Knowledge Base

Knowledge Base

  • Knowledge Base HOME
    Knowledge Base HOME Where you can find all the latest articles to the Intrada Knowledge Base.
  • Categories
    Categories Displays all the different categories within the Intrada Knowledge Base.
  • Tags
    Tags Tags are setup to help find articles related to a specific focus.
  • Users
    Users Meet the Staff and see what they have to share.
161

phone_scam

 

While all of the effects of COVID-19 have yet to be seen, the challenges for both large and small businesses are significant. Staying abreast of the constant changes and the impacts to your industry while keeping your business afloat can be all-encompassing.

As a small business, Intrada Technologies understands. We can help.

Intrada Technologies takes our partnership with clients seriously. Intrada Technologies was founded to build ongoing, trusted, collaborative relationships with clients through our full-service web development and network management services. We will be there when you need us.

Our commitment to our clients and to exceeding their expectations led us to develop a vital resource – the Situation Response Process.

When situations arise, it can be difficult to ascertain the best steps to take. The natural inclination is to take a step back. Intrada’s Situation Response Process encourages our staff to lean in with assistance and forward-thinking recommendations when clients are in distress.

The Situation Response Process helps Intrada and our clients best move through all phases of a situation and is incorporated into every one of our agreements. Intrada Technologies works hard to ensure our clients have what they need to run with maximum efficiency and reliability. Our goal is to help your business succeed.

This overview will provide insight into how Intrada Technologies’ Situation Response Process actively supports our clients, enabling them to respond quickly and proactively when an issue arises.

The Phases

The Situation Response Process flows between five phases: Initial, Maintenance, Transition, Resolution, and Evaluation. Every response differs because each client and circumstance have their nuances, but the process is a reliable framework for Intrada and our clients’ staff to build upon.

If your organization has a situation arise, Intrada Technologies will walk with you through each phase. The Service Response Process will allow you to respond quickly and consistently across all Intrada-serviced platforms for the best potential outcome.

phone_scam

Initial Phase

Unexpected events, crises, and emergencies spark confusion and present the challenges of incomplete or scattered facts, high-strung emotions, and possible media interest. Acknowledging the event and wisely sharing appropriate, factual information quickly through various channels builds trust in your organization’s credibility.

“There is no second chance to get it right in the initial phase of a crisis.” Barbara Reynolds, CDC

Intrada Technologies’ Situation Response Process activates when our staff becomes aware of your business’ issue – whether pre-crisis or at impact. Our owners are notified quickly and assign staff to help. We immediately reach out to collaborate with you and your staff to understand the situation, anticipate your needs, and provide support.

Intrada offers assistance with message development and enables you to distribute your message rapidly through the Internet, network, and social channels. Auditing existing communications, digital platforms, and marketing campaigns for revisions is promptly recommended and handled. Technology assets and configurations are reviewed to ensure prevent or minimize any service interruptions. Our Help Desk team is alerted and stands ready to aid your staff and launch a Disaster Recovery Policy check, if necessary. With your team’s input, our staff develops a Maintenance Response Plan to guide the next phase of the Situation Response Process.

Maintenance

During the Maintenance Phase, organizations seek to contain the situation, gain their public’s understanding, listen to get feedback, and respond with correct information or recommendations.

In implementing the Response Plan, Intrada’s staff strategically focuses on your web, IT and network challenges, empowering your business to both share and gather information. Verifying that all your digital and communication channels are updated, our team ensures you obtain the data you need and your customers receive your messages. Marketing and communication needs continue to be monitored and revised as needed.

While your organization is continuing to assess and address the event, our team’s diverse, technical know-how is at work utilizing the cutting-edge technology resources to create effective solutions and prepare for the next phase.

Transition

As the situation winds down, your business must transition from maintaining to thriving. Transitioning must be handled with care to prevent missteps. Using clear messaging through all your communication channels, set your audience’s expectations about the organization’s next steps and what to expect during the transition.

In the Transition Phase, Intrada Technologies helps our clients connect with customers to build excitement and generate momentum through updated communications, positive messaging, fresh images and content. Technology assets and configurations are reviewed again to minimize or prevent any service interruption. Help Desk team members identify the best process to transition your staff and communicate needful information to complete the phase. Targeted ad campaigns are scheduled to grow visibility and business interest.

Resolution

As operations return to a new normal in the Resolution Phase, Intrada will continue to support your organization’s web development, network management and technology needs. All systems’ functionality will be confirmed, messaging honed, platforms primed and digital marketing scheduled to invigorate your new focus.

