Directive Analytics

Directive Blog

Directive Blogs

Directive has been serving the Oneonta area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The 4 Fundamentals to IT Security

b2ap3_thumbnail_secure400_20131101-174011_1.jpgAt a recent security event, VP of Gartner Neil MacDonald broke down the fundamentals of IT security into four categories, "Information security was never about device lockdown, or dictating applications, or building firewalls. It was always about protecting the confidentiality, the integrity, the authenticity, the availability of information." Here's a closer look at these four security qualities.

0 Comments
Continue reading

Protect Your Business with Intelligent Surveillance Cameras

b2ap3_thumbnail_cam400.jpgThe world you do business in is a pretty dangerous and messed up place, and things always seem to be getting worse. Thankfully, security technology is improving, which helps offset the risks of living in a perilous world. You can take advantage of these security improvements by installing intelligent surveillance cameras for your business.

0 Comments
Continue reading

How to Protect Your Cloud Hosted Data from Security Breaches

b2ap3_thumbnail_secure400.jpgRecently, Adobe sent out e-mails and letters to users notifying everyone of a security breach. "The attackers may have obtained access to your Adobe ID and encrypted password." The obvious question here is, "How do I protect myself and my business from such attacks?" The unfortunate answer is you can't, but you can marginalize the impact by taking some common sense measures.

0 Comments
Continue reading

Be Wary of Free Wi-Fi

b2ap3_thumbnail_securephone400.jpgWhen browsing the Internet on your smartphone, you know how to be on the lookout for scams that will disable your device with viruses; but did you know that you also need to be careful which Internet connection you use? By connecting to the wrong Wi-Fi signal, you could be falling for a scam.

0 Comments
Continue reading

Today’s Network Security is about Controlling Information

b2ap3_thumbnail_netseccloud400.jpgThe modern IT landscape is dramatically changing from a model where an IT department controls everything, to companies outsourcing their IT services. This paradigm shift challenges older ideas about traditional network security equating ownership and control with strong security. Does your business view IT outsourcing as a security help or a hindrance?

0 Comments
Continue reading

4 Ways Hackers Can Disrupt Your Life

b2ap3_thumbnail_cybercrime400.jpgIf a hacker manages to get their grubby hands on your computer, you're going to have a bad time. Of course, how bad of a time you have depends on your hacker's intentions. There are several things hackers can do to harm you, here are four of the most common ways hackers can disrupt your life.

0 Comments
Continue reading

Improve Productivity and Protect Your Business with UTM

b2ap3_thumbnail_timewaste400.jpgYou can connect to over 2.7 billion people over the Internet, but you probably shouldn't. There are many people on the Internet with bad intentions, along with several websites that can harm your business. With a Unified Threat Management (UTM) tool, you can protect your business by filtering out the worst of the web.

0 Comments
Continue reading

The Stinky Side of Fingerprint Technology

b2ap3_thumbnail_hahafp400.jpgWith all the advancements in security technology, it's only a matter of time before clunky passwords are replaced with a more secure and more convenient solution. Unlocking your technology with a fingerprint reader is an easy and fun alternative that's being integrated with some of the latest devices; but how safe are fingerprint readers?

0 Comments
Continue reading

5 BYOD Risks for Your Business

b2ap3_thumbnail_bringit400.jpgIn our last blog article, we introduced the IT trend of employees bringing in their personal devices to work (BYOD). We looked at 5 ways BYOD can help your business, but BYOD is not without risks. In part 2, we will cover five risks BYOD brings to your company's network and what you can to do manage them.

0 Comments
Continue reading

Trojan:Win32/Crilock.A Nasty Ransomware You Need to Guard Against

b2ap3_thumbnail_virus1-400.jpgOn September 10th, 2013, a new ransomware known as Trojan:Win32/Crilock.A began attacking computers all over the Internet, locking users out of their PCs and putting sensitive information at risk. If your computer gets it, then you're in for a world of hurt. Here are the details on what this virus does and what you can do to prevent it.

0 Comments
Continue reading

The Danger of Easy Network Security

b2ap3_thumbnail_securitee400.jpgWhen your network's security is doing its job and keeping your business safe, it's easy to not think about it because you don't feel the heat from any threats. Just because you're not feeling the heat, however, doesn't mean you're out of the kitchen. Even if you enjoy strong security, you will still need to perform regular security maintenances.

