fbpx

Don’t wait any longer. Get started today!

 
 

Directive Blogs

Directive has been serving the Oneonta area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Out-of-Office Phishing Attacks

Picture this: You’re heading out on vacation, but while you’re enjoying some well-deserved time off, cybercriminals are hard at work, setting the stage for their next phishing attack.

In this Micro Training, learn how scammers can exploit your Out-of-Office auto-reply emails, and what you can do to stay protected.

0 Comments
Continue reading

Tip of the Week: How to Create QR Codes in Microsoft Excel

QR codes are a handy way to direct someone to the right place online, like your business’ website, but did you know that they are also pretty easy to make? Let’s go over how you can whip up your own with the help of Microsoft Excel.

0 Comments
Continue reading

How Does CAPTCHA Work?

We’ve all had to confirm we’re not a computer when attempting to log into an account. This is the core purpose of what once was called CAPTCHA… the Completely Automated Public Turing test to tell Computers and Humans Apart. However, it seems surprising that computers don’t easily overcome these simple-seeming tests.

Let’s dig into why these simple tests actually are effective at differentiating between human users and automated bots.

0 Comments
Continue reading

What Does the Rest of 2025 Hold for Technology?

We can’t tell the future—no one really can—but it is both possible and vital to make predictions based on present trends and current events. Let’s look forward to the rest of this year to see what predictions we can make for business IT and the notes we should all take over the next few months.

0 Comments
Continue reading

Staying Safe on Social Media Boils Down to These Three Things

You don’t want to get spammed; nobody does. Unfortunately, it happens to EVERYONE, and it’s just getting worse. All this unwelcome correspondence happens over the phone, through email, and especially on social media. In today’s blog, we’ll talk a little bit about how social media puts users at risk and what you can do to keep that risk from becoming a problem for you. 

0 Comments
Continue reading