Directive Analytics

Directive Blog

Directive Blogs

Directive has been serving the Oneonta area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Stolen Laptop Contingency Plan

thief holding laptop

We've been talking a bit about the benefits of going mobile, especially for business owners who want to get more done. One of the best benefits of a laptop computer is portability, which leads into its greatest weakness; it's easy to steal.

According to the FBI, over 1 million laptops are stolen each year. If you are using your laptop for business, you'll want to take action ahead of time and employ some protective countermeasures to keep your business safe. We'll even go over some ways you can recover your stolen laptop.

0 Comments
Continue reading

Spam: The Art of Deception

overflowing mailbox

If you use email, you've probably seen spam. If you think we're talking about a canned meat product, and are wondering how it relates to email, then we envy you. For everyone else, saying your inbox probably has a little spam is a dramatic understatement.

Spam comes in several different flavors; ranging to inappropriate solicitations to unwanted gibberish to carefully coordinated scams. We're going to go over one of these tricky spoofs that is known to fool users.

0 Comments
Continue reading

Spam, Seriously?

email inbox folders spam

Ever sift through all that junk mail and wonder if you are in the wrong line of work? Obviously the spam industry is working for somebody, or else it wouldn't still be running your inbox rampant with unsolicited junk, right? Spam is more than just a nuisance for small businesses. Hit the jump to find out why.

Tags:
0 Comments
Continue reading

Securing your Wi-Fi is More Important Than Ever

data lockDoes your Wi-Fi require a secure password to allow users to access your network with their mobile devices? And no, the word "password" is not a suitable password. If your wireless network is easy to gain access to, you are opening up your sensitive data to anyone within range.

0 Comments
Continue reading

Scareware - The Latest Trend in Cyber Frauds and Malware

laptop that says danger

Computer viruses and malware have been around for a long time, and cybercriminals have always tried to package their malevolent doings under a veil of deception. One method that has been in place for a while now is called scareware. Often disguised as something that appears to want to help your computer, scareware will scam users into paying for a service that isn't beneficial.

0 Comments
Continue reading

Removing the Hidden Data in Microsoft Word

magnifying glass over bookMost people might not realize this, but a Microsoft Word Doc can retain a lot of information pertaining to the history of the document, your personal information, annotations, and other invisible elements. This can be a huge security risk! Read on to learn how to remove that extra information.

0 Comments
Continue reading

Remote Support Improves Everything

person on headset

For some small businesses around Upstate New York, administrative IT tasks and computer support are done the old fashioned way; either over the phone or on-premise. These traditional methods are a major waste of time and money, and can lead to plenty of unproductive behavior very quickly.  Today we're going to examine how remote technical support can benefit businesses.

0 Comments
Continue reading

Ransomware Wants You to Pay Up

suitcase full of moneyEver since the Internet became a household commodity, many viruses and malware have donned a social mask; causing harm to computers and data but doing so by deceiving the user. One form of this is ransomware, a type of malware that locks users out of their computer until they pay a toll.

Tags:
0 Comments
Continue reading

Prevent your Web Browser from Storing Passwords

typing in username and passwordFor sites you need to log into often, having your browser remember your password can save you time logging in, especially if you are using secure passwords that you might need to look up otherwise. There are circumstances where you might want to manage what personal information gets stored in your web browser.

0 Comments
Continue reading

Please Don't Pass the Spam

can of spam

Why Upstate New York Businesses should all say "I Don't Like Spam!"

Spam wastes company time and harbors viruses and malware that can quickly infect your entire network. It can bog down your network and your mail server.

0 Comments
Continue reading

Personal Mobile Tech: The Fine Line Between Freedom and Security

person using mobile phone

Ever since the mid-1990s employees have been taking advantage of personal gadgets to help them get work done faster. Remember the PDAs and Palm Pilots from a decade and a half ago? Even though many companies weren't quick to establish policies to protect corporate data, tech savvy users were able to sync contacts, schedules, email, and company files to their mobile device. These days, mobile devices are in the hands of many more users, but there are ways to provide security without sacrificing your employees rights to their personal device.