Evaluation

Following the implementation of the Situation Response Process, your staff and Intrada will debrief with an honest evaluation of what worked, lessons learned, and ways to improve the process. Insights will be documented and filed for future reference.

"When a crisis hits, a positive outcome often depends on how well you have prepared and with whom you have partnered."

Conclusion

Intrada Technologies’ goal remains the same with the development of the Situation Response Process - to exceed our clients’ expectations. Through ongoing, trusted partnerships, we are prepared to create cutting-edge technology service solutions and deliver outstanding customer experiences to support you in any phase of your business’ life.

Is your Information Technology or Development partner reaching out to you with these proactive solutions during a crisis? Contact us today to learn more about a collaborative relationship with Intrada Technologies for your web development, IT, and network management needs.

Last modified on Continue reading
0
237

phone_scam

 

While the new normal for many of us consists of working remotely, homeschooling our children, and only leaving our homes for essential items, taking a moment to relax is necessary for our mental health. Here at Intrada we thought, why not send out a puzzle? Who doesn't like puzzles?

Take a break, grab a cup of coffee or tea, and try to successfully finish our puzzle. You may notice some familiar faces. Click here to begin assembling.

Stay safe. Stay healthy. Together, we will get through this.
-The Team at Intrada Technologies

Last modified on Continue reading
0
89

phone_scam

 

Since the middle of March, many of us have been working remotely due to COVID-19. Whether located in the corner of your family room, a closet, or on your kitchen island, our new commute times are now seconds and the new business attire is quite comfortable. However, our new workstations may not be as quiet as they were before and interruptions are inevitable.

While we are adapting as best as we can, adjusting to a new virtual office does come with challenges. Intrada Technologies suggests approaching our new normal by assessing these challenges proactively, rather than reactively.

Virtual Office Adjustment Tips

  1. Your new office normal should begin with a discussion with family members about work privacy.
    This discussion should prevent unauthorized access to screens, ensure the confidentiality of work-related phone calls, and lessen the likelihood of confidential files and documents being read. Think carefully about where you set up your workspace so you can be productive and efficient, while also following your company's policies. When you close up shop for the day, be intentional about closing windows on your screen and gathering documents into a folder where others will not accidentally see something they should not.
  2. Just because you are home does not mean you are available at any request.
    Be realistic as you discuss your availability with both family members and your employer. Be honest with family about your work requirements and what you need from them. Then, listen to their needs. If children are involved and your partner/spouse also has a job, make compromises to best meet everyone’s needs and respect responsibilities. Following your family chat, discuss your new goals and preferred schedule management with your employer. This will help diffuse resentment and appropriately set expectations on both sides. Not being on-call with family members should be included in the preceding work privacy discussion. Set expectations and follow them.
  3. An office should be an area where you can easily focus.
    If you do not have children, the kitchen island may work for your situation. If you do have children, being in the middle of the room with the most traffic may not be ideal unless your super power is ignoring things. Remember the old real estate adage about the best place to buy – location, location, location. Choose wisely. Then, set up the workspace that works for you.
  4. Document Sharing Recommendations
    Intrada Technologies encourages those working remotely to use a business account/configuration for sharing documents, not personal accounts. Some options include Google Drive – Business, Microsoft Office 365 with SharePoint and Dropbox Business.
  5. Video and Audio-Conferencing Software Options
    Intrada has used GoTo Meeting for several years with much success and we recommend it. Zoom is another option, but this new conference calling platform has been in the news a lot with how they are handling security. Overall, Zoom is fine to use and a great tool, but remember, as with any platform, you must protect meeting access to prevent the hijacking of meetings.
  6. Follow a schedule
    Most experts recommend following a schedule like you typically would if your commute was not ten feet. Structure and productivity go hand-in-hand. Make your bed. Shower. Get dressed. Eat breakfast. Try to make the new routine to work as normal as it was before the change of scenery.

How can Intrada Help?

Intrada Technologies is a full-service web development and network management company with a focus on creating ongoing, trusted partnerships with each of our clients. We make sure our clients have what they require to run their businesses with maximum efficiency and reliability, as many of their needs are mission-critical.

Our unique, collaborative partnerships allow us to provide our clients with the assurance that we will be there when they need us. From API development with websites to Voice Over IP (VoIP) for remote or softphone solutions to security and compliancy management to cloud hosting to equipment and software sales, we are here to help. Give us a call. Intrada Technologies – Exceeding Expectations.

Last modified on Continue reading
0
138

phone_scam

 

Hackers want your mobile phone number. This scam is new and quite simple. Hackers find out your mobile phone number and as much information as possible.

