Knowledge Base

Knowledge Base

  • Knowledge Base HOME
    Knowledge Base HOME Where you can find all the latest articles to the Intrada Knowledge Base.
  • Categories
    Categories Displays all the different categories within the Intrada Knowledge Base.
  • Tags
    Tags Tags are setup to help find articles related to a specific focus.
  • Users
    Users Meet the Staff and see what they have to share.



Phishing scams have increased exponentially since the COVID-19 situation entered our lives just a few weeks ago. Cybercriminals have become very aggressive and digitally savvy, posing as employers, government agencies, and financial institutions. According to a recent report from Google, there has been a 350% increase in active phishing websites since January.

Intrada Technologies wants to make you aware of the phishing attack surge. We advise you to be more cautious when opening your emails. Make sure they are coming from a trusted source and we ask you to only open links within those emails you were expecting to receive.

If you think you have been affected by a phishing scam, delete the message immediately. Do not open any links in the email. If you did open a link, please give us a call at (570) 321-7370. We are your partner. We are your troubleshooter. We are here to help.

Last modified on Continue reading

MUNCY, PA (October 22, 2019) – Intrada Technologies recently announced the hiring of James Haywood as Project Coordinator. His responsibilities include planning, initiating, and overseeing the execution of all elements of client projects.

Before joining Intrada, Haywood was a Business Marketing Consultant with PA CareerLink (Lycoming and Clinton Counties). Previously, he held positions with PPG Industrial Coatings and Fastenal. Haywood also served as an Intelligence Analyst Sergeant and ISR Sync Manager for the US Army.

Haywood earned his bachelor's degree in political science from Bloomsburg University and an associate's degree in intelligence operations studies at Cochise College.

He currently serves as the president of Rotary of Williamsport and is a board member for Transitional Living Center.

Intrada Technologies

Think of Intrada as an instant expansion (or creation) of your information technology department. Located in Muncy, Pennsylvania, Intrada helps our clients use technology to its maximum advantage to lower costs, increase productivity, gain market visibility, and improve their bottom line.

Last modified on Continue reading


Muncy, PA (June 25, 2019) - Intrada Technologies is proud to be nominated in Central Penn Business Journal's Reader Rankings' survey under 'IT & Tech Support Company'.

This year, nearly 3,000 nominations were submitted, and almost 18,000 votes cast in dozens of categories for the 2019 Reader Ranking Awards. The finalists from each category were revealed at an event on Wednesday, June 19 at the Hilton Harrisburg. Intrada finished in the top 3.

"When Paul Boyer and I started the company in 2000, our goal was to allow our clients to focus on their business while we focus on the technology that runs their business," stated David Steele, Partner with Intrada Technologies. "When we found out we were nominated we were not only honored but truly thankful - thankful that our clients thought of us, taking the time out of their busy schedules to choose us. It means a lot."

Steele also noted that this is an exciting time for companies that understand the potential of correctly using technology to grow their business. He adds, "By providing outstanding customer experience and excellent customer service, it has allowed us to partner with our clients and invest in technologies and concepts that have exceeded their expectations."

 About Intrada Technologies

Located in Muncy, Pennsylvania, Intrada is a privately-owned company that focuses on technology. Over the past several years, Intrada has invested in several services including cybersecurity, hybrid cloud solutions, and compliance programs to service our network management clients. These services were designed to both protect our clients and provide a stable and productive user work environment for their staff. Intrada continues to invest in training and manufacturer partner programs to maximize hardware purchasing power for our clients as well. Combining purchasing power and reliable IT solutions packages, Intrada is one of the leading IT service platforms in the industry exceeding expectations.


Last modified on Continue reading

David Steele Named Rotarian of the Year

Muncy, PA (August 7, 2018) — The Rotary Club of Williamsport recently named David Steele, Co-Founder of Intrada Technologies, Inc., Rotarian of the Year.

The Rotarian of the Year award is presented to a member of each Rotary chapter who goes above and beyond in demonstrating the organization’s “Service above Self” motto, and is highly visible in their club’s weekly activities.

“Being a part of the Rotary Club of Williamsport has impacted me tremendously,” Steele says. “I have met so many people who have a genuine love and desire to better our communities. Their passion is infectious and one I share. Giving back to the community is important to me.”

In addition to serving as the Rotary Club of Williamsport’s president this past year, Steele volunteers his time with several regional non-profit organizations including the River Valley YMCA, ABWE International, the Williamsport Christian Academy, and the Army Heritage Foundation.

About Rotary International

Rotary International consists of 1.2 million neighbors, friends and community leaders who come together to create positive, lasting change in our communities uniting for the common good. To learn more about Rotary International, go to

About Intrada Technologies, Inc.

