Directive Analytics

Directive Blog

Directive Blogs

Directive has been serving the Oneonta area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 5 Ways to Easily Identify a Phishing Attack

If you’ve been reading this blog for any length of time, you’ve seen us reference a phishing attack. Whether you are being asked by some supposed Nigerian prince to fork over money or you are getting an email by what seems to be your bank that directs you to download an attachment, you are probably a potential victim of a phishing scam. The difference between being a potential victim and a victim is knowing how to identify it. Today, we’ll give you five ways to identify a phishing message so that you—or your company—won’t be scammed.

0 Comments
Continue reading

How to Spend Less Time in Your Email Inbox

While email is an indispensably useful tool in the office, it can quickly become a time-sink if finding the right messages to read and respond to becomes an overbearing responsibility. Fortunately, there is a simple solution to remedy this that, after spending some time learning about the full capabilities of your email platform, can once again make your email the useful tool it is meant to be.

0 Comments
Continue reading

Don’t Get Phished Out of Your Stimulus Payment

Wherever there is money, there are scammers. So it may not be a big surprise that scammers are out en masse trying to get between you and your federally mandated stimulus money.  It’s bad enough that we’ve already seen a couple of phishing scams using the COVID-19 pandemic that are designed to help hackers get into accounts they have no business in, now that these scammers know that people are getting cash, the scams are kicked up a notch.

0 Comments
Continue reading

Efficient IT Goes a Long Way

With the COVID-19 pandemic causing businesses to rethink their operational strategies, many businesses have had to make a quick digital transformation. Many businesses have accomplished this before the stay-at-home orders, but with employees working from home, we thought this was the perfect time to take a look at four tools businesses can use to improve their work-from-home strategies. 

0 Comments
Continue reading

How to Get Rid of an Old Computer Without Sacrificing Security

Time passes, and things get old. This is especially true of technology, as new and better options are developed and released all the time. Sooner or later, you’re likely to find yourself in need of a new system… The only question left is how to get rid of the old one.

0 Comments
Continue reading

Tip of the Week: Email Signature Strategy

The email signature is an often-overlooked opportunity for an organization to appear that much more professional. Here, we’ll look into how to set up your email signature in Gmail.

0 Comments
Continue reading

How to Leverage Parallelism to Up Your Productivity

As unfortunate as it is to hear, science has pretty definitely kyboshed the notion that multitasking works. However, while multitasking may not actually have any true benefits to productivity, this doesn’t mean that there aren’t any ways to accomplish more in less time. Today, we’ll give you a better option than multitasking, a process known as parallelism.

0 Comments
Continue reading

How Can You Find that Lost Smartphone?

One of the major aspects of smartphones is how portable they are. Thanks to them, business professionals can be productive while out of the office, no matter where they are. Unfortunately, this also means that they have more of an opportunity to lose their devices, along with the data they contain. If the device is Android-based, then you can alleviate this trouble thanks to built-in features that can help you find it.

0 Comments
Continue reading

How to Frame Your Marketing Around Major Holidays

Whenever a major holiday is coming up, you’re likely confronted with multiple reminders of it in your daily lives. You may see commercials on TV, receive emails from companies, get flyers in the mail. You’ll see specialized packaging for brands you buy every day that reflects the upcoming holiday. It makes sense why companies are doing this - holidays celebrated by the general population give a business an excuse to get in contact with the consumer. And, this often leads to an uptick in sales.

You can do the same for your small business. The key to succeeding with holiday marketing is framing your marketing correctly in terms of your language and the imagery you use.

0 Comments
Continue reading

Getting to Know Technology: Breadcrumbs

In the fairy tale of Hansel and Gretel, the titular characters decided to leave a trail of breadcrumbs behind them, so they could find their way back home. While this strategy didn’t work out very well for the siblings, the same concept is used in computing today. We even refer to it as breadcrumb navigation in honor of the German fairy tale.

0 Comments
Continue reading

Your Emails Won’t Be Secure Without these Safeguards

Are your employees putting your organization’s security at risk due to poor email practices? This is a question that all business owners need to consider--especially if you deal in sensitive information. We recommend that all businesses utilize a two-pronged approach to email security, including both technology measures to secure communications on the technical side and training to secure on the human side.

