Directive Analytics

Directive Blog

Directive Blogs

Directive has been serving the Oneonta area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cloud Can Cover Most of Your Business Needs

The traditional computing structure has been under siege by cloud computing for the past several years. More businesses than ever are seeing the value in cloud-hosted applications and infrastructure, and while that may not be a huge surprise, the perceptions that the cloud can solve any of your organizational computing problems depend largely on the needs of that endeavor. Today, we will take a look at successful small business cloud strategies and tell you why they find success.

0 Comments
Continue reading

Understanding RPO and RTO

Data backup. Nobody wants to think about it until it’s too late to do anything about it. While no business ever hopes that they will be struck by a data loss incident, no business will ever regret implementing a backup on the off-chance that they ever suffer from a worst-case scenario. What are some of the most important parts of a data backup and business continuity system? We’ll start with Recovery Point Objective and Recovery Time Objective.

0 Comments
Continue reading

Should High-Speed Internet Access Be a Luxury?

With so many new technologies being introduced and innovation at the highest levels in human history, you’d think that ubiquitous access to bandwidth Internet would be high on the list of the priorities of ISPs and for residents of every jurisdiction. This doesn’t seem to be the case. With the disparity between urban and rural bandwidth Internet offerings growing by the day, we look at the causes of the gap and how companies plan on getting Internet access to people in areas where the population may be low.

0 Comments
Continue reading

How the IoT Can Be a Security Risk

The Internet of Things means a lot more than just enhanced connectivity. In particular, you’ll have a considerable security risk associated with the Internet of Things. It’s clear that the more devices accessing a network, the more risk will be associated with that network, which is where the inherent risk of the Internet of Things comes into play. How can you control the number of devices accessing your network, and thus secure your business from the Internet of Things?

0 Comments
Continue reading

Where the Internet Stands in 2018

People spend a lot of money on the Internet. From an individual standpoint, the amount the average person spends on Internet-based services is their largest expense outside of the money they spend on their residence, and perhaps their transportation costs. In order to understand the landscape of what is effectively a battle for Internet supremacy, you first have to take a look at the battlefield itself.

0 Comments
Continue reading

On-Site Backup vs. Cloud-Based Backup, Which is Better?

There’s no doubting that data backup is a critical component of any small and medium-sized business’s infrastructure. Backup and disaster recovery is important in the event that your organization experiences a death-blow in the form of a data loss disaster. Yet, there’s some debate as to whether an on-site data backup solution can be as effective as the cloud. The verdict: both are essential.

0 Comments
Continue reading

Implementing Softphones for Remote Workers Isn't a Hard Decision

One of the biggest concerns that business owners have with remote workers is being able to control and centralize communication. A worker in the office can be plugged right into the company phone system, but how does this translate to those who work from home some or all of the time?


To accommodate these concerns, there is an option to consider. When trying to equip a remote worker with the tools they will need to remain productive and collaborate with the rest of the team, try a softphone solution on a VoIP system.

To translate this tech jargon, a softphone is a phone that functions through software on a computer, using either the conventional phone line or Voice over Internet Protocol to transmit the conversation between the involved parties. Softphones, unlike many exclusively VoIP-based phones, do not require a physical device, and instead reside on any computing solution with an Internet connection. They often include a digitally-based number pad as a part of the program.

Therefore, it makes more sense to utilize softphones when equipping your remote worker to remain connected.

After all, as an economic business owner, financing new equipment is always a major consideration before implementing any decision, especially one that revolves around technology solutions. With a good VoIP solution, you can use traditional handsets like you have been used to, but you can also send and receive calls from any smartphone, tablet, laptop, or desktop.

Softphones definitely have the edge when it comes to mobility, as the worker can simply install the client to an existing mobile device and utilize an Internet connection to place or take calls. Also in favor of the softphone is their price, or lack thereof. Without the need for any specialized equipment, a softphone client can be downloaded and set to your device relatively easily. Depending on your plan, there may be costs per user, or costs per device. Therefore, you’ll want your IT provider to lay all of this out for you before you make the investment.

Since remote workers need a quick and easy solution they can access on-the-go, softphone mobile clients seem to be the best fit--but that is entirely dependent on your unique situation. For assistance and advice while setting up your communication solutions, reach out to us at 607.433.2200.

0 Comments
Continue reading

5 Best Practices to Protect Your Business From Ransomware

Ransomware is an online threat that continues to develop and evolve to accommodate the motives of cyber criminals around the world. Ransomware locks down your business’s files and demands a decryption key for their safe return, which makes it difficult (or impossible) to move forward with operations. How can you prevent ransomware from destroying your business’s chances of survival?