Intrada Technologies, Inc., is a privately-owned technology company based in Muncy, Pa. Intrada’s mission is to help clients use technology to its maximum advantage – to achieve their strategic goals and objectives, increase productivity, reduce costs, gain market visibility and improve their bottom line. Intrada’s services include web design and development, application development, website management, network management, computer support, and hosting and cloud services. To learn more about Intrada Technologies, visit

Last modified on Continue reading

Cyber-Attacks are Coming Via Email

Recently, several customers received an email that threatens to post videos of them watching suggestive or inappropriate videos on the internet if they didn’t pay $2,900.00 in bitcoin. The email continued to say that malware and remote control software was installed on their computer allowing the collection of the video. The email immediately gets your attention by listing a password that you are currently using.

I am aware, $*@&$*%&, is your password. You may not know me and you're most likely thinking why you are getting this email, right?

In fact, I actually installed a malware on the adult website you visited. While you were watching videos, your web browser started out working as a RDP (Remote Desktop) that has a keylogger which gave me access to your screen and webcam. Right after that, my software program gathered all your contacts from your Messenger, Facebook, and email.

Well not to worry – the spammer does NOT have a video of you watching lewd videos. If the spammer had access to your computer, your computer would already be asking for payment. Unfortunately, the spammer did gain access to email addresses and passwords. They will most likely continue to use it to manipulate users into giving more information.

We have seen several dozen of these email scams hit our network and we are notifying clients of the scam and working to get these messages blocked.

We believe this list of accounts was obtained from recent hacks to companies like Ancestry 2015, Adobe 2013, Avast 2014, B2B 2017, Comcast 2015, Dominos 2014, Dropbox 2012, LinkedIn 2016, Snapchat 2015 and Sony 2011, to name few.

If you received the email:

  1. Do not respond. Don’t become a target. Just DELETE THE MESSAGE.
  2. If you still use the password listed in the email, you need to update any accounts using that password as soon as possible. There is nothing stopping the spammer from trying to access accounts and once in, it becomes very difficult to fix.
  3. Don’t enter your password on any sites to check and see if your password has been hacked or stolen. This is another attempt to update the list with current passwords.

We expect additional scams to follow saying your account has been compromised and to visit sites to confirm. Don’t get tricked by these phishing scams. If you have a concern, contact our help desk and a network technician will promptly make sure your accounts and workstation are secure.

Last modified on Continue reading

b2ap3_thumbnail_PRWorks27207_withlogo-scaled-down.jpgPRworks, a full-service public relations firm and affiliate of Intrada Technologies, Inc., has polished its brand and added a new key hire to its team.

Jason S. Kirsch, APR, has joined PRworks as senior counselor. Jason brings more than 20 years of experience building brands, leading campaigns and providing strategic communications expertise.

The newly-minted PRworks brand is marked by a new logo design, new website, and reaffirmation of its strategic approach and commitment to the core values of collaboration and integrity.

“This begins an exciting new chapter for PRworks, as we build on the expertise we provide to our clients and debut an updated brand,” said David Steele, partner at both PRworks and Intrada Technologies. “Jason’s character and experience is just the right fit for PRworks, and we are thrilled to have an individual of his caliber and reputation come aboard. With Jason on the team, and the energy of our refreshed brand, we look forward to helping more organizations advance their missions and achieve their goals.”

Kirsch said, “PRworks was born out of a belief in the power of strategic public relations to bring about positive outcomes for organizations and those they serve. The firm also stands by an unwavering commitment to ethical conduct. It’s an honor to be part of the PRworks team and to build on its legacy as a strategic communications partner.”

​Prior to joining PRworks, Kirsch was senior director in the marketing organization at Capital BlueCross, where he led brand management, public relations, digital marketing, advertising and creative services. He also previously oversaw marketing and public relations for Metro Bank, and conducted media relations and served as spokesperson for two Pennsylvania governors.

Throughout his career, Kirsch has managed communications and provided public relations counsel for a range of issues and critical junctures for businesses such as mergers and acquisitions, regulatory actions, data breaches, and high-profile organizational changes.

Kirsch holds the Accredited in Public Relations (APR) credential, a mark of distinction in the profession that signifies a distinguished level of expertise and a commitment to ethical conduct. He serves as accreditation co-chair for the Public Relations Society of America’s Central Pennsylvania Chapter; is an instructor for the Accreditation in Public Relations program nationally; and also is an adjunct professor at York College. He earned his master’s degree in communication studies from Bloomsburg University and his bachelor’s degree in communication/journalism from Shippensburg University.

PRworks was founded in 2001 by Robert Saline, APR, Fellow PRSA and Deborah Saline, APR, Fellow PRSA, two highly respected public relations counselors who are nationally recognized for their expertise and dedication to the profession. The Salines, now retired, sold PRworks to Intrada Technologies in 2015 after the two firms spent several years working together as strategic partners.