0 Comments
Continue reading

What Makes Managed Services Worth It?

Most modern businesses depend on technology in at least some capacity, whether it’s for productivity, efficiency, or even security purposes. Without access to important data and applications, your business is a shell of its former glory. This is why it’s so important for businesses like yours to implement managed IT services. It certainly beats having untrained employees maintain your crucial computing systems!

0 Comments
Continue reading

CPT: When Faced With a Choice, We Have Twix Up Our Sleeve! [Video]

With all of the debate going on as to whether the left or right TWIX is superior in the media today, we decided to settle this for ourselves. The conclusion is that the Twix Cookie dessert recipe we had today is in fact the top Twix! Don’t get us wrong, the real-deal candybar is great... BUT when you don’t have to choose a side, start a debate, lose friends AND you get the entire gooey cookie to yourself; is there really a comparison?

Find out for yourself with the recipe below and let us know what part of the cookie was your favorite!

0 Comments
Continue reading

Tech Term: Encryption Key

It is no secret that security is an absolutely crucial part of computing in the modern era. Data can very fairly be called the most valuable currency today, which means it needs to be protected. One way to do this is through the use of encryption keys. In this Tech Term, we’ll go over how these keys can protect your data, and how they do so.

0 Comments
Continue reading

Claim and Manage Your Business Online with Google My Business

You’ve probably noticed that when you search for a particular business using words like or similar to “near me,” Google will display three business options at the top of your search results, and then will load additional businesses once you click “More places.” Remember - people in your area that are looking for a business like yours will probably be doing exactly that. How can you make sure you are in those top three results?

0 Comments
Continue reading

Facebook Makes Two-Factor Authentication Easier

If you use Facebook, you likely have a lot of personal information stored there. If you use it for your business, then your professional reputation also partially relies on what you put into the social network. If you aren’t protecting your Facebook account, you could be at risk for identity theft or worse. That’s why using two-factor authentication on your social media accounts is becoming more important than ever.

0 Comments
Continue reading

Getting to Know Technology: Plug-In

The Internet is an amazing tool in and of itself, but like many tools, it can sometimes work better if other tools are used alongside it. These additional tools are called plug-ins. Here, we’ll discuss what a plug-in is, and how they all help us use the Internet a little better.

0 Comments
Continue reading

5 Ways to Make IT Security Top of Mind

The most significant resource any business has is their team. Yes, unfortunately, many companies view their staff as disposable cogs, to be worn down and tossed once every ounce of passion for their job has been drained away. Some of these businesses even manage to turn a profit.

Tags:
0 Comments
Continue reading

Are You Ready for the GDPR? [FREE DOWNLOAD]

GDPR was introduced by the European Union, but it applies to businesses all over the world, especially if you could potentially collect personal data from a person residing within the EU. We feel, as a business, it’s important to safeguard personal data of your prospects and customers, and think the GDPR is a big step in the right direction to provide transparency and understanding to your users.

0 Comments
Continue reading

Recycling eWaste is Easier Than Ever

At Directive, we live, speak, and breathe technology and our office is filled with the latest and greatest. However, when you use the latest and greatest, something has to happen to the old and broken. Electronic Waste (eWaste) is becoming an increasing environmental problem as we dump millions of unused products into landfills. Directive, as an industry leader, doesn’t send our old tech to the dump, we recycle it... and encourage that you do too!

0 Comments
Continue reading

Recent News

Our business began its journey with the purchase of a personal computer back in 1992. This purchase ignited a passion with Chris Chase, our CEO, and there was no stopping its momentum. Less than one year later, he had his first IT support client (and...

Understanding IT

Get the Knowledge You Need to Make IT Decisions

Technology is constantly evolving, and keeping up can feel overwhelming. Whether you want to understand cybersecurity threats, explore automation, or learn how regulations like PCI DSS impact your business, we’ve made it easy to access clear, straightforward insights on key IT topics.

Insights to Understanding IT

Contact Us

330 Pony Farm Road Suite #2
Oneonta, New York 13820

Mon to Fri 9:00am to 6:00pm

support@directive.com

(607) 433-2200