all your data. Your data is held hostage and then requires payment to purchase the password to unencrypt your data. This can be a real sinker because it may encrypt all data across a corporate network, including network drives.

If you have received a questionable email,

contact the HELP DESK and have the email verified.

All applications should be approved before installing for both company acceptable usage and protection from malware infections.

If you would like to read the entire article on Avoid Getting Caught in a Phishing Scam or other articles from Intrada Technologies, visit: www.intradatech.com/knowledgebase.

Last modified on Continue reading
0
657

This email was received with the following message and attachment:

 b2ap3_thumbnail_EmailContent.png

ADP provides comprehensive payroll services and human resources management solutions for businesses of all sizes.

These emails do not originate from ADP and attachments may be malicious.

Message Subject Lines:

  • Your ADP account access will soon be suspended!
  • Your ADP account will be suspended soon
  • Your ADP Payroll access will expire soon
  • Your ADP will be suspended soon
  • Payroll Tax Form

How to Report an Incident to ADP:

  • Do not click on any links or open any attachments within the message.
  • Forward the email as an attachment to This email address is being protected from spambots. You need JavaScript enabled to view it.
  • Delete the email.
  • If you clicked any link or opened an attachment in the email, immediately contact your IT support team for further action.

See more at: http://www.adp.com/who-we-are/data-security-and-privacy/security-alerts.aspx

Header:

  • Received: from [195.56.205.30] (mail.gordiusz95zrt.hu [195.56.205.30])
  • X-Barracuda-Envelope-From: This email address is being protected from spambots. You need JavaScript enabled to view it.
  • X-Barracuda-Apparent-Source-IP: 195.56.205.30 Received: from [211.1.78.79] (account This email address is being protected from spambots. You need JavaScript enabled to view it. HELO ovwedy.vkmaajeuzf.net) by mail.gordiusz95zrt.hu (Postfix)

David Steele, Partner / Webmaster

This email address is being protected from spambots. You need JavaScript enabled to view it.
570-321-7370
FacebookTwitterLinkedIn Google+ RSS Feed

Last modified on Continue reading
0
Contact Information: 
    31 Ashler Manor Drive
    Muncy, PA 17756

Hours of Operation:
    Monday to Friday 8 AM > 6 PM EST
 
 800-858-5745

Mission Statement

Intrada is built on the premise that the management of information technology for business is like legal advice or accounting. It is not a do-it-yourself job.

Smart business people who are not technically savvy need quality resources for reliable hardware, software, service, and support. Businesses rely on these vendors as trusted friends or partners in their business.

Intrada serves its clients as that trusted partner. We make sure that our clients have what they need to run their businesses, with maximum efficiency and reliability.

Many of our client's needs are mission critical. Intrada gives them the assurance that we will be there when they need us.