The PRworks-Intrada affiliation provides clients with a single and seamless integrated source for marketing, communication and technology services – a valuable strategic advantage for organizations given the critical bridge between marketing and technology.

Last modified on Continue reading

Building Your Personal Brand on LinkedIn

david - ll

Do you know how to build your brand on LinkedIn?  How to optimize your personal LinkedIn profile?  How do you make meaningful connections?  Intrada Technologies does.

Last month, Intrada Technologies visited Landmark Commercial Realty, Inc. and hosted a LinkedIn Lunch and Learn. Whew…say that five times fast!

David Steele, co-founder of Intrada Technologies, delivered a 45 minute presentation to a group of Landmark’s commercial real estate agents on how consistent, correct use of LinkedIn can help them obtain leads. 

According to there are:
- 67 million users
- 106 million monthly active users
- 1.5 million groups
- 40 percent of users visit daily
- 2 new members join each second

“LinkedIn is a great business to business tool for relationship building and lead generation. If you are not using it, you should be,” commented Steele. “From our (Intrada) experience, we have had clients refer us to their connections. We have gained new clients through our current contacts, as well as the site’s referrals.”

Individual Pages (Personal Brand)
Personal LinkedIn profiles are like an online resume and cover letter where you can highlight your skills, job experiences and how you are valuable as an employee. “Personalize it and make yourself stand out from others. Use keywords that are common in your profession when writing your profile,” said Steele. “We encourage posting articles, whether written by you or someone else, a few times a month. Posting these articles positions you as an industry expert and helps you engage current and prospective contacts. This engagement can open doors for leads.”

Business Pages (Company Brand) explains that these pages can help grow the visibility of your company and offer you the opportunity to engage with your clients on a digital level. The company page can serve as a credible extension of your digital brand. We will discuss this topic in-depth in a future article so stay tuned!

Making Connections
LinkedIn can be considered a digital Rolodex®. It is invaluable whether you want to expand your network, develop leads, or search for a new job. Making connections doesn’t happen overnight. Here are a few tips to get you started.

Last modified on Continue reading


DO NOT open any emails if you don't know the sender.

DO NOT open any attachments or click on any links in an email unless you are expecting the email and know the sender.

The computer malware that has spread across 150 countries appears to be slowing down but we are not out of the woods. With a few reports of fresh attacks in Asia and Europe on Monday, we are expecting additional attempts will continue throughout the week. If infected, your data will be encrypted and held for ransom for $300 to $600.

The best prevention is to avoid all emails you are not expecting.

If your network is managed by Intrada Technologies, we will be applying the Microsoft fix and rebooting machines throughout the day to apply the patch.

If you have a question about an email, please submit a help desk ticket to have the email checked before opening.

Last modified on Continue reading


By Eric Harkreader
Date Published: 4/24/2017

Sometimes, a client's technology needs go beyond the physical IT infrastructure driving their day-to-day business. Many of our clients do their best and most life-changing work outside of the home office. Luckily, Intrada and its sister communications company PRworks are used to coming up with creative solutions that leverage the deep bond between technology and communications. That's why we jumped at the chance to help our good friends at the River Valley Regional YMCA with their recent Annual Awards Dinner, a 151-year-old tradition.

In addition to providing seamless A/V support—equipping and managing all lighting, sound, and video projection for the night—we approached the client with an offer to share the night's highlights in real-time, uploading photos and videos to the client's Facebook page. By letting Intrada support the night's social media as well, the Y's communications and executive teams were instead able to focus on the night itself, graciously welcoming every attendee and ensuring the program went off without a hitch. But the real winners were the attendees, including our four-person team, who laughed, cheered, and cried right alongside the other 200-plus attendees over the course of the night. Story after story served as testimony to the life-changing good provided by the Y, a pillar of the Williamsport community. We marveled at range of emotions on display documenting the human condition.

From overcoming epilepsy through pilates, finding communal strength to battle cancer, or funneling grief into life-saving health changes, the night made clear that this group of people—this community—was a living, breathing entity, whose lives were deeply intertwined. And the Intrada team was so proud to be a part, helping behind the scenes to ensure the night was all the client had hoped for...and more.

Last modified on Continue reading

Bob Saline - PRworksInc

Date Published: 12/1/2016

"I remember vividly sitting in front of my black and white television at the age of 9 watching Walter Cronkite (one of my role models) reporting the news." That was the moment Bob Saline knew he wanted to embark on a career in the communications field. And although he originally wanted to follow in Cronkite's footsteps, public relations was (and is) his true calling.

