Directive Analytics

Directive Blog

Directive Blogs

Directive has been serving the Oneonta area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Bury Your Treasured Files With TrueCrypt

b2ap3_thumbnail_tcsquare400.pngHow vulnerable is your sensitive data on your PC to unwanted threats? Can anyone who gains access to your computer be able to easily find this data and do whatever they wish to it? If these files were encrypted and then hidden from view, you can neutralize the possibility of it happening.

0 Comments
Continue reading

Are you prepared for the Zombocalypse?

b2ap3_thumbnail_zombie400.jpgAre you going to make sure your machete is handy and start boarding up your windows for the coming of George Romero's slow-moving walking dead, or will you load up on ammo and lock yourself in a bunker for the more active and feral Max Brooks-type zombies? What about your data, like your Zombie Survival Guide E-book? Is it safe?

0 Comments
Continue reading

Know the Risks of the Internet before Logging On

b2ap3_thumbnail_virus400.jpgDriving a powerful car can be an exhilarating experience, but if you have no idea what you're doing, it can be dangerous. This is why governments require drivers to pass a safety class before they can speed down the road encased in steel and glass. The Internet is also a powerful tool that can be exciting, beneficial, and dangerous.

0 Comments
Continue reading

What Goes on in Your Office at Night?

b2ap3_thumbnail_Camera400.jpgWhen you go home for the night and lock your office door, what happens in your office under the cover of darkness? During the day, you are present to monitor what goes on and control the chaos, but what kind of monitoring and controls are in place for your office at night?

0 Comments
Continue reading

Can a Cell Phone Kill Switch Deter Theft?

b2ap3_thumbnail_KillSwitch400.jpgAs smartphone ownership continues to rise (175 million cellphones sold last year in the US), so too does smartphone theft. Take San Francisco, CA as an example, half of all robberies reported last year were phone-related. To help curb this trend, crime fighting agencies are seeking help from phone manufacturers in developing a smartphone kill switch.

0 Comments
Continue reading

What Can Darth Vader Do For Your Business?

b2ap3_thumbnail_vader400.jpgAs every good Stars Wars fan is well aware, May 4th is Star Wars Day (May the fourth be with you). As an IT company, we love all technology, especially tech from a long time ago in a galaxy far far away. Therefore, let us take a moment and look at the most famous technology from Star Wars, Darth Vader.

0 Comments
Continue reading

Death Star Technology Services

b2ap3_thumbnail_DeathStar1-400.jpgMay 4th is Star Wars Day (May the fourth be with you). In celebration of our favorite space saga, we thought that we would write about our dream job; providing IT support for the mother of all technologies, the Death Star from Star Wars.

0 Comments
Continue reading

Network Firewalls Explained

b2ap3_thumbnail_Firewall400.jpgYou know that having a strong firewall is a key component to having strong network security, but do you how firewalls work? Firewalls take their name from the protective barriers that keep buildings and engines safe from fire. While it’s unlikely that your computer is in danger of incineration, a firewall does protect it from cyber-threats; here’s how!

0 Comments
Continue reading

Don't Be a Hacking Target

b2ap3_thumbnail_Hacking400.jpgWhat do hackers look for when choosing a victim? While there are hackers out there that specialize in targeting high-profile companies and executives (a hacking method call whaling), most hackers do a broad sweep of the Internet and choose the easiest targets. If your company has weak network security, then you have a target on your back.

0 Comments
Continue reading

4 Oversights that will Harm Your Network

b2ap3_thumbnail_SecurtyRisk400.jpgWith all the attention that hackers receive, you would think that they are solely responsible for every network security breach, but the truth of the matter is that most damages to company networks are due to negligence. Here are the four most common IT security oversights that can lead to major damages to your network.

0 Comments
Continue reading

Could Bitcoins become the Next World Currency?

b2ap3_thumbnail_bitcoin400.jpgThe Internet has given us many new and exciting ways to transact business. The newest frontier is in regards to a virtual currency called Bitcoins that is unregulated and accepted by Internet users worldwide. Bitcoins may be too much of a novelty for your business to take seriously, but that does not discredit it as an interesting investment opportunity.

