Directive Analytics

Directive Blog

Directive Blogs

Directive has been serving the Oneonta area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Ditch Sticky Note Passwords for Good

How many employees do you have who keep your company’s passwords on sticky notes stuck to their monitors? This simple, seemingly benign trick could be putting your business at risk. After all, if you can see the password on a sticky note, so too can others who happen to be wandering around the office—including potential threat actors.

0 Comments
Continue reading

How to Get the Crown Jewels Stolen

It would seem that the people responsible for the recent heist at the Louvre, which netted over $101 million in jewelry, may have used a more complicated plan than strictly necessary. According to a French publication, the famous museum has a long history of cybersecurity mistakes and faux pas… many of which, given the museum’s fame, are truly shocking.

Let’s go over what we know about the Louvre’s protections over the years, and what they suggest about the current state of things. We’ll probably learn a thing or two by doing so.

0 Comments
Continue reading

The Dark Web is Scary (But It Doesn’t Have to Be)

It’s easy for employees to reuse passwords just to make things easier for themselves; after all, why use different passwords when you have a dozen accounts to remember passwords for? Unfortunately, this habit will come back to bite you, especially if your business is ever involved in a data breach. These credentials could be put up for sale on the dark web… and that’s just the beginning of your problems.

0 Comments
Continue reading

Why MFA is the Most Important Security Step You'll Take This Year

While still critical to get right, passwords aren’t nearly as secure as you would expect them to be. They can be guessed (especially if proper password practices haven’t been followed), stolen in data breaches, or phished from a well-meaning—albeit shortsighted—employee.

Passwords are basically the lock built into the front door of a building. They’re enough to keep out honest people, but what about the people who are willing to go to the deep web and 3D print the master key to the type of lock you use?

0 Comments
Continue reading

Essential IT Security Policies Every Business Needs

A successful business is a secure business. You probably have a good lock on the front door, maybe an alarm system, and secure cabinets for important documents. You do all of this to protect your business' physical assets from threats. So why wouldn't you do the same for your digital assets?

Just as you have physical security measures, your business also needs strong cybersecurity policies. They help create clear rules for employees to follow and a plan to fall back on if an incident occurs.

0 Comments
Continue reading

Maintaining Data Security Is the Most Important Tip We Can Give You

Tips are great as long as they actually work. Business owners need more technology tips than just about anything else, whether that is app-specific or general care of technology. We try to do our best to provide useful tips a couple of times a month, but this week we wanted to focus on what is probably the most important tip we can provide.

0 Comments
Continue reading

The One Thing That Makes Stolen Passwords Useless

Two-factor authentication can be one of the most impactful security tools your organization has. This is because passwords play a massive part in the security of your most crucial digital assets; and frankly, it keeps passwords as a viable solution to keep apps and data secure. 

0 Comments
Continue reading

Were 16 Billion Passwords Really Leaked? Kind Of… But the Lessons are Still Important

Fairly recently, news circulated that a data breach had exposed 16 billion—yes, with a “b”—passwords for various logins, including social media accounts, virtual private networks, corporate tools, and more. Effectively, every online service imaginable was represented in this breach.

This is very bad… arguably unprecedented.

However, this impression is at best misleading. Let’s dig into the truth of the matter, while still acknowledging that there are some lessons to be learned.

0 Comments
Continue reading

Cybersecurity Practices Everyone Should Follow Each and Every Day

2024 was a banner year in the worst possible way: cybersecurity threats broke records and incessantly targeted individuals and small businesses alike. Are there tools to help prevent these threats through detection and mitigation? Of course… but they unfortunately can only do so much to avoid the vulnerabilities caused by insufficient cybersecurity practices.

The following guide is intended to fix this, reinforcing such practices so they remain top of mind and are easier to enact regarding the data you work with every day. As such, we encourage you to share it so it can educate as many people as possible.

0 Comments
Continue reading

Password Managers Have Become Essential Tools for Individuals and Businesses

Absolutely nobody likes dealing with passwords. They’re annoying, hard to remember, and yet, somehow, hackers seem to have no problem cracking them. That’s where password managers come in. They take the stress out of remembering a hundred different logins while keeping your business secure. If you’re still relying on sticky notes or using the same password for everything so you can remember it, it’s time to make the switch.