Bob Saline, president & CEO (retired) of PRworks Inc., hails from Brockway, Pennsylvania—a borough in Jefferson County. He is the only child of a mother and father who instilled in him a love of people. "My parents would give the shirts off their backs for family and friends. Because my dad worked in the hot end of a glass blowing operation and my mom was a stay-at-home mom, they made sure I got through college without any debt, and did the same for some of our relatives. They were well respected in our community—just really good people."

The life lessons his parents taught him have been carried throughout his life, both personally and professionally. Bob has several passions, but mentoring is at the top of his list. "I have coached those in the PR field, individuals in my church—young families, people I have worked with. I truly enjoy it." Bob is a member and also volunteers at the Rotary Club of Harrisburg and Slate Hill Mennonite Church. "I have been through all of the leadership offices in Rotary and this April, I will join a team going to Haiti to put in a water filter at a rural school." In 2015, he and his wife managed the international media for the Mennonite World Conference that attracted more than 6,000 Anabaptists from around the globe and this year "I guided the publicity for our church's bicentennial celebration of the original church."

Last modified on Continue reading

b2ap3_thumbnail_responsive-traditional-design.jpgResponsive Web Design (RWD) is an approach where design and development should respond to the user’s behavior and their environment. The environment is based on screen size, platform and device orientation. The technology uses a mix of flexible grids, layouts, images and an intelligent use of Cascading Style Sheets (CSS). Based on the device used to access the site, the website will automatically switch to accommodate for resolution, image size and scripting abilities. This would eliminate the need for different templates based on the device used to access the website.

Traditional Web Design or Web 2.0 allows for unlimited design and function delivery. Through the advancement of HyperText Markup Language (HTML), Extensible HyperText Markup Language (XHTML), JavaScript (JS), and Cascading Style Sheets (CSS), Intrada can quickly deliver a simple landing page or advance online applications by using standard platforms.

A website's success is not solely based on the technology it uses, but more so, it's ability to provide for customers what they need and to engage potential prospects to become new clients. Intrada breaks down the development process and assigns the appropriate team of professional individuals to focus on specific aspects of the process.

Last modified on Continue reading

Locky VirusA new ransomware, Locky, has been discovered and is causing problems for computer users everywhere. The Locky ransomware encrypts your data files, locks you out of them and then demands .5 bitcoins to decrypt your files. This virus is particularly nasty due to its ability to encrypt files on unmapped network shares.

In addition to locking your files, Locky will completely change your file name, making it that much more difficult to restore the right data.

Worried about getting the Locky ransomware on your computer? Here are some more details about the virus:

  1. Locky is installed through email, particularly fake invoices Currently, Locky is installed through an invoice. You will receive an email with a subject containing an invoice and an attached document. When the document is opened, the text is scrambled and you will have to enable macros to make the text readable.
  2. The virus will encrypt your data The moment you enable macros within the file, Locky is on your computer. It begins to encrypt your data and change the file names. It will scan all local drives and unmapped network shares to find files.
  3. Recovery instructions will appear Your wallpaper will change to instructions on how to retrieve your data. This is the ransom note for your data. You will be instructed to visit a decrypter page, purchase bitcoins and send them to an address. Once your payment is made, you are provided the way to decrypt your files.

Locky is an easy trap to fall into because missing an invoice or not making a payment is something most people try to avoid. Remember to be conscious of emails from unknown senders, specifically when they have attachments.

If you do fall victim to the Locky virus, contact Intrada Technologies. Diagnostics are free at Intrada and Virus/Malware Removals start at just $69.95!

Last modified on Continue reading

The Monthly “Steal” by David Steele

The Monthly “Steal” is a bit of relevant technology information intertwined with personal thoughts, opinions and some real life experiences. It is written by David “Steele” and is free, hence a “steal” from a “Steele”.

206 Hospitals in 29 States were hacked effecting 4.5 million patient records in 2015. According to an article recently published in the Washington Post in February, a Los Angeles hospital paid $17,000 in bitcoin ransom to unload computer records.


“The quickest and most efficient way to restore our systems and administrative functions was to pay the ransom and obtain the decryption key,” Hollywood Presbyterian Medical Center CEO Allen Stefanek said. “In the best interest of restoring normal operations, we did this.”

Digital FingerprintBut hospitals are not the only target. JPMorgan Chase, Home Depot and Target were all victims of cyber-attacks in 2014.   It is no secret that personal information is valuable; the FBI released an article that indicated that in 2013, over 2 million health care records were compromised which was 31% of all reported data breaches. Cyber criminals are selling the information on the black market at a rate of $50 for each partial electronic health record (EHR), compared to $1 for a stolen social security number or credit card number.

What’s amazing is that most companies still don’t take cyber security serious or value the importance of properly securing customer data. Companies install door access systems, alarm systems, locked server racks and camera systems all focused on physical security, but when asked how they are securing their customer data, there is often a lack of detail. Most IT companies and computer professionals practice “General Network Management” or “Best Practices”. There are general guidelines that, when followed correctly, produce safe and secure computer networks. Where most companies struggle is how to confirm that best practices are being followed, usage policies are enforced and employees, IT staff and vendors are trained and held accountable.  