Once hackers steal your number, they contact your mobile phone company and make service changes. This gives them access to your calls, texts, and more. Scary! Depending on your configuration, they would be able to access your cloud drives, dual authentication codes, email, and reset passwords.

What can you do to protect yourself? Intrada Technologies recommends the following:

  1. Do not share your mobile number on public, social media sites, or unknown websites.
  2. Use strong passwords. Intrada recommends coming up with a “code” on how you create your passwords. This code provides a process of how you use different passwords for different sites but following a “code” so you can remember the password. For example- maybe all your online utility sites will start with an animal name, utility, address, and unique character. If that is the case, your electricity password might be FishblubPPL220*.
  3. Contact your cell phone company to require confirmation for SIM swamp, number porting, or password reset.
  4. Do not keep password files on your mobile device.

If you see your phone unexpectedly has changes to “Emergency Calls Only” status, contact your mobile phone company immediately. This is what happens when your number has been transferred to a different device.

If you have fallen victim to this type of scam, you need to alert your financial institutions and take standard steps to combat identity theft.

For more information, please contact the Help Desk at Intrada Technologies. We are here to help.

Last modified on Continue reading
0
421

email_scam

 

With the increase of employees working remotely, email scammers are getting creative. If you receive any emails in question, please contact the Intrada Help Desk before clicking on links or providing personal information.

This is an email received by Intrada from “Intrada” but not sent from Intrada. This is called spoofing. The email looks like it is from Intrada, but the actual sending server is in New York City - more specifically, 101 Avenue of the Americas – 10th Floor.

What is Spoofing?

Spoofing is when a spammer uses information like a shared email address (sales@company.com) or a contact usually found on a company website or online. Spammers will “spoof” that information and send to other email addresses also found on a company website to trick users into providing information, mobile phone numbers, account information, or additional private information.

Intrada uses the latest firewalls to help prevent these scams from ever hitting your inbox. On average, 56% of all email received by Intrada is spam, blocked by our firewalls; only 21% of incoming email is delivered. Other email is tagged for review or quarantined for user review. What spam firewalls cannot prevent is a user clicking on a link and providing personal information on an external website.

Intrada will not email you asking you to fill out personal information on a website form. Links that are sent to you asking for personal information is a red flag and should be checked by our Help Desk.

Please contact us if you think you have been spoofed by a scammer. We are here to help.

Last modified on Continue reading
0
130

phishing

 

The COVID-19 pandemic has affected the way we live and the way we work. Unless your organization has been deemed essential, you and your colleagues are likely working remotely. That means more audio and video conference calls, emails, and designating a specific place in your home as your new office.

Remember, just because you are working from a remote location does not mean you left the responsibility for following all the company network and privacy policies at the office. Every employee should ensure all company and customer information is kept confidential and secured per company policy and procedures. It does not matter if you’re sitting at a desk in your family room or at your kitchen island.

Your new office normal might require a discussion with family members about work privacy. This discussion should prevent unauthorized access to screens, ensure the confidentiality of work-related phone calls, and lessen the likelihood of confidential files and documents being read. Think carefully about where you set up your workspace so you can be productive and efficient, while also following your company's policies. When you close up shop for the day, be intentional about closing windows on your screen and gathering documents into a folder where others will not accidentally see something they should not.

If you have questions or concerns related to remote work, contact the Intrada Help Desk for more information by calling 800-858-5745.

Last modified on Continue reading
0
244

PhishingScam

 

Phishing scams have increased exponentially since the COVID-19 situation entered our lives just a few weeks ago. Cybercriminals have become very aggressive and digitally savvy, posing as employers, government agencies, and financial institutions. According to a recent report from Google, there has been a 350% increase in active phishing websites since January.

Intrada Technologies wants to make you aware of the phishing attack surge. We advise you to be more cautious when opening your emails. Make sure they are coming from a trusted source and we ask you to only open links within those emails you were expecting to receive.

If you think you have been affected by a phishing scam, delete the message immediately. Do not open any links in the email. If you did open a link, please give us a call at (570) 321-7370. We are your partner. We are your troubleshooter. We are here to help.

Last modified on Continue reading
0
462

MUNCY, PA (October 22, 2019) – Intrada Technologies recently announced the hiring of James Haywood as Project Coordinator. His responsibilities include planning, initiating, and overseeing the execution of all elements of client projects.

Before joining Intrada, Haywood was a Business Marketing Consultant with PA CareerLink (Lycoming and Clinton Counties). Previously, he held positions with PPG Industrial Coatings and Fastenal. Haywood also served as an Intelligence Analyst Sergeant and ISR Sync Manager for the US Army.

