Directive Analytics

Directive Blog

Directive Blogs

Directive has been serving the Oneonta area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Wearables: How Yours Could Be Infiltrated

Did you know your wearable device could be silently connecting to Bluetooth devices and Wi-Fi networks you never approved of?

In this Micro Training, we’ll explore how hackers exploit these invisible connections, as well as how to lock down your wearable and keep your sensitive information out of the wrong hands.

0 Comments
Continue reading

Easy Ways to Spot Phishing Scams

Have you ever received an email that just felt…off? Maybe it promised a prize you didn't enter to win, or it tried to scare you into thinking your account was in trouble? That’s likely a "phishing" scam, and it's one of the most common tricks thieves use on the internet.

0 Comments
Continue reading

A 3-Step Process for Reducing Your Business’ Threat Surface Area

With so many devices now connecting to the Internet, decreasing your business’ threat surface area is more important than ever. Your threat surface area consists of any device that connects to your organization’s IT infrastructure, and if you’re not careful or forget a couple of oddball wearables, you could be looking at a data breach. Today, we want to go over how you can prevent that from happening.

0 Comments
Continue reading

Tip of the Week: How to Use Presenter View for Presentations

If you’re worried about presentation anxiety, or if you’ve ever experienced dry mouth, sweaty palms, or a sudden loss for words while on the spot, then you’ll be happy to know about some of the options available in modern presentation tools. One in particular, Presenter View, comes to mind, and it’s a great way to kick presentation anxiety to the curb. We’ll go over how to use Presenter View in Microsoft PowerPoint and Google Slides.

0 Comments
Continue reading

Were 16 Billion Passwords Really Leaked? Kind Of… But the Lessons are Still Important

Fairly recently, news circulated that a data breach had exposed 16 billion—yes, with a “b”—passwords for various logins, including social media accounts, virtual private networks, corporate tools, and more. Effectively, every online service imaginable was represented in this breach.

This is very bad… arguably unprecedented.

However, this impression is at best misleading. Let’s dig into the truth of the matter, while still acknowledging that there are some lessons to be learned.

0 Comments
Continue reading

Recent News

Our business began its journey with the purchase of a personal computer back in 1992. This purchase ignited a passion with Chris Chase, our CEO, and there was no stopping its momentum. Less than one year later, he had his first IT support client (and...

Understanding IT

Get the Knowledge You Need to Make IT Decisions

Technology is constantly evolving, and keeping up can feel overwhelming. Whether you want to understand cybersecurity threats, explore automation, or learn how regulations like PCI DSS impact your business, we’ve made it easy to access clear, straightforward insights on key IT topics.

Insights to Understanding IT

Contact Us

330 Pony Farm Road Suite #2
Oneonta, New York 13820

Mon to Fri 9:00am to 6:00pm

support@directive.com

(607) 433-2200