0 Comments
Continue reading

3 Benefits of Managed IT that Every SMB Can Get Behind

Have you ever taken a broken-down workstation or server unit to a break-fix IT technician, only to have them resolve the problem and demolish your IT budget with absurd costs? For small businesses that can’t afford to hire an on-site IT department, this is a common occurrence. Thankfully, the SMB now has more options than ever before for how they want their IT to be managed, and it all starts with managed IT services.

0 Comments
Continue reading

Why You Should Be Skeptical of USB Devices

USB technology is widely-used and you’d be hard-pressed to find an organization that doesn’t utilize USB devices in some way, shape, or form. However, these devices often harbor unexpected threats that could put the security of your entire infrastructure in jeopardy. All it takes is one infected device to compromise your network. Do you know where your USB devices have been?


Since USBs are prized for their portability, they can be used for a myriad of purposes. USB flash drives or hard disk drives can be used to transport files, both compactly or in bulk. Many keyboards and computer mouses operate with USB technology these days. That’s not even mentioning the plethora of USB dongles that are used to connect other devices to your computer.

Now, imagine this scenario. An employee finds a USB drive on the ground and, curious to find out what’s on it, plugs it into their company-issued workstation. They might do this to make sure that good technology isn’t just left lying around, or maybe their curiosity just got the best of them. Either way, the files on the device could contain executable malware that can threaten your business. In many cases, the user might not even be aware that malware has been installed on the computer, and it can spread viruses, or install trojans that allow for remote access at a later date.

In fact, there’s been a recent report from May 2016 of a $10 USB device that’s capable of logging keystrokes on wireless Microsoft keyboards and transmitting the signals over a wireless frequency. Whitehat hacker Samy Kamkar built it out of a USB phone charger, which is so commonplace these days that nobody would think twice about seeing it plugged into the wall of your office. The threat of these types of devices is so significant that the FBI saw fit to issue a statement warning professionals of their dangers. While no attacks have been found in the wild, it’s still best to take the warning to heart and apply it to your own cyber security practices.

The root of the problem--the theft of data before it reaches its destination--extends well beyond Microsoft wireless keyboards, too. Any wireless device that sends signals that aren’t encrypted could potentially be intercepted by hackers using similar techniques. This method can be used to harvest data that could lead to the theft of personally identifiable information, login credentials, or financial credentials. It’s not unlike a hacker intercepting data over an unsecured wireless Internet connection.

Is your business prepared to handle these outside-the-box threats? All it takes is one mistake to expose your company’s data to those who would do it harm. In instances like this, you should make a policy that any and all devices your employees want to use should first go through your organization’s security protocol. This will help ensure that the devices are not threats to your critical infrastructure. Emphasize that your organization should only be using encrypted data storage devices whenever possible, and you can’t go wrong.

For more information about how to keep your business safe, contact us at (607) 433-2200.

0 Comments
Continue reading

Is IT Innovation Driving, or Hindering, Your Business’s Growth?

Technology can be a constant pain point for businesses of all kinds. Due to the ever-evolving nature of technology solutions, it’s tempting to cave in and purchase the latest and greatest innovations in the industry. Yet, does your business have the time to do so, let alone the budget? Progress can be stymied by a lack of funds and personnel, but it doesn’t have to be.


More often than not, businesses are stuck in two situations. Depending on the state of your IT environment, you either have plenty of time to implement new and innovative solutions, or you have, quite literally, no time to even consider new technology. Both situations come with side-effects that could negatively affect your organization’s operations. For example, you might have time to implement new technology, but are you ignoring the day-to-day maintenance of your internal systems?

The latter can also be a major problem. If you’re spending all of your time responding to emergencies, when can you implement new technologies that can potentially improve the functionality of your business? When you can’t even handle the solutions you already have, what’s the point in implementing new technologies? Unless you can find a way to strike a balance between the two, any efforts will be both fruitless and wasteful.

One of the best ways that your business can innovate without sacrificing functionality is by taking advantage of outsourced IT solutions from Directive. Whether you’re in desperate need of a new workstation or server, or need to implement a solution on a large scale, like cloud computing or virtualization, our trusted technicians can help. If your team can’t keep up with maintenance, we can take over this responsibility while they innovate and create new solutions for your organization.

