Directive Analytics

Directive Blog

Directive Blogs

Directive has been serving the Oneonta area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

4 Ways Hackers Can Disrupt Your Life

b2ap3_thumbnail_cybercrime400.jpgIf a hacker manages to get their grubby hands on your computer, you're going to have a bad time. Of course, how bad of a time you have depends on your hacker's intentions. There are several things hackers can do to harm you, here are four of the most common ways hackers can disrupt your life.

0 Comments
Continue reading

Trojan:Win32/Crilock.A Nasty Ransomware You Need to Guard Against

b2ap3_thumbnail_virus1-400.jpgOn September 10th, 2013, a new ransomware known as Trojan:Win32/Crilock.A began attacking computers all over the Internet, locking users out of their PCs and putting sensitive information at risk. If your computer gets it, then you're in for a world of hurt. Here are the details on what this virus does and what you can do to prevent it.

0 Comments
Continue reading

It’s Time to Reevaluate How You Share Photos

b2ap3_thumbnail_selfie400.jpgIf you use a smartphone to take personal pictures and post them to the Internet, then you may unknowingly be posting more about yourself than you want to, like where and when the picture was taken. This information in the hands of the wrong person can lead to dangerous consequences, like theft of your property, your identity, or even kidnapping.

0 Comments
Continue reading

Don’t Forfeit Your Command-and-Control Center To a Zombie Army

b2ap3_thumbnail_zomb400.jpgWith an increase in Distributed Denial of Service (DDOS) attacks and packet flooding volume, its evident that hackers are using compromised web servers for their malicious activities. By infecting servers, these dastardly infiltrators create a Zombie command-and-control center to direct their malicious activities from.

0 Comments
Continue reading

Russia Protects Communications by Using Typewriters

b2ap3_thumbnail_typewriter400.jpgIf you have been following international news headlines with stories like WikiLeaks spreading confidential documents, and recent revelations about a US surveillance scandal, it kind of feels like we are in the middle of Spy vs. Spy. As nations look for stronger security solutions to protect themselves, Russia is looking to older technology to keep their communications safe.

0 Comments
Continue reading

Protect Your Business from BYOD Lawsuits

b2ap3_thumbnail_lawsuit400.pngMany businesses are discovering how great it is for employees to use their personal devices to accomplish work. BYOD has been proven to improve productivity and worker satisfaction; but like so many great things, these BYOD benefits are in danger of being shut down as employers are becoming concerned about being sued. How can you still benefit from BYOD while being protected from lawsuits?

0 Comments
Continue reading

The Business of Malware and Your Mobile Device

b2ap3_thumbnail_phonejack400.pngWe often view hackers as creeps who are bent on spreading viruses to disrupt everyone's lives, perhaps for the sake of anarchy or some extreme ideology. But when it comes down to it, most hackers are in it for the money and are just trying to make a quick buck. In fact, hacking groups may even be more organized than your business!

0 Comments
Continue reading

Bury Your Treasured Files With TrueCrypt

b2ap3_thumbnail_tcsquare400.pngHow vulnerable is your sensitive data on your PC to unwanted threats? Can anyone who gains access to your computer be able to easily find this data and do whatever they wish to it? If these files were encrypted and then hidden from view, you can neutralize the possibility of it happening.

0 Comments
Continue reading

Know the Risks of the Internet before Logging On

b2ap3_thumbnail_virus400.jpgDriving a powerful car can be an exhilarating experience, but if you have no idea what you're doing, it can be dangerous. This is why governments require drivers to pass a safety class before they can speed down the road encased in steel and glass. The Internet is also a powerful tool that can be exciting, beneficial, and dangerous.

0 Comments
Continue reading

Preparing Your Social Media Will

b2ap3_thumbnail_googledeath400.jpgYou can't log onto your online account if you're dead, and unless you have your password clearly marked on a sticky note, then nobody else will be able to either. While the Internet is a great distraction to keep us from pondering our mortality, the issue of post-mortem social media forces us to face death by preparing a digital will.

0 Comments
Continue reading

Can a Cell Phone Kill Switch Deter Theft?

b2ap3_thumbnail_KillSwitch400.jpgAs smartphone ownership continues to rise (175 million cellphones sold last year in the US), so too does smartphone theft. Take San Francisco, CA as an example, half of all robberies reported last year were phone-related. To help curb this trend, crime fighting agencies are seeking help from phone manufacturers in developing a smartphone kill switch.

