Hackers are mysterious. Not much is known about them - until they get caught, at least. But until the divine hammer of justice is brought down upon them, they will continue to stalk the shadows and wait for us to unknowingly hand over our personal information. What they don't want you to know is that they generally act according to a few particular variables, and that it is possible to avoid their pitfalls.
Directive Blogs
What's your Microsoft Outlook contact list looking like these days? For many busy business owners, their email contacts list is jumbled and unorganized, making it difficult to do something simple like locate needed information. Here are a few tips to help you better organize your Outlook contacts so that you can quickly find what you're looking for.
When it feels like everybody is out to get you, there's only one way to survive: Trust nobody. You may not have too many physical enemies ready to jump you, but there's an army of hackers wanting to breach your company's database. One of the securest ways to keep your company's information safe is to implement a "zero trust" network security model.
In days of old, skilled people of all crafts joined together to improve the quality of their lives and their products. These were called guilds, and they're not unlike small businesses of today; a group of like-minded individuals who come together to make the public's lives easier. Your business is no different, and at Directive, we understand that.
Apple is back with another iPhone! The Silicon Valley-based hardware and software manufacturer has released the new versions of their extremely popular iPhone series of devices. The two-headed approach that Apple took with their second incantation of the iPhone 5 (the 5s and 5c), is replicated this time out as well. After being surpassed by Samsung over the past two years, does the iPhone 6 and its larger version, the iPhone 6+, have what it takes to get Apple back on top?
Automation is an increasingly sought-after convenience in the workplace, especially when it comes to repetitive tasks. Some professionals foresee a world which has fully automated assembly lines, but most are only concerned about what this can do for their assets. Instead of freeing up menial positions for others to take on more meaningful existences, could automation destroy these jobs completely?
Virtualization is all the rage in the technology world. In fact, virtual servers are practically omnipresent in modern workplaces. Why? Because they offer businesses unprecedented opportunity for growth and development. The benefits of virtualized servers far outweigh the costs, aiding businesses in expanding their goals and visions for the future.
How familiar are you with the IT equipment owned by your business? If you don't keep detailed records of your equipment and enact security measures and policies, then you're making it easy for theft to occur. We've written a lot about protecting your business from data theft, but it's equally important that you take precautions to safeguard your stuff.
Herding cats is a business term used to describe the task of organizing and controlling entities like people and systems known for being uncontrollable and even chaotic. Due to the unpredictable and independent nature of felines, cat herding captures the idea of controlled chaos perfectly. Does running your business feel like you're working on a cat ranch?
We reported in August that security researcher Karsten Nohl of SR Labs revealed a flaw in USB firmware that cripples the technology beyond repair. At the Black Hat security conference, it was revealed that USB devices of all kinds can be targeted by hidden malware. Nohl refused to release the code used in the research, due to being concerned that it would be used by the wrong hands, but it has been made public anyway, putting the masses at risk.
As a small business owner, you enjoy the ability to operate quickly when action is needed. You appreciate the ease of communication within your office, and you can get things accomplished simply and efficiently. At least, that's the goal; maybe things aren't so smooth. One way to fix that is by integrating an intranet into your workplace.
The concept behind BYOD seems really good--employees bring their personal devices to work and use them to accomplish company projects. Initially, BYOD was well received, but after reviewing the security risks, more companies are opting out of it. Is there another way to use mobile devices at work without all the hassle and risks of BYOD?
The cloud is the next big thing for some businesses, but a lot of the time, there are too many options thrown at them all at once. They aren’t sure what the best path is for their business. A cloud solution can provide your company with a lot of benefits, but you want only the best for your business.
If your business has a reliable and high-speed Internet connection, then you’ve got what it takes to experience significant savings by switching your company’s phone system to VoIP (Voice over Internet Protocol). Once you’ve decided to make the switch, you will next have to select a VoIP solution that’s right for your organization. Here are some tips to help you make this important decision.
Autumn is a time of change and tradition, and perhaps one of the most well-known is the return of football season. Previously, the broadcasting of local NFL games was restricted by the blackout rule, but a recent revocation of the rule could change everything. Whether you are a football fan or not, this decision to revoke the blackout rule could affect future decisions made by the FCC.