Better yet, you can rest assured knowing that you’re getting top-of-the-line technology assistance for your organization’s systems. More often than not, businesses have to cut corners in order to make ends meet with their technology maintenance, which could include allowing end-users to service their own workstations. This is a hazardous practice, as having inexperienced users performing in-depth maintenance could be both time-consuming and risky.

You can save time and money by allowing an outsourced team of technology professionals to work with your critical systems. Not only will you see a return on your investment in the form of better-functioning technology, but you’ll also be able to rest easy, knowing that your systems are being maintained by qualified professionals who want to see you succeed.

If your business would rather implement its own solutions, that’s fine too. We can sit on the sidelines and handle maintenance for you so that you don’t fall behind. Regardless of what the internal status of your IT is, we are sure to have a service that’s a perfect fit for your business.

0 Comments
Continue reading

When IT Implementation Goes Wrong, Focus on End-Users First

Often times, people can get distracted by flashy new features, and with technology, this happens more than anywhere else. Since IT grows at such an abnormally fast rate, end-users can be left in the dust if you’re not intentionally trying to keep them in the loop. In fact, it’s highly recommended that you implement IT solutions for your business that are not just effective, but also user-friendly.

0 Comments
Continue reading

How Much Money Does Your Business Waste on Slow Computers?

Have you ever been forced to use a slow computer out of necessity? This is a practice that tries more than just your patience; it can also put a drain on productivity, and in turn, your business’s profits. Therefore, we’d like to ask you a very important question: can your business really afford to deal with technology that isn’t performing as intended?

0 Comments
Continue reading

2016 Directive Employee and Client Appreciation Picnic

On Sunday the 18th of September, we hosted a picnic for our clients, employees, and their families. This year, we chose to send the summer out in style with a carnival celebration under the ‘big top’. Despite the threat of rain, everyone enjoyed an afternoon of games, face painting, prize giveaways, and great photobooth - including props!

0 Comments
Continue reading

Having a Network that’s Tested Guarantees You’ll Overcome Any Disaster

Does your SMB have an internal IT department? Chances are that it is a major pain point for your organization, and even if you do have one, it might be bogged down with so much work that mistakes can happen and threats can slip through the cracks. Sometimes the best way to protect your network is to know where and how threats manage to get there in the first place.

0 Comments
Continue reading

We Debunk 3 Common Myths of Managed IT

Managed IT services are so popular with small businesses that they’re becoming a commodity. If you’re not taking advantage of managed IT, what’s your excuse? Here we address three common excuses put forth by companies that avoid managed IT.

0 Comments
Continue reading

3 Ways Help Desk Support is Perfectly Suited for SMBs

Let’s say that your team is deep within the throes of productivity on a major project, and even the slightest hiccup will knock off their momentum and derail all progress. What would happen if the software they need to do their job suddenly became unusable, or settings on their workstation get changed without their knowledge? Without a reliable IT department, you might be out of luck.

0 Comments
Continue reading

The Explosion of Mobile Devices is One Trend Your Business Must Account For

You may have heard about the Internet of Things in passing, but do you truly understand the nature of these connected devices, and how they will affect your business in the coming years? The Internet of Things is a major trend that needs to be addressed if your business plans on succeeding in the near future.

0 Comments
Continue reading

4 Options When Discarding Old Technology

So you’ve gotten yourself some new hardware. That’s great, but what are you going to do with your old equipment? You need to make sure that you’re handling your old technology properly, and there may be ways for your old hardware to find a second life. Before chucking it in the trash, first consider your options.

0 Comments
Continue reading

Having an All-Wireless Office is Totally Possible. Here’s How!

You likely use several wireless devices and enjoy their many advantages, like not having to be wired to your desk. Yet, it’s unlikely that you’ve transitioned your entire office to wireless technology. Thanks to the advancements and affordability of wireless technology, having an office that’s completely wireless may be entirely within the realm of possibility.

0 Comments
Continue reading

Recent News

Our business began its journey with the purchase of a personal computer back in 1992. This purchase ignited a passion with Chris Chase, our CEO, and there was no stopping its momentum. Less than one year later, he had his first IT support client (and...

Understanding IT

Get the Knowledge You Need to Make IT Decisions

Technology is constantly evolving, and keeping up can feel overwhelming. Whether you want to understand cybersecurity threats, explore automation, or learn how regulations like PCI DSS impact your business, we’ve made it easy to access clear, straightforward insights on key IT topics.

Insights to Understanding IT

Contact Us

330 Pony Farm Road Suite #2
Oneonta, New York 13820

Mon to Fri 9:00am to 6:00pm

support@directive.com

(607) 433-2200