In 1996, the Federal Government created the Health Insurance Portability and Accountability Act – HIPAA. The primary goal of the law is to make it easier for people to keep health insurance, protect the confidentiality and security of healthcare information and help the healthcare industry control administrative costs. The Rule requires appropriate safeguards to protect the privacy of personal health information, and sets limits and conditions on the uses and disclosures that may be made of such information without patient authorization. HIPAA focuses mainly on medical and patient rights but the same requirements located under the HIPAA Security Rule provide a solid foundation and accountability to ensure “General Network Management” or “Best Practices” are valid and are providing a solid network environment. Before, IT companies would send a network technician and tell them to secure the network. Now, they send in a network technician and say this network needs to be HIPAA or Payment Card Industry (PCI) compliant providing both the IT company and the customer with accountability.

Many companies may say, “but I don’t deal with medical so why do I need to be so secured. When IT companies are hired, they are trusted with financial information, personal information and company information. By applying a HIPAA or PCI compliance requirement to your network will force vendors and staff to be more aware and involved in both the physical and function security of information. In most cases, the cost to properly secure and manage a network is a fraction of the cost associated with a data breach or privacy violation.



FBI Cyber Division - April 8, 2014

The Washington Post - February 18, 2015

Cyber Attacks on U.S. Companies in 2014 - By Riley Walters - October 27, 2014

David Steele, Partner / Webmaster
Facebook Twitter LinkedIn Google+ RSS Feed

Last modified on Continue reading

Fish and Hook ScamsDon’t take the bait. There has been a huge increase in phishing scams received in emails that appear to be harmless or legitimate, but lure you into their net then steal your privacy, infect your computer or hold your data hostage.

This can be very damaging and costly to the company and computer network. The following information is provided to help you educate your staff and prevent damaging infections.

Common Phishing Hooks:

Email Link

LINKS IN THE EMAIL: links in the body of an email might look valid, but when you click on the link it takes you to a totally different address. If you hover over the “baited” link, most browsers will display the actual link you would be directed to in the bottom left corner.

At Symbol

EMAIL ADDRESS: Spammers use what is called “Spoofing” to present you with an email address that looks convincing, but it’s actually hiding the bogus email account. Common scams include emails stating there is a package waiting at the post office or there has been a questionable charge on your credit card and you must sign in to confirm the charge. I, personally, don’t click on any links in emails that relate to financial accounts such as credit cards or utilities. If I get an email – I open a browser and go to the site directly to verify account status or I call the company customer service line.


GRAMMAR: Most scams have incomplete sentences, poor grammar, and lack of customer brand and contact information. If it does not seem right, there is a good chance it is not valid.

Email Attachment

ATTACHMENTS: Scammers will attach files that, when opened, will try to install malware and infect the computer. The best protection is not to open any attachments that you didn’t expect or were not sent from a valid source. Do not enable any macros or approve the installation of software.

Cloud Download

FREE SITES: Avoid websites that require you to install an application to access free files including fonts, music, videos, games or other applications. Validate the site is safe before downloading and installing any applications.

The latest lure in phishing scams is ransomware. The user is tricked into running a program or accessing a website that runs a program that will encrypt and lock all your data. Your data is held hostage and then requires payment to purchase the password to unencrypt your data. This can be a real sinker because it may encrypt all data across a corporate network, including network drives.

If you have received a questionable email,

contact the HELP DESK and have the email verified.

All applications should be approved before installing for both company acceptable usage and protection from malware infections.

If you would like to read the entire article on Avoid Getting Caught in a Phishing Scam or other articles from Intrada Technologies, visit:

Last modified on Continue reading

The Monthly “Steal” by David Steele

The Monthly “Steal” is a bit of relevant technology information intertwined with personal thoughts, opinions and some real life experiences. It is written by David “Steele” and is free, hence a “steal” from a “Steele”.

Fish and Hook ScamsOver the last 2 months, Intrada has seen a huge increase in email scams designed to steal individual identity, access online accounts or control computers. In the IT industry, we call these Phishing Scams because they are fishing for information. It is largely known not to plug in any device or USB drive or insert a disk into your computer if you don’t know where it came from. But, phishing scams are delivered mainly through email, not by plugging in an external device. These email scams many times look harmless or even like legitimate emails. But, once you click on the attachment or the link in the URL, the scammers usually try to install malware, ransomware or other backdoor applications that cause loss in data and a violation of your privacy.

