Directive Analytics

Directive Blog

Directive Blogs

Directive has been serving the Oneonta area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don't Be a Hacking Target

b2ap3_thumbnail_Hacking400.jpgWhat do hackers look for when choosing a victim? While there are hackers out there that specialize in targeting high-profile companies and executives (a hacking method call whaling), most hackers do a broad sweep of the Internet and choose the easiest targets. If your company has weak network security, then you have a target on your back.

0 Comments
Continue reading

How to Catch PC Issues and Prevent Problems

b2ap3_thumbnail_notnowwhen.jpgWe are not guaranteed a life without problems. Problems will happen and your plans will be ruined (okay, it's not ALWAYS that bad!). While you can't totally eliminate problems from life, you can greatly reduce them by being proactive. This proactive problem solving approach also works great with technology!

0 Comments
Continue reading

Power Outage Protection with UPS

b2ap3_thumbnail_PowerOut400.jpgOne shocking IT scenario that we regularly encounter is expensive computer hardware plugged into inexpensive power strips. Power strips are adequate if you need a few extra outlets for your kitchen appliances, but if you want to protect the computer hardware that is mission critical to your business, like servers and NAS devices, then you will need a solution that is more powerful.

0 Comments
Continue reading

Your Computer Hardware is Built to Last

b2ap3_thumbnail_Hardware400.jpgWe understand your desire to upgrade to a new computer, using the latest technology has its advantages. Although, upgrading because your old PC has "worn out" may be an inaccurate assessment. There are many reasons why a computer's performance slows down, but it is doubtful that hardware deterioration is a cause. This is because PC hardware is built to last.

0 Comments
Continue reading

3 Security Issues that Put Your Business at Risk!

b2ap3_thumbnail_Security400.jpgEverybody has a weakness; Superman has Kryptonite, the Wicked Witch of the West had water, and the Death Star had a womprat-sized exhaust port. Character weaknesses make for solid storylines because they drive conflict. Your company has its own set of vulnerabilities that you may not know about, and unlike stories, conflict in business is not a good thing. Here are a few of the lesser known IT weaknesses, and what you can do to resolve them.

0 Comments
Continue reading

An Old Internet Explorer Can Harm Your PC

b2ap3_thumbnail_InternetExplorer-logo.jpgIf you never connected your PC to the internet, then you could get away with not updating any of your software. Do to the changing nature of the internet, new security threats are constantly attacking your computer. Internet browsers are your door to the internet and require constant updating in order to keep your PC protected from these threats.

0 Comments
Continue reading

4 Practices to Speed up a Slow Computer

b2ap3_thumbnail_snailslow400.jpgThere are dozens of PC tricks and procedures you can try in order to speed up a slow computer. Before you do something drastic like open your case and tinker around with the hardware, or reinstall your OS, or even call your friendly IT techs for a service call, you may first want to adopt these four PC practices that are guaranteed to boost your computer's performance.

0 Comments
Continue reading

Improve Employee Productivity with Universal Threat Management

b2ap3_thumbnail_productivitygoup400.jpgThe concept behind company time is simple enough: you are employed, and therefore expected to do whatever you agreed upon while "on the clock." To be fair, you are given a few breaks to attend to personal matters; yet, as easy to grasp as this seems, the average employee wastes two hours of company time per day on the internet.

0 Comments
Continue reading

Web Design Best Practices for Content Presentation

b2ap3_thumbnail_363986.jpgIn the past 10 years, the number of people who use the internet in their daily life has skyrocketed. As a result, many jobs now include adding or writing content that is ultimately posted online. Your business depends on your ability to create cohesive, complete information presented in an aesthetically pleasing, and memorable way.  How can we know if the content we are writing is presented in the appropriate fashion? There are a few best practices to keep in mind that will keep users coming back to your site, time after time.

0 Comments
Continue reading

Free Up Bandwidth with Internet Monitoring

b2ap3_thumbnail_2013time.jpgInternet bandwidth is a precious resource, and the amount your office can use is limited to whatever internet service package your company is signed up for. If your office is running short on bandwidth, then you will need to upgrade to a bigger package, which will be expensive. Before you spend money on upgrading, you should consider internet monitoring.

0 Comments
Continue reading

DIY IT Repair Hinders Business Growth

b2ap3_thumbnail_littlemanonkeyboard.jpgYou are confident that your employees are good at problem solving, this is why you hired them. Your staff may even thrive on finding solutions with limited resources and keeping operations within budget. It is wonderful that you have surrounded yourself with skillful people, but using your bright staff to fix an IT problem may hurt your business in the long run.