Haywood earned his bachelor's degree in political science from Bloomsburg University and an associate's degree in intelligence operations studies at Cochise College.

He currently serves as the president of Rotary of Williamsport and is a board member for Transitional Living Center.

Intrada Technologies

Think of Intrada as an instant expansion (or creation) of your information technology department. Located in Muncy, Pennsylvania, Intrada helps our clients use technology to its maximum advantage to lower costs, increase productivity, gain market visibility, and improve their bottom line.

Last modified on Continue reading
0
1141

b2ap3_thumbnail_Intrada-ReaderRankings-01-1.jpg

Muncy, PA (June 25, 2019) - Intrada Technologies is proud to be nominated in Central Penn Business Journal's Reader Rankings' survey under 'IT & Tech Support Company'.

This year, nearly 3,000 nominations were submitted, and almost 18,000 votes cast in dozens of categories for the 2019 Reader Ranking Awards. The finalists from each category were revealed at an event on Wednesday, June 19 at the Hilton Harrisburg. Intrada finished in the top 3.

"When Paul Boyer and I started the company in 2000, our goal was to allow our clients to focus on their business while we focus on the technology that runs their business," stated David Steele, Partner with Intrada Technologies. "When we found out we were nominated we were not only honored but truly thankful - thankful that our clients thought of us, taking the time out of their busy schedules to choose us. It means a lot."

Steele also noted that this is an exciting time for companies that understand the potential of correctly using technology to grow their business. He adds, "By providing outstanding customer experience and excellent customer service, it has allowed us to partner with our clients and invest in technologies and concepts that have exceeded their expectations."

 About Intrada Technologies

Located in Muncy, Pennsylvania, Intrada is a privately-owned company that focuses on technology. Over the past several years, Intrada has invested in several services including cybersecurity, hybrid cloud solutions, and compliance programs to service our network management clients. These services were designed to both protect our clients and provide a stable and productive user work environment for their staff. Intrada continues to invest in training and manufacturer partner programs to maximize hardware purchasing power for our clients as well. Combining purchasing power and reliable IT solutions packages, Intrada is one of the leading IT service platforms in the industry exceeding expectations.

 

Last modified on Continue reading
0
1818

David Steele Named Rotarian of the Year

Muncy, PA (August 7, 2018) — The Rotary Club of Williamsport recently named David Steele, Co-Founder of Intrada Technologies, Inc., Rotarian of the Year.

The Rotarian of the Year award is presented to a member of each Rotary chapter who goes above and beyond in demonstrating the organization’s “Service above Self” motto, and is highly visible in their club’s weekly activities.

“Being a part of the Rotary Club of Williamsport has impacted me tremendously,” Steele says. “I have met so many people who have a genuine love and desire to better our communities. Their passion is infectious and one I share. Giving back to the community is important to me.”

In addition to serving as the Rotary Club of Williamsport’s president this past year, Steele volunteers his time with several regional non-profit organizations including the River Valley YMCA, ABWE International, the Williamsport Christian Academy, and the Army Heritage Foundation.

About Rotary International

Rotary International consists of 1.2 million neighbors, friends and community leaders who come together to create positive, lasting change in our communities uniting for the common good. To learn more about Rotary International, go to www.rotary.org.

About Intrada Technologies, Inc.

Intrada Technologies, Inc., is a privately-owned technology company based in Muncy, Pa. Intrada’s mission is to help clients use technology to its maximum advantage – to achieve their strategic goals and objectives, increase productivity, reduce costs, gain market visibility and improve their bottom line. Intrada’s services include web design and development, application development, website management, network management, computer support, and hosting and cloud services. To learn more about Intrada Technologies, visit www.intradatech.com.

Last modified on Continue reading
0
1725

Cyber-Attacks are Coming Via Email

Recently, several customers received an email that threatens to post videos of them watching suggestive or inappropriate videos on the internet if they didn’t pay $2,900.00 in bitcoin. The email continued to say that malware and remote control software was installed on their computer allowing the collection of the video. The email immediately gets your attention by listing a password that you are currently using.

I am aware, $*@&$*%&, is your password. You may not know me and you're most likely thinking why you are getting this email, right?

In fact, I actually installed a malware on the adult website you visited. While you were watching videos, your web browser started out working as a RDP (Remote Desktop) that has a keylogger which gave me access to your screen and webcam. Right after that, my software program gathered all your contacts from your Messenger, Facebook, and email.