0 Comments
Continue reading

Network Firewalls Explained

b2ap3_thumbnail_Firewall400.jpgYou know that having a strong firewall is a key component to having strong network security, but do you how firewalls work? Firewalls take their name from the protective barriers that keep buildings and engines safe from fire. While it’s unlikely that your computer is in danger of incineration, a firewall does protect it from cyber-threats; here’s how!

0 Comments
Continue reading

4 Oversights that will Harm Your Network

b2ap3_thumbnail_SecurtyRisk400.jpgWith all the attention that hackers receive, you would think that they are solely responsible for every network security breach, but the truth of the matter is that most damages to company networks are due to negligence. Here are the four most common IT security oversights that can lead to major damages to your network.

0 Comments
Continue reading

Hackers are Taking Advantage of Technology Improvements

b2ap3_thumbnail_HackerSkull400.jpgUsing strong passwords is a critical part of keeping your network protected. For years we have been preaching the need to use complex passwords, along with the need to use different passwords for different accounts. As the technology of crackers (not the salted kind) improves, the need to be diligent about password security intensifies.

0 Comments
Continue reading

Save Face with These 3 Facebook Security Settings

b2ap3_thumbnail_Facebook400.jpgFacebook makes it easy to connect with everyone; unfortunately, this includes people that you may not want to connect with. Whether it is the person you once had an awkward date with, or a hacker looking to hijack your profile, you can make sure that only the people who you want to see your post will be able to by adjusting your security settings.

0 Comments
Continue reading

Who Can You Trust with Your Data?

b2ap3_thumbnail_Trust400.jpgYour company's information on your network is labeled as "sensitive" for a reason. The files on your servers contain the secrets to your success, along with financial records about you, your employees, and your customers. When trusting sensitive data to a third party, make sure that it is someone you trust.

0 Comments
Continue reading

In Windows, Hibernation Isn’t Sleep

b2ap3_thumbnail_Sleep400.jpgThe Windows family of operating systems (OS) have different power-saving modes for users to take advantage of if they find themselves away from their workstation or mobile computing device. Windows 8 features three: Sleep, Hibernate, and Hybrid Sleep.

0 Comments
Continue reading

Business Executives are Targeted with Whaling Scams

b2ap3_thumbnail_Whaling400_20130217-211452_1.jpgEven if you are using the best antivirus software available, sensitive company data can still be compromised by users falling victim to phishing scams. Phishing is a tactic where scammers trick users into giving out their personal information, usually through deceptive spam e-mails. Looking to fry bigger fish, scammers are trying their luck at whaling.

0 Comments
Continue reading

Don’t Underestimate the Hackers

b2ap3_thumbnail_Hacker400.jpgIn 2011, Ponemon Research surveyed 583 U.S. businesses and found that 90% of respondents reported that their company's computers had been breached at least once by hackers within the past year; 77% of these companies felt like they were attacked multiple times within the same year. If your SMB does not have any protection from hackers, then your sensitive data is at serious risk.

0 Comments
Continue reading

Take Back Your Facebook News Feed

b2ap3_thumbnail_FacebookLogo400.jpgFacebook has recently achieved one billion active users. Being on top of the social media world comes with a price. Facebook has become one of the top 10 most hated companies in America, this according to a January 2013 study from news site 24/7 Wall St. This survey takes into account customer and employee satisfaction and, most of all, stock prices.

0 Comments
Continue reading

Recent News

Our business began its journey with the purchase of a personal computer back in 1992. This purchase ignited a passion with Chris Chase, our CEO, and there was no stopping its momentum. Less than one year later, he had his first IT support client (and...

Understanding IT

Get the Knowledge You Need to Make IT Decisions

Technology is constantly evolving, and keeping up can feel overwhelming. Whether you want to understand cybersecurity threats, explore automation, or learn how regulations like PCI DSS impact your business, we’ve made it easy to access clear, straightforward insights on key IT topics.

Insights to Understanding IT

Contact Us

330 Pony Farm Road Suite #2
Oneonta, New York 13820

Mon to Fri 9:00am to 6:00pm

support@directive.com

(607) 433-2200