0 Comments
Continue reading

Staying In Business: Backup Business Continuity

b2ap3_thumbnail_bdrbandaid.jpgStep back from your monitor for a moment and take a look at your business. Customers from all over the Upstate New York area and beyond are being helped. You have an inbox full of email from countless prospects and clients, and your activity on the world wide web is literally connecting you around the world. This complex coordination of of resources and people in front of you is called logistics.

0 Comments
Continue reading

Drew Carey Wishes he had BDR

b2ap3_thumbnail_DrewCarey.jpgThe expression on Drew's face is a perfect picture of what data loss looks like. There is nothing more frustrating than spending an entire day on a project, only to have it all disappear with a system error. Drew's mistake was that he was saving all of his work directly on his laptop. Not only is his work susceptible to a hard drive failure and the computer crashing, but his laptop is also at risk of being stolen along with all of his personal data.

0 Comments
Continue reading

Managed IT Service Prevents Costly Repairs

b2ap3_thumbnail_repairs.jpgDo you have a plan in place for when your technology breaks or crashes? As wonderful as computers are, the hardware wears down, and software can become buggy and crash. Having a go-to plan in place for IT hiccups, will save you time and frustration from having to react to a problem and scramble to find a fix.

0 Comments
Continue reading

Own Your Website! Register Your Domain Correctly

b2ap3_thumbnail_yourdomainname.jpgDomain registration is a fairly simple procedure. Virtually every web hosting company has a step-by-step process where you enter your information, create a website URL, decide how long the registration period will be, pay for everything, and then forget about it. As simple as registration can be, if done incorrectly it can come back to haunt you.

0 Comments
Continue reading

Is Your Network Monster-Proof?

a1sx2_Thumbnail1_fuzzmonster.jpgAre you ready for Halloween? Beyond having a cute costume picked out; we want to know if you are prepared for a disaster brought on by ghosts, ghouls, goblins, or ogres. Battling the dark legions can escalate quickly into a full-blown crisis, and as your IT Company, we view it as our duty to help you prepare for the worst.

0 Comments
Continue reading

Password Vulnerability and Security, Part 1

a1sx2_Original1_lockeddownlaptop.jpgA weak password makes identity theft easy for hackers. You would never paint your social security number on the side of a truck and drive around town, but if your password is shared, left out in the open, and used on multiple sites, then you might as well ride shotgun with the Lifelock CEO (his SSN has been stolen 13 times).

0 Comments
Continue reading

Troubleshooting a Wet Cell Phone

a1sx2_Original1_sinkingphone.jpgStories about smartphones getting wet usually have a funny twist to them, unless it is your own device, in which case the story is comparable to a Shakespearean tragedy. Whether your toddler threw your iPhone in the toilet, or your Galaxy S3 took up swimming, there are a few tricks you can try before dropping cash on a new device.

1 Comment
Continue reading

The Quest for the Paperless Office

a1sx2_Original1_paperlessoffice10.jpgEver since the first microfilm machine was rolled off the line 100 years ago, mankind has been striving to achieve the paperless office. If you are too young to remember using microfilm, think of an arcade cabinet, except, instead of Mortal Kombat, documents battle it out over a projected screen. Thankfully, we have come a long way in 100 years.

0 Comments
Continue reading

Pirates Ahead, Be Ye Warned!

a1sx2_Original1_pirateman.jpg"Ahoy ye swabbies! We be takin' heavy damage on the starboard side! Brace ye-selves for impact! Arrrr!" That is pirate talk for "Hello fellow co-worker. Our CRM tools crashed again and IT needs to reboot the server." September 19th is Talk like a Pirate Day!

0 Comments
Continue reading

Recent News

Our business began its journey with the purchase of a personal computer back in 1992. This purchase ignited a passion with Chris Chase, our CEO, and there was no stopping its momentum. Less than one year later, he had his first IT support client (and...

Understanding IT

Get the Knowledge You Need to Make IT Decisions

Technology is constantly evolving, and keeping up can feel overwhelming. Whether you want to understand cybersecurity threats, explore automation, or learn how regulations like PCI DSS impact your business, we’ve made it easy to access clear, straightforward insights on key IT topics.

Insights to Understanding IT

Contact Us

330 Pony Farm Road Suite #2
Oneonta, New York 13820

Mon to Fri 9:00am to 6:00pm

support@directive.com

(607) 433-2200