0 Comments
Continue reading

Don’t Let These 3 Easy Oversights Compromise Your Network

b2ap3_thumbnail_lockblu400.jpgThere is a common misperception that strong anti-virus software is all you need to cover the security of your network. While anti-virus software is an important component to network security, there's more to it if you want a secure network. You need to also take into account the human factor, which can disable even the strongest software solution.

0 Comments
Continue reading

It’s Time to Reevaluate How You Share Photos

b2ap3_thumbnail_selfie400.jpgIf you use a smartphone to take personal pictures and post them to the Internet, then you may unknowingly be posting more about yourself than you want to, like where and when the picture was taken. This information in the hands of the wrong person can lead to dangerous consequences, like theft of your property, your identity, or even kidnapping.

0 Comments
Continue reading

Can a Software Firewall Stop a Dragon?

b2ap3_thumbnail_dragon400.jpgHaving a strong firewall to protect your computer is an important investment. The casual PC user may not think twice about their firewall because they use the firewall built-in with their Windows OS, but the complexity of your business demands a stronger solution.

0 Comments
Continue reading

Don’t Forfeit Your Command-and-Control Center To a Zombie Army

b2ap3_thumbnail_zomb400.jpgWith an increase in Distributed Denial of Service (DDOS) attacks and packet flooding volume, its evident that hackers are using compromised web servers for their malicious activities. By infecting servers, these dastardly infiltrators create a Zombie command-and-control center to direct their malicious activities from.

0 Comments
Continue reading

Russia Protects Communications by Using Typewriters

b2ap3_thumbnail_typewriter400.jpgIf you have been following international news headlines with stories like WikiLeaks spreading confidential documents, and recent revelations about a US surveillance scandal, it kind of feels like we are in the middle of Spy vs. Spy. As nations look for stronger security solutions to protect themselves, Russia is looking to older technology to keep their communications safe.

0 Comments
Continue reading

Employee Wins Car for Being Website's 1,000,000th Visitor

b2ap3_thumbnail_newcar400.jpgTakeaway: A local employee wins the grand prize of a new car after becoming the 1,000,000th visitor to a random website, much to the jealousy of his fellow employees. His co-workers respond by entering every online sweepstakes while at work, bringing productivity to a halt.

0 Comments
Continue reading

The Circle of Corporate Espionage, part 2

b2ap3_thumbnail_pride400.pngWhen we last left our young office administrator, Chosimba, he was framed by his rival Scarn for leaking sensitive company information that led to the arrest and outing of Pride Inc.'s CEO. Scarn set up Chosimba because he was in line to run Pride Inc. We now find our hero hiding in Africa, attempting to avoid litigation--based on the advice of Scarn.

0 Comments
Continue reading

The Circle of Corporate Espionage, part 1

b2ap3_thumbnail_prideinc400.pngThere was once a young office administrator, Chosimba, who was in line to become President of Pride Inc., a multinational corporation that specializes in the distribution of exotic animal meats. One day, Chosimba was given the task of purchasing a new copy machine; little did he know that this piece of equipment would determine his fate, along with the destiny of Pride Inc.

0 Comments
Continue reading

The Business of Malware and Your Mobile Device

b2ap3_thumbnail_phonejack400.pngWe often view hackers as creeps who are bent on spreading viruses to disrupt everyone's lives, perhaps for the sake of anarchy or some extreme ideology. But when it comes down to it, most hackers are in it for the money and are just trying to make a quick buck. In fact, hacking groups may even be more organized than your business!

0 Comments
Continue reading

Recent News

Our business began its journey with the purchase of a personal computer back in 1992. This purchase ignited a passion with Chris Chase, our CEO, and there was no stopping its momentum. Less than one year later, he had his first IT support client (and...

Understanding IT

Get the Knowledge You Need to Make IT Decisions

Technology is constantly evolving, and keeping up can feel overwhelming. Whether you want to understand cybersecurity threats, explore automation, or learn how regulations like PCI DSS impact your business, we’ve made it easy to access clear, straightforward insights on key IT topics.

Insights to Understanding IT

Contact Us

330 Pony Farm Road Suite #2
Oneonta, New York 13820

Mon to Fri 9:00am to 6:00pm

support@directive.com

(607) 433-2200