Phishing Scams are not new. Phishing was first recognized in the mid 1990’s by a hacker named Khan Smith. Smith used the arrow symbols <>< that resemble a fish and commonly used in online chat communications, making it hard for AOL to filter the communications. This same symbol is associated with Christians and was used as a secret Christian symbol long before Smith. Combine this symbol with stolen or hacked email accounts to see why most credit Smith with leading the phishing epidemic.

So how do you keep from getting caught by Phishing Scams? If you receive an email that you are not expecting or from a sender you do not recognize, it’s best not to open it. I suggest you think of it as junk mail and trash it.

But, maybe your curiosity lured you to open the email. Here are some additional ‘red flag’ checks:

Email Link

LINKS IN THE EMAIL: links in the body of an email might look valid, but when you click on the link it takes you to a totally different address. If you hover over the “baited” link, most browsers will display the actual link you would be directed to in the bottom left corner.

At Symbol

EMAIL ADDRESS: Spammers use what is called “Spoofing” to present you with an email address that looks convincing, but it’s actually hiding the bogus email account. Common scams include emails stating there is a package waiting at the post office or there has been a questionable charge on your credit card and you must sign in to confirm the charge. I, personally, don’t click on any links in emails that relate to financial accounts such as credit cards or utilities. If I get an email – I open a browser and go to the site directly to verify account status or I call the company customer service line.


GRAMMAR: Most scams have incomplete sentences, poor grammar, and lack of customer brand and contact information. If it does not seem right, there is a good chance it is not valid.

Email Attachment

ATTACHMENTS: Scammers will attach files that, when opened, will try to install malware and infect the computer. The best protection is not to open any attachments that you didn’t expect or were not sent from a valid source. Do not enable any macros or approve the installation of software.

Cloud Download

FREE SITES: Avoid websites that require you to install an application to access free files including fonts, music, videos, games or other applications. Validate the site is safe before downloading and installing any applications.

Why doesn’t most virus protection software catch phishing scams? This is because the email does not actually contain a virus. The email contains a link to a website that tricks users into providing access information or to download and install an application to protect their computer. But, in reality, the person just infected their machine. Virus protection does not stop a user from loading software unless it is identified as malicious. Also, if the email has an attachment that is zipped; virus scanners can’t scan zipped files. Other attachments include Microsoft Word documents, that, when opened, require micros. When the user hits enable, the virus installs the malware that can infect the computer.

The latest lure in phishing scams is ransomware. The user is tricked into running a program or accessing a website that runs a program that will encrypt and lock all your data. The sender, who is usually in another country, holds your data hostage then requires a payment from you to purchase the password that will unencrypt your data. In a corporate setting, this can be a real sinker because it will normally encrypt all data across a corporate network, including network drives. When you have been a victim of ransomware, you are presented with two options:

  1. Pay the ransom to get your password, which is not guaranteed, to unlock your files and reload the infected computer.
  2. Reload the infected computer and restore files from backup.

Bottom line – it’s just ugly and nothing is worse than having your privacy violated or someone holding your personal data hostage. The best protection from phishing scams is:

  1. Educating yourself and your staff to not be click happy.
  2. Have good virus and spam filtering solutions in place to help prevent the temptation of hitting the inbox.
  3. Backups.

If you are a customer of Intrada and received a questionable email, contact tech support and have emails and websites verified before opening or installing any software. If you would be interested in learning more about Intrada or our scanning services, give me a call or email me today.

Short version of article to be distributed to all employees. (click here)


David Steele, Partner / Webmaster
Facebook Twitter LinkedIn Google+ RSS Feed

Last modified on Continue reading

David Murdocca

David Murdocca, is an account executive for Atlantic Exhibits who actively engages with his clients to embrace an owner’s or executive manager’s perspective. As a Trade Show Specialist, David’s work ethic sets him apart from other marketing professionals who cannot relate as well to the financial aspects. David has a passion for the trade show industry that provides him with knowledge and relationships required to build upon his expertise. This passion drives him to simplify his client’s trade show experience, strengthen their brand, encourage more meaningful customer engagement and generate more quality sales leads.

David Murdocca has been assisting businesses in the trade show field to successfully and profitably market and sell their products and services for over twenty years. From prior positions as a general manager for a mid-sized company and an owner/president of a small business, David understands the importance of events. He has attended over 500 major trade shows, domestically and internationally and brings exhibit industry passion and expertise to any organization. His functional background has ranged from design consultant to trade show coordinator to senior exhibit consultant to director of sales to general manager and to president and owner of an exhibit house. David regularly attends shows to discover new industries and trends. He has presented hundreds of exhibit and event marketing seminars and interactive strategic planning workshops at venues ranging from board rooms to conference centers.

David Steele and Nichole Keiner from Intrada meet with David Murdocca in December of 2015 to discuss his idea to present himself as a Trade Show Consultant. This level of service and title was not fully developed in the industry and we needed to develop content that would support searches to present this to company owners and marketing managers. Trade shows are expensive and companies are looking to increase the return on this investment.