Well not to worry – the spammer does NOT have a video of you watching lewd videos. If the spammer had access to your computer, your computer would already be asking for payment. Unfortunately, the spammer did gain access to email addresses and passwords. They will most likely continue to use it to manipulate users into giving more information.

We have seen several dozen of these email scams hit our network and we are notifying clients of the scam and working to get these messages blocked.

We believe this list of accounts was obtained from recent hacks to companies like Ancestry 2015, Adobe 2013, Avast 2014, B2B 2017, Comcast 2015, Dominos 2014, Dropbox 2012, LinkedIn 2016, Snapchat 2015 and Sony 2011, to name few.

If you received the email:

  1. Do not respond. Don’t become a target. Just DELETE THE MESSAGE.
  2. If you still use the password listed in the email, you need to update any accounts using that password as soon as possible. There is nothing stopping the spammer from trying to access accounts and once in, it becomes very difficult to fix.
  3. Don’t enter your password on any sites to check and see if your password has been hacked or stolen. This is another attempt to update the list with current passwords.

We expect additional scams to follow saying your account has been compromised and to visit sites to confirm. Don’t get tricked by these phishing scams. If you have a concern, contact our help desk and a network technician will promptly make sure your accounts and workstation are secure.

Last modified on Continue reading
0
2524

b2ap3_thumbnail_PRWorks27207_withlogo-scaled-down.jpgPRworks, a full-service public relations firm and affiliate of Intrada Technologies, Inc., has polished its brand and added a new key hire to its team.

Jason S. Kirsch, APR, has joined PRworks as senior counselor. Jason brings more than 20 years of experience building brands, leading campaigns and providing strategic communications expertise.

The newly-minted PRworks brand is marked by a new logo design, new website, and reaffirmation of its strategic approach and commitment to the core values of collaboration and integrity.

“This begins an exciting new chapter for PRworks, as we build on the expertise we provide to our clients and debut an updated brand,” said David Steele, partner at both PRworks and Intrada Technologies. “Jason’s character and experience is just the right fit for PRworks, and we are thrilled to have an individual of his caliber and reputation come aboard. With Jason on the team, and the energy of our refreshed brand, we look forward to helping more organizations advance their missions and achieve their goals.”

Kirsch said, “PRworks was born out of a belief in the power of strategic public relations to bring about positive outcomes for organizations and those they serve. The firm also stands by an unwavering commitment to ethical conduct. It’s an honor to be part of the PRworks team and to build on its legacy as a strategic communications partner.”

​Prior to joining PRworks, Kirsch was senior director in the marketing organization at Capital BlueCross, where he led brand management, public relations, digital marketing, advertising and creative services. He also previously oversaw marketing and public relations for Metro Bank, and conducted media relations and served as spokesperson for two Pennsylvania governors.

Throughout his career, Kirsch has managed communications and provided public relations counsel for a range of issues and critical junctures for businesses such as mergers and acquisitions, regulatory actions, data breaches, and high-profile organizational changes.

Kirsch holds the Accredited in Public Relations (APR) credential, a mark of distinction in the profession that signifies a distinguished level of expertise and a commitment to ethical conduct. He serves as accreditation co-chair for the Public Relations Society of America’s Central Pennsylvania Chapter; is an instructor for the Accreditation in Public Relations program nationally; and also is an adjunct professor at York College. He earned his master’s degree in communication studies from Bloomsburg University and his bachelor’s degree in communication/journalism from Shippensburg University.

PRworks was founded in 2001 by Robert Saline, APR, Fellow PRSA and Deborah Saline, APR, Fellow PRSA, two highly respected public relations counselors who are nationally recognized for their expertise and dedication to the profession. The Salines, now retired, sold PRworks to Intrada Technologies in 2015 after the two firms spent several years working together as strategic partners.

The PRworks-Intrada affiliation provides clients with a single and seamless integrated source for marketing, communication and technology services – a valuable strategic advantage for organizations given the critical bridge between marketing and technology.

www.prworksinc.com

Last modified on Continue reading
0
1976

Building Your Personal Brand on LinkedIn

david - ll

Do you know how to build your brand on LinkedIn?  How to optimize your personal LinkedIn profile?  How do you make meaningful connections?  Intrada Technologies does.

Last month, Intrada Technologies visited Landmark Commercial Realty, Inc. and hosted a LinkedIn Lunch and Learn. Whew…say that five times fast!

David Steele, co-founder of Intrada Technologies, delivered a 45 minute presentation to a group of Landmark’s commercial real estate agents on how consistent, correct use of LinkedIn can help them obtain leads. 

