Directive Analytics

Directive Blog

Directive Blogs

Directive has been serving the Oneonta area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

4 Security Threats to Lookout for in 2013

b2ap3_thumbnail_threat400.jpgTechnology can change in an instant. The popularity of mobile devises and tablets has grown exponentially in a very short amount of time. In fact, having a tablet, smartphone, laptop and desktop is not an unusual occurrence, especially for small and medium business owners who are, essentially, always on the clock. And so, it stands to reason that threats and security are also evolving along with technology.

0 Comments
Continue reading

Taking a Look at Google’s Data Centers

b2ap3_thumbnail_datacenter.jpgHave you ever stopped and wondered where the internet is housed? Maybe all the websites are on a skyscraper-sized router? Maybe the internet all fits inside your computer? Most of the information is actually stored in data center facilities all over the world, and the sheer size and complexity of these centers will boggle your mind.

0 Comments
Continue reading

Stolen Device Damage Control

b2ap3_thumbnail_laptopstealer.jpgThe smartphone ownership rate for American adults increased to 46% in 2012, this according to a study by Pew Research. This study does not include other mobile devices like tablets, laptops, and notebooks, but the use of these devices is also growing, with worldwide sales for just smartphones and tablets projected to hit 1.2 billion in 2013.  

0 Comments
Continue reading

4 Tips to Shop Securely Online

b2ap3_thumbnail_addtocart10.jpgThe 2012 holiday online shopping season is shaping up to be the biggest yet. Harris Interactive conducted a survey regarding this holiday season, and found that 51% of Americans plan on shopping online this year. Everybody has different reasons to shop online, 71% of respondents thought they could find better deals, and 31% want to simply avoid the crowds.

0 Comments
Continue reading

Increase Security with Multi-Factor Identification

a1sx2_Original1_laptopsafepw.jpgUsing a strong password with complex combinations of letters and numbers will go a long way in protecting your account, but passwords provide only one level of protection against hackers. Additional levels of security can be added with multi-factor authentication. This is the best protection available for your internet accounts, and major technology companies have recently made this a reality for the public.

0 Comments
Continue reading

3 HandyTools to Remember Your Passwords, Part 2

a1sx2_Original1_passwordpostits.jpgLast time, we spoke about password security, we went over the importance of using strong passwords to avoid identity theft. In part two, we will discuss three easy password solutions that can help you manage all of your different passwords.

0 Comments
Continue reading

Password Vulnerability and Security, Part 1

a1sx2_Original1_lockeddownlaptop.jpgA weak password makes identity theft easy for hackers. You would never paint your social security number on the side of a truck and drive around town, but if your password is shared, left out in the open, and used on multiple sites, then you might as well ride shotgun with the Lifelock CEO (his SSN has been stolen 13 times).

0 Comments
Continue reading

Protect your Dropbox with Two-Step Authentication


a1sx2_Original3_phonepadlock.jpgDropbox, a popular file-hosting service for both home-users and businesses, recently added a new security feature to prevent unauthorized access to your Dropbox files and folders. You can enable Dropbox to send a security code to your mobile phone whenever you log in.

0 Comments
Continue reading

Making Your Business BYOD Compliant

We talk a lot about smartphones and tablets as business tools, but these days more and more people are using high-end devices personally. It's likely that they are bringing these devices in to work, and often using them to become more productive at their job. We call this Bring-Your-Own-Device, or BYOD, and it isn't a bad thing. The catch is managing security risks when users are using their own personal gadgets.

0 Comments
Continue reading

Your Company's Social Media Policy

The time to implement a social media policy is now.

Your social media policy outlines for employees your companies guidelines or principles for communicating in the online world.  Your company should have a communications policy in place that spell out your expectations for phone and email, it’s important that you add social media and online site usage to this policy.

 

0 Comments
Continue reading

Is Your Printer a Security Threat?

Your printer typically has pretty limited functionality, or at least one would think, right? It prints, maybe it can print on both sides of the paper, sometimes it can scan documents, and it can allow hackers the ability to steal your data and commandeer your network. Wait, say what?

0 Comments
Continue reading

How Safe is Your Email?

Email is (and has been) a prime method of communication for businesses of all sizes. With email comes a whole slew of issues that are essentially synonymous with the technology; spam, information overload, phishing, and information privacy. Even Upstate New York small businesses that only do business locally are at risk of these issues. Personal email accounts are equally at risk. Employing proper precautions and practices whenever communicating via email is very important to prevent the risk of security compromises, monetary loss, and even legality issues.

0 Comments
Continue reading

Is Free Wi-Fi Dangerous?

If you take a laptop out into the world, you've probably seen the notification saying "Wireless Network Detected." Free hotspots are not uncommon in coffee shops, hotels, airports, and other public locations,  There are some things to know before you simply hop on an unfamiliar wireless network.

0 Comments
Continue reading

Encrypting your Emails

Remember in "Mission Impossible," after an agent listens to his secret mission, the recording goes on to mention "This message will self destruct…" followed by the oversized tape-recorder puffing out billows of smoke.

Businesses have gone a long way since then (we've replaced sending tape-recorders with the much more efficient email), and encrypting email messages is easy and cost effective for businesses that want to ensure that certain messages are only seen by certain recipients.

0 Comments
Continue reading

How a Firewall Protects Your Data From the Worst of the Web

b2ap3_thumbnail_firewall_security_400.jpgSince you run a business, you know that your business’s network requires a secure firewall in order to keep threats out. In fact, the firewall is the most basic of security protocol that you should be taking advantage of. Knowing what a firewall protects you from, and what it doesn’t protect you from, is an important first step toward improving your data infrastructure’s security, and in turn improving your business’s continuity.

0 Comments
Continue reading

How Sloppy Security Practices Put Companies at Risk

b2ap3_thumbnail_identities_400.jpgIn today’s online business environment, security is nothing to scoff at. Yet, there are many businesses that don’t play by the rules when it comes to monitoring account security on a shared network. This puts both themselves, and their businesses, in danger.

0 Comments
Continue reading

How Your Business Can Benefit From a Virtual Private Network

b2ap3_thumbnail_virtual_private_network_400.jpgMost of your business’ technology is a direct result of your need to quickly and securely disseminate information. While there are solutions meant to improve efficiency peppered in there, the vast majority of IT solutions are designed to create, share, or protect information. On today’s Internet there are many threats looking to corrupt or intercept that information. One way your organization can share information more securely is through the use of a Virtual Private Network (VPN).

0 Comments
Continue reading

Recent News

Our business began its journey with the purchase of a personal computer back in 1992. This purchase ignited a passion with Chris Chase, our CEO, and there was no stopping its momentum. Less than one year later, he had his first IT support client (and...

Understanding IT

Get the Knowledge You Need to Make IT Decisions

Technology is constantly evolving, and keeping up can feel overwhelming. Whether you want to understand cybersecurity threats, explore automation, or learn how regulations like PCI DSS impact your business, we’ve made it easy to access clear, straightforward insights on key IT topics.

Insights to Understanding IT

Contact Us

330 Pony Farm Road Suite #2
Oneonta, New York 13820

Mon to Fri 9:00am to 6:00pm

support@directive.com

(607) 433-2200