0 Comments
Continue reading

Technology That Can Help You Avoid Big Trouble

Running a business is basically a never-ending series of potential disasters just waiting to happen. Some are easy to fix, change a process here, tweak a strategy there—but others? They can completely derail your operations if you’re not prepared. That’s where smart technology steps in to save the day.

Let’s look at some nightmare scenarios that could spell disaster unless you have the right IT in place.

0 Comments
Continue reading

The Definitive Guide for Getting Your Passwords In Order, Once and for All

Normally, we try to keep the focus on business technology, but this guide is geared toward the typical home user, who may not be that high-tech.

These days, nearly all human beings are wrapped up in a little technology, and there isn’t a huge divide between protecting yourself as an employee at a company versus protecting yourself as an individual—at least as far as cybersecurity habits go. Even if you feel like you are pretty low-tech, you still have to worry about protecting your identity, financial information, and personally identifiable information online.

0 Comments
Continue reading

3 Common-Sense Security Measures You Can Implement Today

Running a business is already confusing enough without worrying about security at all times. Whether you’re a small business owner or a multi-level enterprise, security is just as important for all the same reasons. Today, we want to share a couple of security strategies you can implement today to feel better about the current state of your infrastructure moving forward.

0 Comments
Continue reading

Five Password Practices for More Secure Accounts

Passwords are one of the best ways to protect your online accounts and information. Strong passwords are especially important for small businesses because weak ones can cause significant problems, like security breaches. Let’s break down how to create and manage passwords the right way.

0 Comments
Continue reading

The Latest Moral We Can Learn from Disney: Manage Permissions Better

The Disney brand has long cultivated an image of magic and wonder. However, this image has yet to materialize any magical effects in reality. For example, people still suffer from food allergies while visiting Disney’s various parks.

This makes it especially dangerous that a former Disney employee was allegedly still able to access a specialized menu-planning app and make alterations, like changing prices, adding language that Disney certainly would not approve of, switching text to the unintelligible “Wingdings” font, and worst of all… changing menu information.

0 Comments
Continue reading

Tip of the Month: Create Better Passwords

Think about how many online accounts you have. With so many accounts, it’s important to make sure they’re secure. Creating strong passwords is one of the best ways to protect your accounts from hackers. Here’s how you can create passwords that are hard to crack and keep all your online accounts safe.

0 Comments
Continue reading

Two-Factor Authentication is a Must Have

Two-factor authentication (2FA) has become a critical security measure in the digital age, providing an additional layer of protection against unauthorized access. As cyber threats grow more sophisticated, relying solely on passwords is no longer enough. 

0 Comments
Continue reading

4 Stupid-Simple Ways to Be More Careful with Your Network Security

Technology is central to most businesses, which means that security is, by proxy, central to them as well. With cyberattacks on the rise, it’s more important than ever for you and your employees to be on the same page regarding cybersecurity. Today, we are looking at four ways you can ensure sound cybersecurity practices that even the most belligerent employees can follow… with the right support in place.

0 Comments
Continue reading

Password Managers are an Office Worker’s Best Friend

Protecting your business’ accounts is something we will advocate for on repeat. You’ll hear us tell you about complex and unique passwords and multi-factor authentication until you’re sick of hearing it. But one tool that our clients sometimes forget is the password manager—an equally useful tool that can help your business keep passwords safe and secure.

0 Comments
Continue reading

The Passphrase is Better than the Password

Network security is a major issue for any business that relies on password-protected systems—and who doesn’t? With so much at stake, it’s important that every user uses passwords that are not only complex and secure but also easy to remember. This month, we will discuss how the passphrase is the answer to keeping your password-protected accounts secure. 

0 Comments
Continue reading

Recent News

Our business began its journey with the purchase of a personal computer back in 1992. This purchase ignited a passion with Chris Chase, our CEO, and there was no stopping its momentum. Less than one year later, he had his first IT support client (and...

Understanding IT

Get the Knowledge You Need to Make IT Decisions

Technology is constantly evolving, and keeping up can feel overwhelming. Whether you want to understand cybersecurity threats, explore automation, or learn how regulations like PCI DSS impact your business, we’ve made it easy to access clear, straightforward insights on key IT topics.

Insights to Understanding IT

Contact Us

330 Pony Farm Road Suite #2
Oneonta, New York 13820

Mon to Fri 9:00am to 6:00pm

support@directive.com

(607) 433-2200