According to LinkedIn.com there are:
- 67 million users
- 106 million monthly active users
- 1.5 million groups
- 40 percent of users visit daily
- 2 new members join each second

“LinkedIn is a great business to business tool for relationship building and lead generation. If you are not using it, you should be,” commented Steele. “From our (Intrada) experience, we have had clients refer us to their connections. We have gained new clients through our current contacts, as well as the site’s referrals.”

Individual Pages (Personal Brand)
Personal LinkedIn profiles are like an online resume and cover letter where you can highlight your skills, job experiences and how you are valuable as an employee. “Personalize it and make yourself stand out from others. Use keywords that are common in your profession when writing your profile,” said Steele. “We encourage posting articles, whether written by you or someone else, a few times a month. Posting these articles positions you as an industry expert and helps you engage current and prospective contacts. This engagement can open doors for leads.”

Business Pages (Company Brand)
Socialmediaexaminer.com explains that these pages can help grow the visibility of your company and offer you the opportunity to engage with your clients on a digital level. The company page can serve as a credible extension of your digital brand. We will discuss this topic in-depth in a future article so stay tuned!


Making Connections
LinkedIn can be considered a digital Rolodex®. It is invaluable whether you want to expand your network, develop leads, or search for a new job. Making connections doesn’t happen overnight. Here are a few tips to get you started.

Last modified on Continue reading
0
2623

Fish

DO NOT open any emails if you don't know the sender.

DO NOT open any attachments or click on any links in an email unless you are expecting the email and know the sender.

The computer malware that has spread across 150 countries appears to be slowing down but we are not out of the woods. With a few reports of fresh attacks in Asia and Europe on Monday, we are expecting additional attempts will continue throughout the week. If infected, your data will be encrypted and held for ransom for $300 to $600.

The best prevention is to avoid all emails you are not expecting.

If your network is managed by Intrada Technologies, we will be applying the Microsoft fix and rebooting machines throughout the day to apply the patch.

If you have a question about an email, please submit a help desk ticket to have the email checked before opening.

Last modified on Continue reading
0
2092

YMCA

By Eric Harkreader
Date Published: 4/24/2017

Sometimes, a client's technology needs go beyond the physical IT infrastructure driving their day-to-day business. Many of our clients do their best and most life-changing work outside of the home office. Luckily, Intrada and its sister communications company PRworks are used to coming up with creative solutions that leverage the deep bond between technology and communications. That's why we jumped at the chance to help our good friends at the River Valley Regional YMCA with their recent Annual Awards Dinner, a 151-year-old tradition.

In addition to providing seamless A/V support—equipping and managing all lighting, sound, and video projection for the night—we approached the client with an offer to share the night's highlights in real-time, uploading photos and videos to the client's Facebook page. By letting Intrada support the night's social media as well, the Y's communications and executive teams were instead able to focus on the night itself, graciously welcoming every attendee and ensuring the program went off without a hitch. But the real winners were the attendees, including our four-person team, who laughed, cheered, and cried right alongside the other 200-plus attendees over the course of the night. Story after story served as testimony to the life-changing good provided by the Y, a pillar of the Williamsport community. We marveled at range of emotions on display documenting the human condition.

From overcoming epilepsy through pilates, finding communal strength to battle cancer, or funneling grief into life-saving health changes, the night made clear that this group of people—this community—was a living, breathing entity, whose lives were deeply intertwined. And the Intrada team was so proud to be a part, helping behind the scenes to ensure the night was all the client had hoped for...and more.

Last modified on Continue reading
0
4002

Bob Saline - PRworksInc

Date Published: 12/1/2016

"I remember vividly sitting in front of my black and white television at the age of 9 watching Walter Cronkite (one of my role models) reporting the news." That was the moment Bob Saline knew he wanted to embark on a career in the communications field. And although he originally wanted to follow in Cronkite's footsteps, public relations was (and is) his true calling.

Bob Saline, president & CEO (retired) of PRworks Inc., hails from Brockway, Pennsylvania—a borough in Jefferson County. He is the only child of a mother and father who instilled in him a love of people. "My parents would give the shirts off their backs for family and friends. Because my dad worked in the hot end of a glass blowing operation and my mom was a stay-at-home mom, they made sure I got through college without any debt, and did the same for some of our relatives. They were well respected in our community—just really good people."