For the past 12 years, the Harkonnen Operation has plagued Europe. The malware campaign, operating scams in Germany, Switzerland, and Austria since 2002, has finally ended, but that doesn't change the fact that it may be the most long-lived malware to have existed. What kept security firms from discovering these attacks and preventing them for so long?
The news is out; what was previously thought to be Windows 9, codenamed “Threshold,” has been revealed to be Windows 10. While leaks have already shown us quite a bit of what the latest installment of Windows can do, the official reveal goes into more detail about the nature of Windows 10 for enterprises and even common users. First, let’s go over what we already know about the enigmatic new operating system, then we’ll get into the juicy new details.
Are you confident that your company's network is 100 percent secure? The best way to answer "yes" to this question is with a network audit. This is a technical procedure where IT professionals analyze every nook and cranny of your system, looking for every possible vulnerability. No matter what the situation is with your company's IT management, a network audit is worth doing.
The Internet makes marketing your business much easier, but it's not that way for everyone. A restaurant in California has responded to the standard Internet marketing strategy with an out-of-the-box method of its own. David Cerretini, co-owner of the Italian restaurant Botto Bistro, has told his strategy to USA Today; "I want to be the worst restaurant in the San Francisco area!"
It's no secret that Facebook is one of the most visited sites on the Internet. In fact, according to the Alexa rankings, which measure website traffic, facebook.com is ranked second after only Google.com. With this much exposure, and the emanated revenue that comes from this kind of traffic, it has become important for the world's largest and most successful social network to scout out and eliminate possible competitors, many times before those companies even consider themselves potential competitors.
Everyone needs a tip occasionally. Therefore, we want to provide our followers with what we like to call, "Tips of the Week." These helpful tidbits are targeted toward helping you understand certain aspects of business technology. For our first tip, we will walk you through how to reorganize your IT infrastructure. For more tips, see our previous blog articles.
A lot of employers are nervous about letting their employees work from home, but due to the increased evidence that it can be beneficial to productivity and cost-efficiency, it's getting more and more difficult to avoid thinking about it. In fact, according to Global Workplace Analytics, working from home has grown a whopping 80 percent in the United States since 2005.
A new malicious threat in the technical marketplace has just been discovered. The bug, dubbed the Bash bug, or "shellshock," is on the loose for users of Unix-based operating systems, like Linux or Mac OS X. It allows the execution of arbitrary code on affected systems, and could potentially be very dangerous for your business. In fact, CNet is calling it "bigger than Heartbleed."
As a business owner, you've probably had the misfortune of letting a valued (or not-so-valued) employee go. The reasons might vary, but one thing is consistent: they're gone, and could potentially use their newfound residual malice to strike your business right where it hurts. How can you prepare yourself against former employees you may have once called "family?"
As a business owner, your email contacts list is probably chock-full of clients and customers you've met over the years. This can make it difficult to find your target without sifting through countless names. Instead of getting flustered by an unorganized list, try sorting your contacts in various ways.
As a business leader, you know that you should read more about the latest industry trends and helpful management concepts. How's that going for you? For many business owners, finding time just to run their business is difficult enough, making book reading a luxury. We've found that you can do both by learning how to speed read.
Well, now that we've got your attention, it's a good time to mention that leaked photos and a video of what may be Windows 9, currently called Threshold, have been leaked to the web. As the next entry in the Windows family of operating systems, it has been highly anticipated since the return of a Start menu was displayed in April 2014. Microsoft has a lot of ground to cover after Windows 8, but will Windows 9/Threshold deliver?
For the modern-day business owner, moving to the cloud means to take advantage of the several strategic advantages it offers. Companies no longer have to restrict themselves by relying on physical servers, desktops, or hardware. Most businesses see the value that cloud-based operations can offer them, and they are racing to take advantage of this fairly recent development. In fact, Joe McKendrick of Forbes magazine says that four-out-of-five small businesses will be based in the cloud in the near future.
Hackers today are trying every approach possible to steal your device's data, including the hijacking of public USB ports. This technique is known as "juice jacking," and with this new threat, you should think twice about charging your device using a public USB charging kiosk, or even the USB port on a friend's computer.
Major retailers are having a rough time of it these days concerning the security of their customer's financial information. Last December, Target was hit with malware that compromised 40 million customer credit and debit card accounts, and recently, Home Depot was hit with the same malware. What's a connoisseur of mass-produced boxed goods to do?