0 Comments
Continue reading

Hackers are Taking Advantage of Technology Improvements

b2ap3_thumbnail_HackerSkull400.jpgUsing strong passwords is a critical part of keeping your network protected. For years we have been preaching the need to use complex passwords, along with the need to use different passwords for different accounts. As the technology of crackers (not the salted kind) improves, the need to be diligent about password security intensifies.

0 Comments
Continue reading

The 3 Biggest Reasons PC Upgrades are Avoided

b2ap3_thumbnail_OldComputer400.jpgAs an IT company, we get excited about the newest computer hardware and software. We try to convince everybody that upgrades are great, but some people cannot be shaken from their devotion to what is familiar and refuse to upgrade their tech. In our experience, here are the three biggest reasons why upgrades are avoided.

0 Comments
Continue reading

Who Can You Trust with Your Data?

b2ap3_thumbnail_Trust400.jpgYour company's information on your network is labeled as "sensitive" for a reason. The files on your servers contain the secrets to your success, along with financial records about you, your employees, and your customers. When trusting sensitive data to a third party, make sure that it is someone you trust.

0 Comments
Continue reading

In Windows, Hibernation Isn’t Sleep

b2ap3_thumbnail_Sleep400.jpgThe Windows family of operating systems (OS) have different power-saving modes for users to take advantage of if they find themselves away from their workstation or mobile computing device. Windows 8 features three: Sleep, Hibernate, and Hybrid Sleep.

0 Comments
Continue reading

Critical Updates on the Way for Windows, Office, and IE

b2ap3_thumbnail_Updates400.jpgMicrosoft will be dishing out multiple security updates this week, including four critical patches for Windows, Internet Explorer, Office, and SharePoint Server. Critical updates are considered Microsoft's highest threat rating, so installing these patches is important.

0 Comments
Continue reading

3 Benefits of Using Server Racks

b2ap3_thumbnail_ServerRack400.jpgThe largest and most important components of your network is your servers. Technically, you can line up your servers on a big table and they will work, but if you want to get the most out of your servers, then we recommend using a server rack.

0 Comments
Continue reading

3 Security Issues that Put Your Business at Risk!

b2ap3_thumbnail_Security400.jpgEverybody has a weakness; Superman has Kryptonite, the Wicked Witch of the West had water, and the Death Star had a womprat-sized exhaust port. Character weaknesses make for solid storylines because they drive conflict. Your company has its own set of vulnerabilities that you may not know about, and unlike stories, conflict in business is not a good thing. Here are a few of the lesser known IT weaknesses, and what you can do to resolve them.

0 Comments
Continue reading

Business Executives are Targeted with Whaling Scams

b2ap3_thumbnail_Whaling400_20130217-211452_1.jpgEven if you are using the best antivirus software available, sensitive company data can still be compromised by users falling victim to phishing scams. Phishing is a tactic where scammers trick users into giving out their personal information, usually through deceptive spam e-mails. Looking to fry bigger fish, scammers are trying their luck at whaling.

0 Comments
Continue reading

Don’t Underestimate the Hackers

b2ap3_thumbnail_Hacker400.jpgIn 2011, Ponemon Research surveyed 583 U.S. businesses and found that 90% of respondents reported that their company's computers had been breached at least once by hackers within the past year; 77% of these companies felt like they were attacked multiple times within the same year. If your SMB does not have any protection from hackers, then your sensitive data is at serious risk.

0 Comments
Continue reading

Recent News

Our business began its journey with the purchase of a personal computer back in 1992. This purchase ignited a passion with Chris Chase, our CEO, and there was no stopping its momentum. Less than one year later, he had his first IT support client (and...

Understanding IT

Get the Knowledge You Need to Make IT Decisions

Technology is constantly evolving, and keeping up can feel overwhelming. Whether you want to understand cybersecurity threats, explore automation, or learn how regulations like PCI DSS impact your business, we’ve made it easy to access clear, straightforward insights on key IT topics.

Insights to Understanding IT

Contact Us

330 Pony Farm Road Suite #2
Oneonta, New York 13820

Mon to Fri 9:00am to 6:00pm

support@directive.com

(607) 433-2200