Intrada was asked to research and create a website presentation that would validate this level of services and provide continual support to build ranking and organic placement throughout key trade show searches online. David is using this new website to communicate with clients on a regular basic with articles, reviews from shows and continual improvement processes. David is also using Twitter at shows to meet new prospects and linking his activities with national and international events.


Launch: March 2016

Address: 4605 Brookfield Corporate Drive, Chantilly, VA 20151

Phone: 443-473-7696

Configuration: Intrada Business Class Hosting with Barracuda Spam Filtering
WordPress - 4.5
Google Analytics / Google Webmaster Tools / Bing Webmaster Tools

Last modified on Continue reading

b2ap3_thumbnail_QuickTime.jpgThe Department of Homeland Security (DHS) has recently released a statement informing those who use the Windows Operating System of security vulnerabilities related to Apple’s QuickTime application for Windows. While no threats or infections have been reported in relation to this vulnerability, it has been recommended by the DHS that any QuickTime application be removed from a Windows environment. If you have a Mac PC or Apple device with QuickTime installed there is no risk and no need to remove it. Apple chose NOT to release critical security updates to the QuickTime for Windows application, resulting in the vulnerabilities originally reported by Trend Micro. If you are unsure if you have QuickTime for Windows or would like to speak with a technician regarding this threat call (570) 321-7370 or visit our office at 31 Ashler Manor Drive in Muncy, PA and we would be happy to look over the PC for you.

As always, diagnostics are free at Intrada! Virus/Malware Removals start at just $69.95!

Last modified on Continue reading
Tagged in: News scam Technology

You’ve created a Facebook fan page. Your company finally has a Twitter and now you’ve even set up a free HootSuite account to schedule out posts. Sometimes. When someone at your office thinks about it.

b2ap3_thumbnail_staring-at-phone.jpgAccording to statistics, 73% of Americans have a social network profile. That is 233.6 million people with just one social profile. One. Personally, I use Facebook, Tumblr, Twitter and Instagram multiple times a day. I get on Pinterest and LinkedIn a few times a week. My generation, and those younger than myself, are glued to social media. Think of how easy it would be to send one tweet and reach hundreds of people.

Not right away, mind you. Gaining social media followers may take some hard work, but the payoff is worth it. It’s a free way to interact with your consumer. How can you beat that?

Still not sold? Here are five reasons why having social media is a benefit to your business:

  1. Interaction – Other than speaking in person, there is no better way to interact with your consumers than through social media. While there is a certain negative stigma that comes with making yourself available 24/7 (not all of your employees may happy about it), you have the advantage of being able to reach consumers 24/7. A customer could tweet at you, asking a question about your product and, if someone is watching diligently, they could have an almost instantaneous response. Talk about helpful customer service! Speaking of customer service – someone leaves a nasty message on your Facebook page? Offer a response by giving them your office phone number. Put the ball back in their court and show everyone that you care. Start a weekly poll about something fun! Be entertaining and make people want to want to tweet at you, post on your timeline or send you a message on LinkedIn.
  2. Transparency – Being direct and not having a hidden agenda is the best (in my personal opinion) part about social media. It’s about having fun and interacting with your audience. Not trying to sell something. If people like you and your brand via social media, that will translate to your sales. Made a mistake that needs to be addressed? Put out a press release and then address it on social media. Whether you believe it or not, this generation of young adults – your future consumers – are willing to let mistakes go a lot more easily if you’re honest and upfront about them. Let the newspapers and your blog take care of the press release, but get your apology on social media as soon as possible. This generation, my generation, respects that. You messed up. Everyone does. Don’t hide it - that will only make the situation that more newsworthy when it comes out later. Show your audience that you are doing the best you can, no matter the circumstance.
  3. Humanize your Brand – The great thing about social media is that you can give your service or product human qualities. Do you pride your brand as being eco-friendly? Are you geared towards the modern business person or the weekend warrior? What would your brand be like if it was a person – take that and run with it in your social media plan. Say your brand produces sporting gear and equipment. You may want to focus on the words courage or determination. Your messages should always be crafted to insinuate those ideals. Has it been really snowy in your area lately? Throw up a post about thermal workout gear and never giving up. A sports star has done something bold and really great? Wow, they must embody your brand. Use those words and add them to your marketing campaign.
  4. b2ap3_thumbnail_tacobell-impresses.pngCreativity – There are so many directions you can take your social media presence. I’m a huge fan of Taco Bell on Twitter (they’re funny and I love tacos). And honestly, what is Denny’s even doing with their social media? Does anyone know? Not really – but it’s entertaining and hysterical. According to this post on the Social Times, Denny’s “embracing the weird” has put them in the #1 spot for “Brands Doing an Amazing Job on Social Media”. Having a unique social media strategy and being different just might garner you some attention. People like funny. People like different. Don’t be afraid to go out on a limb and try something new. Who knows? It might turn into the Thing that your brand is known for.
  5. Bragging Rights – Want to show how fun your office is? Take a picture at your staff meeting and put it on Instagram. Share that to Twitter and Facebook. Someone on your team won an award in their field? Copy the article URL and make a post on your company’s LinkedIn. Taking a company team-building retreat? Write a post about all of the great skills you’ve learned! Don’t misconstrue this. I’m not implying you need to post a status every time someone uses the microwave without complication or you recycle a piece of paper. That would be out of hand. But social media outlets are notorious for people posting their accomplishments. Take advantage and do what your audience expects – show them how awesome your brand is.

