Directive Analytics

Directive Blog

Directive Blogs

Directive has been serving the Oneonta area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

4 Giveaways that Your Email is Trying to Trick You

b2ap3_thumbnail_avoid_phishing400.jpgOne of the most common ways computer viruses spread is through email. Most of the malware-carrying messages are caught in your account's spam filter, so you don't have to worry about those. It's the malicious emails that make it to your inbox that you need to be mindful of, and phishing emails are by far the most dangerous.

0 Comments
Continue reading

What to do with Your Old PC

b2ap3_thumbnail_pcrecycler400.jpgIt's nice to get a shiny new computer that's fast, powerful, and has all the latest features. Before you install your new machine, you have to make a decision about what to do with your old one. Your old computer has been a faithful friend over the years so you may feel bad pitching it to the curb; instead, consider giving it a new home.

0 Comments
Continue reading

The 50 Year History of Our Industry

b2ap3_thumbnail_msphist400.jpgWorking in the IT industry means embracing change and the latest technology trends. Doing the same thing day-in and day-out is a luxury we don't have, and frankly, sounds kind of boring. Since computers were first invented, there's been a need to service them. Here's a look at how the IT service industry has changed over the past 50 years.

0 Comments
Continue reading

The 4 Best Things about Remote Support

b2ap3_thumbnail_rsupport400.jpgIf you've never taken advantage of remote support to remedy an IT problem, then you're likely doing IT support the hard way by having a technician physically take care of every issue. While it's always nice to chat with your friendly tech, you may be able to save yourself a whole lot of time and money by taking care of the issue with remote support.

0 Comments
Continue reading

4 Data Loss Scenarios that can Happen to You!

b2ap3_thumbnail_dataend400.jpgYou may feel like your computer network is immune to data loss, but according to a study by Blackblaze.com, 46% of users experience data loss every year. Whether it's from something big like a natural disaster, or minor like improperly removing a flash drive, every form of data loss is costly and can be prevented with a data backup plan.

0 Comments
Continue reading

The 4 Fundamentals to IT Security

b2ap3_thumbnail_secure400_20131101-174011_1.jpgAt a recent security event, VP of Gartner Neil MacDonald broke down the fundamentals of IT security into four categories, "Information security was never about device lockdown, or dictating applications, or building firewalls. It was always about protecting the confidentiality, the integrity, the authenticity, the availability of information." Here's a closer look at these four security qualities.

0 Comments
Continue reading

Protect Your Business with Intelligent Surveillance Cameras

b2ap3_thumbnail_cam400.jpgThe world you do business in is a pretty dangerous and messed up place, and things always seem to be getting worse. Thankfully, security technology is improving, which helps offset the risks of living in a perilous world. You can take advantage of these security improvements by installing intelligent surveillance cameras for your business.

0 Comments
Continue reading

3 Ways Homeownership and Your IT Infrastructure are Similar

b2ap3_thumbnail_nethouse400.jpgYour company's technology infrastructure is made up of several complex systems that all work together in order to keep your business running smoothly. Your IT infrastructure functions much in the same way as another type of infrastructure, your house. It's surprising how much you can learn about computer networking by looking at "This Old House."

0 Comments
Continue reading

Businesses Still Prefer Windows 7

b2ap3_thumbnail_eightseveny400.jpgWe are in a unique time of Windows OS transitions. The redesigned Windows 8 has been out for one year, and the first major update to it (Windows 8.1) was just released. Additionally, the popular Windows XP expires in April, forcing everybody to upgrade and choose between Windows 7 and 8. Which OS will your business go with?

0 Comments
Continue reading

Use VoIP to Feel like a Superspy

b2ap3_thumbnail_phoney400.jpgRemember when a family's home had only one phone line and someone else would pick up the phone in the middle of a call? There would be a click, a pause, the caller would then ask, "Is someone on the other line?" A hasty hang-up click would then follow. With VoIP, you can listen in on phone calls without being detected!

0 Comments
Continue reading

A Fax Machine Can Hinder Productivity

b2ap3_thumbnail_fserv400.jpgFirst introduced by Xerox back in the 1964, the fax machine, or Long Distance Xerography as it was called then, was the hottest office productivity tool of its day. This new technology saved workers from having to send documents via mail, which dramatically improved office communications. Nearly fifty years later, and the fax machine has become a hindrance to office productivity.