The life lessons his parents taught him have been carried throughout his life, both personally and professionally. Bob has several passions, but mentoring is at the top of his list. "I have coached those in the PR field, individuals in my church—young families, people I have worked with. I truly enjoy it." Bob is a member and also volunteers at the Rotary Club of Harrisburg and Slate Hill Mennonite Church. "I have been through all of the leadership offices in Rotary and this April, I will join a team going to Haiti to put in a water filter at a rural school." In 2015, he and his wife managed the international media for the Mennonite World Conference that attracted more than 6,000 Anabaptists from around the globe and this year "I guided the publicity for our church's bicentennial celebration of the original church."

Last modified on Continue reading
0
3294

b2ap3_thumbnail_responsive-traditional-design.jpgResponsive Web Design (RWD) is an approach where design and development should respond to the user’s behavior and their environment. The environment is based on screen size, platform and device orientation. The technology uses a mix of flexible grids, layouts, images and an intelligent use of Cascading Style Sheets (CSS). Based on the device used to access the site, the website will automatically switch to accommodate for resolution, image size and scripting abilities. This would eliminate the need for different templates based on the device used to access the website.

Traditional Web Design or Web 2.0 allows for unlimited design and function delivery. Through the advancement of HyperText Markup Language (HTML), Extensible HyperText Markup Language (XHTML), JavaScript (JS), and Cascading Style Sheets (CSS), Intrada can quickly deliver a simple landing page or advance online applications by using standard platforms.

A website's success is not solely based on the technology it uses, but more so, it's ability to provide for customers what they need and to engage potential prospects to become new clients. Intrada breaks down the development process and assigns the appropriate team of professional individuals to focus on specific aspects of the process.

Last modified on Continue reading
0
3484

Locky VirusA new ransomware, Locky, has been discovered and is causing problems for computer users everywhere. The Locky ransomware encrypts your data files, locks you out of them and then demands .5 bitcoins to decrypt your files. This virus is particularly nasty due to its ability to encrypt files on unmapped network shares.

In addition to locking your files, Locky will completely change your file name, making it that much more difficult to restore the right data.

Worried about getting the Locky ransomware on your computer? Here are some more details about the virus:

  1. Locky is installed through email, particularly fake invoices Currently, Locky is installed through an invoice. You will receive an email with a subject containing an invoice and an attached document. When the document is opened, the text is scrambled and you will have to enable macros to make the text readable.
  2. The virus will encrypt your data The moment you enable macros within the file, Locky is on your computer. It begins to encrypt your data and change the file names. It will scan all local drives and unmapped network shares to find files.
  3. Recovery instructions will appear Your wallpaper will change to instructions on how to retrieve your data. This is the ransom note for your data. You will be instructed to visit a decrypter page, purchase bitcoins and send them to an address. Once your payment is made, you are provided the way to decrypt your files.

Locky is an easy trap to fall into because missing an invoice or not making a payment is something most people try to avoid. Remember to be conscious of emails from unknown senders, specifically when they have attachments.

If you do fall victim to the Locky virus, contact Intrada Technologies. Diagnostics are free at Intrada and Virus/Malware Removals start at just $69.95!

Last modified on Continue reading
0
3174

The Monthly “Steal” by David Steele

The Monthly “Steal” is a bit of relevant technology information intertwined with personal thoughts, opinions and some real life experiences. It is written by David “Steele” and is free, hence a “steal” from a “Steele”.

206 Hospitals in 29 States were hacked effecting 4.5 million patient records in 2015. According to an article recently published in the Washington Post in February, a Los Angeles hospital paid $17,000 in bitcoin ransom to unload computer records.

 

“The quickest and most efficient way to restore our systems and administrative functions was to pay the ransom and obtain the decryption key,” Hollywood Presbyterian Medical Center CEO Allen Stefanek said. “In the best interest of restoring normal operations, we did this.”

Digital FingerprintBut hospitals are not the only target. JPMorgan Chase, Home Depot and Target were all victims of cyber-attacks in 2014.   It is no secret that personal information is valuable; the FBI released an article that indicated that in 2013, over 2 million health care records were compromised which was 31% of all reported data breaches. Cyber criminals are selling the information on the black market at a rate of $50 for each partial electronic health record (EHR), compared to $1 for a stolen social security number or credit card number.

What’s amazing is that most companies still don’t take cyber security serious or value the importance of properly securing customer data. Companies install door access systems, alarm systems, locked server racks and camera systems all focused on physical security, but when asked how they are securing their customer data, there is often a lack of detail. Most IT companies and computer professionals practice “General Network Management” or “Best Practices”. There are general guidelines that, when followed correctly, produce safe and secure computer networks. Where most companies struggle is how to confirm that best practices are being followed, usage policies are enforced and employees, IT staff and vendors are trained and held accountable.  