b2ap3_thumbnail_SM-buttons.jpgSocial media is happening now. Your consumers are online. Right now. They’re out there, waiting for you. Why wouldn’t you want to use free outlets to reach them?

Right! Mailing lists.

I’m not saying they don’t work. All I’m saying is that the only mail I open is what I’m expecting (I’m looking at you - books I’ve ordered online and my dreaded student loan statements). But take that as you will.

If this has sold you on create social media and dutifully updating on a regular basis, great! Now is the time to get started. Make sure that your pictures are high resolution and if you’re using more than one medium, that you keep a cohesive look. (Like using the same cover photo for Facebook and Twitter).

Happy posting!

Worried about the time it takes to set up all of your accounts and monitoring everything to make sure you’re posting on a regular basis? Here at Intrada Technologies, we offer education and services to help improve presence and develop a positive online reputation.

Last modified on Continue reading
Tagged in: Digital Marketing SMM

b2ap3_thumbnail_AHCFlogo.jpgThe Army Heritage Center Foundation, in cooperation with the U.S. Army and our other partners, serves as the lead agency supporting the development and expansion of the U.S. Army Heritage and Education Center (USAHEC). The Center is being developed to preserve the memories of Soldiers and their Families, honor their service, and help educate the American public about the Army and its’ Soldiers’ contributions to the Nation.

The Foundation was incorporated in 1999 as the Military Heritage Foundation after Secretary of the Army Louis Caldera committed the Army to, “the establishment of an Academic Research Facility and Army Museum at the United States Army War College, Carlisle Barracks, Pennsylvania.” Since its establishment, the Foundation has been the catalyst in forging the unique public-private partnership that has advanced the Center. Then, after Secretary of the Army Thomas White announced the creation of the U.S. Army Heritage and Education Center in October 2001, the Foundation assumed doing business in the name of the Army Heritage Center Foundation. The intent of the name change was to more closely align the Foundation’s efforts to the development of the Center.

Intrada took over site management and support in 2008, when the site was not maintained correctly causing some security concerns. Working with the staff to stabilize and update different functions, allowed Intrada to learn more about the Army Heritage Center Foundation. A tour of the facility, including the education center and museum, was amazing.

Intrada was asked to research and create a solution to address the high bounce rate the site was receiving. Intrada also took this as an opportunity to upgrade the webstore and site to a responsive template supporting mobile friendly standards. The site launched in early December and staff is pleased with the new look and functions.


Launch: December 2015

Address: 950 Soldiers Drive, Carlisle, PA 17013

Phone: 717-258-1102

Configuration: Intrada Business Class Hosting with Barracuda Spam Filtering
Joomla Content Manager System - 3.4
VirtueMart eCommerce Engine - 3.0
EasyBlog Component - 5.0
Google Analytics / Google Webmaster Tools / Bing Webmaster Tools

Last modified on Continue reading

So our employees can enjoy this special time with their families, Intrada Technologies will have special holiday hours.


  • Closing at 1:00 PM on Dec. 24 - Christmas Eve
  • Closed - Dec. 25th - Christmas Day
  • Closed - Jan. 1st - New Years Day

As always, we are on call for emergency situations. Please leave a message at our emergency extension 570-321-7370 ext. 210. A tech will respond promptly.


Last modified on Continue reading

Contact Information: 
    31 Ashler Manor Drive
    Muncy, PA 17756

Hours of Operation:
    Monday to Friday 8 AM > 6 PM EST

Mission Statement

Intrada is built on the premise that the management of information technology for business is like legal advice or accounting. It is not a do-it-yourself job.

Smart business people who are not technically savvy need quality resources for reliable hardware, software, service, and support. Businesses rely on these vendors as trusted friends or partners in their business.

Intrada serves its clients as a trusted partner. We make sure that our clients have what they need to run their businesses, with maximum efficiency and reliability.

Many of our client's needs are mission critical. Intrada gives them the assurance that we will be there when they need us.