The Internet of Things is on its way, and we are seeing new applications for web-connected devices every day. Perhaps one of the most interesting ways to use Internet of Things technology is its integration into agriculture, or more specifically, artichoke growing at Ocean Mist Farms in Salinas Valley, California.
Not only can Microsoft PowerPoint make great slideshows, it can also make engaging infographics. The latest trend in marketing is fairly simple: Visual content sells. Images and videos are the most popular way to take advantage of this. Infographics can offer your marketing campaign a combination of text and image, allowing your marketing content to be both engaging and informative.
Bring Your Own Device (BYOD) has been a hot IT trend for the past few years. Initially, everybody loved the idea of workers using their personal smartphone for work and organizations were quick to adopt BYOD. Now, after years of trying out the policy, companies and employees are having reservations about BYOD, making some even long for the days of Blackberry.
A business owner must understand the licensing status of their company's software, but this has grown more complicated since the inception of the Internet. If you feel like your employees, or maybe even your corporate culture survives off of pirated software or applications, or stuff you found "for free" online, then your business could potentially suffer from legal issues.
Taking notes is a pain, and we all know that. One of the biggest problems with taking notes is that your team might store them all in different places. Before you know it, you have no idea where anything is or what has been done. Microsoft's OneNote on OneDrive changes that, providing a collaborative cloud-based solution for note taking.
Children across the world are heading back to school, and their parents breathe a sigh of relief. Instead of playing video games, children can now expand their minds in institutions designed for learning. But, what if a popular video game could teach children how valuable programming is as a real-world skill?
When diagnosing your computer's security problems, it should be noted that malware is not always located on the PC itself. A lot of the time, problems could be occurring in a number of different operating systems and browsers, making it difficult to diagnose the cause. A recent study by Ronald Kaplan and Dylan Kaplan proved that malware can be located not only on your computer and devices, but even on your wireless router.
Most of the Internet's data is stored in data centers. Logistically, data centers are a great solution to store ridiculous amounts of data. However, from an environmental perspective, data centers may be doing more harm than good. This, according to a new report by the National Resources Defense Council.
The Vestal, NY location of UPS has recently notified customers that they have been the victim of a data breach that has affected over 50 stores. According to a spokeswoman for UPS, any customer who had used a credit or debit card at the affected stores between April 29, 2014 and August 11, 2014 could be impacted.
Across the country kids are hopping on buses and heading back to school. Schools sure have changed and classes aren't quite the same as they used to be. Perhaps the most important thing about these changes has been the classes available for the kids. In fact, some schools have started teaching children how to code, and France is next on the list.
In Europe, there's a lot of discussion about whether or not citizens have the right to be forgotten, or rather, be forgotten by search engines. According to a May 2014 ruling, search engines must consider requests from the public for removal of content. Not just any content, though; according to ZDNet, the content must be "inadequate, irrelevant, or no longer relevant." As you might guess, this concept is extremely controversial.
With more businesses becoming aware of the environmental impact of their day-to-day operations, one would assume that a practice like printing would be on the decline due to how wasteful it is. Unfortunately, this isn't the case. Despite advances in digital communication, paper consumption continues to increase by 20 percent each year in modern offices.
How your business chooses to store its data is a major decision. You can implement a private cloud computing model and spend more on equipment and maintenance than you need to, or you can save money with a public cloud. Although, in light of the recent celebrity-nude-photo-iCloud hack, is the public cloud secure enough to host your company's data? Let's address this concern and explore your cloud computing options.
Every business owner understands the importance of planning and the proper implementation of said plans. However, after everything is set up, it's easy to overlook the testing of one's plans, which can really come back to hurt you when all of your careful planning falls apart. Nowhere is this more true than with data recovery.
Keep It Simple Stupid, aka KISS, is a sure way to find success in business. By keeping operations simple, the cost of doing business is reduced, there's less room for error, and more people understand what's going on. Your IT infrastructure is at the heart of your organization, keeping IT simple will help your business kiss many of its problems goodbye!
The office is a unique place designed solely for the purpose of getting work done. Therefore, no matter how your workplace is designed, there's always room to improve it in order to squeeze out a few more precious minutes of productivity from each worker. As productivity goes, every minute saved adds up!
Crime might pay for those bold enough to do it, but that doesn't mean everyone should. Hackers likely don't take into account the fact that they are costing the world countless millions of dollars in damage only to further their own gain, and their influence can have far-reaching effects on people all over the world, let alone your business.