In 1996, the Federal Government created the Health Insurance Portability and Accountability Act – HIPAA. The primary goal of the law is to make it easier for people to keep health insurance, protect the confidentiality and security of healthcare information and help the healthcare industry control administrative costs. The Rule requires appropriate safeguards to protect the privacy of personal health information, and sets limits and conditions on the uses and disclosures that may be made of such information without patient authorization. HIPAA focuses mainly on medical and patient rights but the same requirements located under the HIPAA Security Rule provide a solid foundation and accountability to ensure “General Network Management” or “Best Practices” are valid and are providing a solid network environment. Before, IT companies would send a network technician and tell them to secure the network. Now, they send in a network technician and say this network needs to be HIPAA or Payment Card Industry (PCI) compliant providing both the IT company and the customer with accountability.

Many companies may say, “but I don’t deal with medical so why do I need to be so secured. When IT companies are hired, they are trusted with financial information, personal information and company information. By applying a HIPAA or PCI compliance requirement to your network will force vendors and staff to be more aware and involved in both the physical and function security of information. In most cases, the cost to properly secure and manage a network is a fraction of the cost associated with a data breach or privacy violation.

Hospital-Map_20160422-145801_1.jpg

Resources:

FBI Cyber Division - April 8, 2014

The Washington Post - February 18, 2015

Cyber Attacks on U.S. Companies in 2014 - By Riley Walters - October 27, 2014

David Steele, Partner / Webmaster

djsteele@intradatech.com
570-321-7370
Facebook Twitter LinkedIn Google+ RSS Feed

Last modified on Continue reading
0
2704

Fish and Hook ScamsDon’t take the bait. There has been a huge increase in phishing scams received in emails that appear to be harmless or legitimate, but lure you into their net then steal your privacy, infect your computer or hold your data hostage.

This can be very damaging and costly to the company and computer network. The following information is provided to help you educate your staff and prevent damaging infections.

Common Phishing Hooks:

Email Link

LINKS IN THE EMAIL: links in the body of an email might look valid, but when you click on the link it takes you to a totally different address. If you hover over the “baited” link, most browsers will display the actual link you would be directed to in the bottom left corner.

At Symbol

EMAIL ADDRESS: Spammers use what is called “Spoofing” to present you with an email address that looks convincing, but it’s actually hiding the bogus email account. Common scams include emails stating there is a package waiting at the post office or there has been a questionable charge on your credit card and you must sign in to confirm the charge. I, personally, don’t click on any links in emails that relate to financial accounts such as credit cards or utilities. If I get an email – I open a browser and go to the site directly to verify account status or I call the company customer service line.

Grammar

GRAMMAR: Most scams have incomplete sentences, poor grammar, and lack of customer brand and contact information. If it does not seem right, there is a good chance it is not valid.

Email Attachment

ATTACHMENTS: Scammers will attach files that, when opened, will try to install malware and infect the computer. The best protection is not to open any attachments that you didn’t expect or were not sent from a valid source. Do not enable any macros or approve the installation of software.

Cloud Download

FREE SITES: Avoid websites that require you to install an application to access free files including fonts, music, videos, games or other applications. Validate the site is safe before downloading and installing any applications.

The latest lure in phishing scams is ransomware. The user is tricked into running a program or accessing a website that runs a program that will encrypt and lock all your data. Your data is held hostage and then requires payment to purchase the password to unencrypt your data. This can be a real sinker because it may encrypt all data across a corporate network, including network drives.

If you have received a questionable email,

contact the HELP DESK and have the email verified.

All applications should be approved before installing for both company acceptable usage and protection from malware infections.

If you would like to read the entire article on Avoid Getting Caught in a Phishing Scam or other articles from Intrada Technologies, visit: www.intradatech.com/knowledgebase.

Last modified on Continue reading
0

Contact Information: 
    31 Ashler Manor Drive
    Muncy, PA 17756

Hours of Operation:
    Monday to Friday 8 AM > 6 PM EST
 
 800-858-5745

Mission Statement

Intrada is built on the premise that the management of information technology for business is like legal advice or accounting. It is not a do-it-yourself job.

Smart business people who are not technically savvy need quality resources for reliable hardware, software, service, and support. Businesses rely on these vendors as trusted friends or partners in their business.

Intrada serves its clients as a trusted partner. We make sure that our clients have what they need to run their businesses, with maximum efficiency and reliability.

Many of our client's needs are mission critical. Intrada gives them the assurance that we will be there when they need us.