0 Comments
Continue reading

Over 45 thousand Facebook Logins Stolen by a Worm

typing in password

On the topic of identity theft, social media accounts are becoming a high target for hackers, especially for spreading malicious viruses. To some, losing control over their Facebook or Twitter accounts could be just as devastating as having their credit card stolen. Trouble is, for many users, having one login account stolen means hackers have access to their other accounts too.

0 Comments
Continue reading

Mobile Botnets and Zombie Phones

mobile virusOnce considered impossible, the threat of malware on mobile devices is becoming a serious reality. Malware used to just be a plague to PC's, however, in the last few years we have seen a rise in Mobile Malware specifically the threat of Mobile Botnets.

0 Comments
Continue reading

Know These 4 Intruders that Threaten your Business

thief climbing in windowIn order to best serve their clients, companies need to have a comprehensive program in place to help them defend their systems from malware attacks on their company's infrastructure. These attacks can have a devastating effect on a business's continuity, so having an appreciation for exactly what types of adversaries your company is up against is important. There are several types of potential intruders that you should be aware of.

0 Comments
Continue reading

Is your Business a Victim of Email Spoofing?

evil cartoon man taking mailIs your email sending out mass-mail spam messages? Have you ever received a complaint about sending unsolicited ads or obvious spam messages? Have you ever received bounced emails by the boatload that look like they have been sent from your own account, even though you know you didn't send them?

Tags:
0 Comments
Continue reading

Is Big Brother Watching You, and Do You Mind?

person peaking through blinds

Internet privacy is no new issue. Between malicious hackers trying to breach private information, governments trying to regulate it, and organizations trying to track as many metrics as they can, the Internet continues to chug along for the most part just fine. Are YOU concerned about Internet privacy?

0 Comments
Continue reading

How Upstate New York Small Businesses Reduce Computer Issues with the Bridge Metaphor

bridge

Does it seem like every day your network is suffering from a different issue? How about the same old issues that keep coming back? Think about how much time is wasted every day while you and your employees have to cope with viruses, malware, and oddball technology issues. What if we told you there is an easy solution that will eliminate 99% of these problems?

0 Comments
Continue reading

How to Prepare for Laptop Theft

lock on top of keyboard

We saw a statistic the other day that really boggled our minds. LoJack, a security firm that specializes in theft, estimates that two million laptops are stolen each year. That's about a one in ten chance that your laptop will fall into someone else's hands. What can you do to prevent that?

0 Comments
Continue reading

Don't Let a Storm Put You Out of Business

lightning striking over cityNature can be pretty impressive. It can interrupt the day-to-day operations of businesses, cause major damage, and cost your business in expensive downtime. Having a good business continuity plan (and ensuring you have it set in place) can make or break your company when mother nature comes knocking at your door.

0 Comments
Continue reading

Data Theft Prevention 101

file folder with key unlocking it

We can never stress enough to our clients how important their data is.  There are plenty of ways data can become lost, but the one scenario that nobody ever likes to talk about is internal data theft.  That's right; businesses can suffer from their own employees stealing data.  Now, this doesn't mean that all or any part of your staff is plotting to expose company secrets or distribute your leads to competitors, but a few precautions can be taken to just ensure that it never happens.

0 Comments
Continue reading

Recent News

Our business began its journey with the purchase of a personal computer back in 1992. This purchase ignited a passion with Chris Chase, our CEO, and there was no stopping its momentum. Less than one year later, he had his first IT support client (and...

Understanding IT

Get the Knowledge You Need to Make IT Decisions

Technology is constantly evolving, and keeping up can feel overwhelming. Whether you want to understand cybersecurity threats, explore automation, or learn how regulations like PCI DSS impact your business, we’ve made it easy to access clear, straightforward insights on key IT topics.

Insights to Understanding IT

Contact Us

330 Pony Farm Road Suite #2
Oneonta, New York 13820

Mon to Fri 9:00am to 6:00pm

support@directive.com

(607) 433-2200