Directive Analytics

Directive Blog

Directive Blogs

Directive has been serving the Oneonta area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cyberattacks and data breaches are a threat to businesses everywhere. The most important places to start for preventing a breach is with your employees and their knowledge and use of cybersecurity best practices.

The cybersecurity tips below cover awareness, basic safety, online safety, social media, data security, tips for remote workers,...

Cyberattacks and data breaches are a threat to businesses everywhere. The most important places to start for preventing a breach is with your employees and their knowledge and use of cybersecurity best practices.

The cybersecurity tips below cover awareness, basic safety, online safety, social media, data security, tips for remote workers, small businesses, and considerations for business owners and managers to keep in mind.

More

Insider Threats

Have you ever considered that the biggest threat to your cybersecurity might be sitting just a few desks away?

In this Micro Training, learn about insider threats and the dangers they pose for an organization.

0 Comments
Continue reading

Evil Twin Scams

Do you feel confident in your ability to spot a fake Wi-Fi network?

If not, this Micro Training video on evil twin attacks is a must watch!

0 Comments
Continue reading

Ransomware

The threat of ransomware has not diminished over the years. In fact, additional extortion techniques are making these attacks even more dangerous.

In this Micro Training, learn about what ransomware is, how damaging it can be, and the best practices for protecting your devices.

0 Comments
Continue reading

Dictionary Attacks

If your passwords are easy for you to remember, they may also be easy for a cybercriminal to guess using a dictionary attack.

In this Micro Training, learn about how dangerous dictionary attacks can be and how to protect your accounts.

0 Comments
Continue reading

Text-Based CEO Fraud

Cybercriminals are exploiting text messages in sophisticated CEO fraud schemes, tricking employees into revealing sensitive information or sending money under the guise of urgent requests from top executives.

In this Micro Training, learn the essential strategies to protect yourself and your organization from these increasingly common and deceptive scams.

0 Comments
Continue reading

Malicious Apps

App stores are brimming with helpful tools and entertainment options, but hidden among these useful applications are malicious threats waiting to trip up unwary users.

In this Micro Training, learn more about the signs of suspicious apps so you can steer clear of the malicious ones and explore app stores with confidence.

0 Comments
Continue reading

One-Time Password Scams

While one-time passwords can be a great way to verify a user’s identity, in the wrong hands, they can be used for harm.

In this Micro Training, we'll explore how cybercriminals are exploiting one-time passwords (OTPs) to carry out their scams.

0 Comments
Continue reading

Social Media Cyber Safety Part 2

Last week, we uncovered common scams found on social media.

In this Micro Training, we share helpful tips on how to use social media more safely.

0 Comments
Continue reading

Social Media Cyber Safety Part 1

Social media can be fun – but you should still use it with the same caution you use with any other online activity.

In this Micro Training, learn how to recognize common social media scams, such as phishing, account hijacking, and malware.

0 Comments
Continue reading

Cyber-Safe Travel Tips

Traveling can broaden your horizons and offer the chance to explore, but in today’s hyper-connected world, it can also make you more vulnerable to cybersecurity risks.

In this Micro Training, learn practical strategies to protect yourself from cyber threats while traveling.

0 Comments
Continue reading

Top 3 Smishing Saves

Smishing is on the rise, and to better understand how it works, we are taking a look at the top smishing saves made by super cyber-aware users.

In this Micro Training, we will look at three scenarios of smishing and examine how each user was able to spot it.

0 Comments
Continue reading

AI Vishing

Artificial Intelligence and deepfake audio are increasingly being used by cybercriminals in their scams.

In this Micro Training, we will look at a specific AI vishing scam that targets a user’s relatives.

0 Comments
Continue reading

Stalkerware

Do you feel like someone knows what you are doing online? If someone knows information about you that they shouldn’t, or mysterious apps are popping up on your device, it could be a case of stalkerware.

In this Micro Training, we will define stalkerware and explain how to identify and avoid it.

0 Comments
Continue reading

TVs and Scammers

Did you know that Smart TVs are considered IoT devices?

In this Micro Training, explore this connection further, and see how cybercriminals are taking advantage of it.

0 Comments
Continue reading

Securing Your Workspace

What do a clean desk and a strong password have in common? They both increase security!

In this Micro Training, we will explore the possible cybersecurity repercussions that come with keeping a messy workspace.

0 Comments
Continue reading

AI and Spam

Does the internet ever feel like an avalanche of never-ending content?

In this Micro Training, learn how AI content farms exacerbate this feeling, leading to intentional and unintentional misinformation spreading like wildfire.

0 Comments
Continue reading

Putting Cybersecurity First

We are going back to the basics so you can learn how to put cybersecurity first in your work and personal life.

In this Micro Training, learn eight quick and simple tips on how you can put cybersecurity first.

0 Comments
Continue reading

Pig Butchering Scams

In a pig butchering scam, cybercriminals are playing the long game to squeeze as much as they can out of their victim.

In this Micro Training, learn about how pig butchering scams work and what you need to be on the lookout for.

0 Comments
Continue reading

QR Code Phishing

Have you received an email with a QR code in it recently? Watch out! It might be a scam.

In this Micro Training, find out more about the increasingly common tactic of QR code phishing, also known as Quishing.

0 Comments
Continue reading

Fitness Scams

Often times, our fitness goals get lumped in with our New Year’s resolutions, and in the spirit of our 2024 cybersecurity resolutions, we're joining forces in this training, too.

In this Micro Training, learn more about the world of fitness scams that may be encountered along your fitness journey.

0 Comments
Continue reading

Recent News

Our business began its journey with the purchase of a personal computer back in 1992. This purchase ignited a passion with Chris Chase, our CEO, and there was no stopping its momentum. Less than one year later, he had his first IT support client (and...

Understanding IT

Get the Knowledge You Need to Make IT Decisions

Technology is constantly evolving, and keeping up can feel overwhelming. Whether you want to understand cybersecurity threats, explore automation, or learn how regulations like PCI DSS impact your business, we’ve made it easy to access clear, straightforward insights on key IT topics.

Insights to Understanding IT

Contact Us

330 Pony Farm Road Suite #2
Oneonta, New York 13820

Mon to Fri 9:00am to 6:00pm

support@directive.com

(607) 433-2200