0 Comments
Continue reading

Improve Productivity and Protect Your Business with UTM

b2ap3_thumbnail_timewaste400.jpgYou can connect to over 2.7 billion people over the Internet, but you probably shouldn't. There are many people on the Internet with bad intentions, along with several websites that can harm your business. With a Unified Threat Management (UTM) tool, you can protect your business by filtering out the worst of the web.

0 Comments
Continue reading

3 Data Backup Options for Your Business

b2ap3_thumbnail_bu1-400.jpgWhat would happen if your business experienced a disaster and your sensitive information was erased? If you don't have a business continuity plan in place that includes data backup and recovery, then it's highly unlikely your company will survive. To protect your business, you will want to consider and choose one of these three backup solutions.

0 Comments
Continue reading

What Does a Fully Realized BYOD Environment Look Like?

b2ap3_thumbnail_bywowd400.jpgThe growing popularity of employees bringing in their own devices into the workplace (BYOD) is challenging the traditional model of IT for businesses. Many companies are embracing BYOD and adapting their IT networks accordingly. With the way things are trending, it's important to ask yourself where all of this is heading, and consider what a fully realized BYOD environment will look like.

0 Comments
Continue reading

Is a Paperless Office Possible?

b2ap3_thumbnail_smartpaper400.jpgWe are doing business in a digital world. Technology has become so prevalent that the employee who pulls out a notebook at a meeting is now the odd man out. Yet, you will still find dated paper-consuming devices in modern offices like fax machines. Is it possible for an office to go completely paperless?

0 Comments
Continue reading

4 Tips to Build a Network Jigsaw Puzzle

b2ap3_thumbnail_puzman400.jpgYour IT infrastructure is a lot like a puzzle. There are many pieces of technology that connect to form one big solution. If just one piece of the puzzle is missing, then the picture is incomplete and the solution will not work properly. Good thing we're great at piecing together IT puzzles!

0 Comments
Continue reading

5 Personnel Expenses Saved By Outsourcing IT

b2ap3_thumbnail_thisguy400.jpgIt's convenient to have an in-house IT technician. If your computer freezes up, you can call the IT department and they will swoop in and save the day. This is how in-house IT is supposed to work, but it's hard to hire anyone that's 100% reliable. We think it's actually more advantageous to outsource your IT; here are 5 reasons why.

0 Comments
Continue reading

Directive's Annual Summer Picnic

b2ap3_thumbnail_pic2_400.jpgOn Saturday August 10th, Directive had their annual summer picnic! Directive employees and their families united for an afternoon of beautiful weather, great food and friends.

0 Comments
Continue reading

Don’t Let These 3 Easy Oversights Compromise Your Network

b2ap3_thumbnail_lockblu400.jpgThere is a common misperception that strong anti-virus software is all you need to cover the security of your network. While anti-virus software is an important component to network security, there's more to it if you want a secure network. You need to also take into account the human factor, which can disable even the strongest software solution.

0 Comments
Continue reading

A Better Solution than Insurance

b2ap3_thumbnail_protect400.jpgYou can take out an insurance policy on anything, even a wedding. Insurance company Fireman will protect your big day against "nonrefundable expenses, including cancellation due to serious illness, injury, extreme weather, a missing caterer or officiate -- even a bankrupt event facility." Your businesses technology is important enough to insure; is there a policy to protect your tech?

0 Comments
Continue reading

Recent News

Our business began its journey with the purchase of a personal computer back in 1992. This purchase ignited a passion with Chris Chase, our CEO, and there was no stopping its momentum. Less than one year later, he had his first IT support client (and...

Understanding IT

Get the Knowledge You Need to Make IT Decisions

Technology is constantly evolving, and keeping up can feel overwhelming. Whether you want to understand cybersecurity threats, explore automation, or learn how regulations like PCI DSS impact your business, we’ve made it easy to access clear, straightforward insights on key IT topics.

Insights to Understanding IT

Contact Us

330 Pony Farm Road Suite #2
Oneonta, New York 13820

Mon to Fri 9:00am to 6:00pm

support@directive.com

(607) 433-2200