You're on vacation with your family and your smartphone notifies you about a work email entitled "URGENT!" What do you do? Checking the message could mean hours spent putting out a fire at the office. Ignoring it will give you more time with your family, but you'll be distracted and stressed the whole time thinking about the worst-case scenario.
There have been a lot of complaints against the proposed Comcast-Time Warner Cable merger, and finally, another prominent service provider has spoken out against it. Dish Network has expressed their dismay over the cable juggernauts' union in a very long, in-depth petition aimed at convincing the Federal Communications Commission to shoot down the merger before it destroys cable provider competition.
It can be difficult to keep track of your budget and expenses, especially when prices and needs are always changing. But perhaps the biggest annoyance is the intense paper trail that you leave behind when building your budget. By taking advantage of Microsoft Excel's formulas, you can easily keep track of your budget and alter it as prices change and demand increases.
The art of war is of vital importance to the State. It is a matter of life and death, a road either to safety or to ruin. Hence it is a subject of inquiry which can on no account be neglected.
- Sun Tzu, The Art of War
The ancient Chinese military general Sun Tzu might have been around long before the Internet was a thing, but he sure knew how to make an impression on the world. In his extremely influential book on ancient Chinese warfare, The Art of War, he says that "every battle is won before it's ever fought." This applies to protecting your IT network, too.
Civilization has passed through various ages, like the Stone Age, the Ice Age, Bronze Age, and so on. And now, we're progressing through another one - the Data Age. In fact, 90 percent of the world's data was created in 2013. With each new device and system comes an incredible amount of data that must be processed, stored, and catalogued. This is Big Data, and the way that your business works with this information will determine the success of your business in the Data Age.
Today, almost everybody has an Internet-connected camera in their pocket. A crazy amount of photos are posted online. In fact, Facebook alone claims to have over 250 billion photos, with 350 million user images posted every day. All of these pictures are fun, but how do you ensure that only the people you want to see your photos are seeing them?
Smartphones have revolutionized the way that we communicate with each other and increased productivity, but for some businesses, they are only making things worse. A perfect example of this is the restaurant business - in fact, one restaurant owner decided to take matters into his own hands, and has performed a study which examined their business before and after the mobile revolution.
You may have noticed last week that the Internet was having some trouble with its operating speeds, but now we know for sure why. The root of the problem lies in Tier 1's Internet routers' Border Gateway Protocol routing tables, which have exceeded their maximum size, and has brought about the failure of these routers to operate at maximum speed.
If 2014 hasn't been a legendary year for data breaches yet, it certainly is now. Community Health Systems, a hospital network for over 206 facilities across the United States, has been the target of a data breach resulting in 4.5 million records being compromised by Chinese hackers, including Social Security numbers, birthdays, names, addresses, and telephone numbers.
Picture this, you're at the airport with your laptop, knocking out an important project between flights. Suddenly, you're approached by some touristy-looking people about taking their picture. You're a nice person so you grant them their request. After a longer-than-expected photo session, you return to your seat only to find that your laptop has been stolen. You've been conned.
For Washington D.C. residents, there's a dubious threat looming in their backyards putting their personal data at risk. It's Coco, a Siamese cat wearing a high-tech collar designed for hacking WiFi networks. Have you taken the proper security measures to protect your sensitive information from feline foes like Coco?
Outsourcing your companies IT is a great way to free up money and take advantage of time-saving remote services. Businesses have different reasons for signing up for the outsourcing service, but many clients have similar expectations of the results they want out of their managed IT service provider.
In an attempt to push users toward the most recent installment of Internet Explorer (IE 11), Microsoft has announced that, as of January 2016, all older versions of Internet Explorer will reach their end-of-support date. This means discontinued patching and security update support, putting all who refuse the upgrade at risk.
All of the security breaches and vulnerabilities of 2014 sure have made for an interesting year; first Heartbleed, then the Internet Explorer vulnerability, GameOver Zeus, and the Russian password-stealing gang. In light of these events, you really have to ask the question, "how can we fight these threats?" Symantec has told The Wall Street Journal that they feel antivirus technology is "dead."
We all know how annoying email can be at times. Your inbox is constantly being filled with new messages, and before you know it, you have no idea what you've responded to or what needs to be responded to. To make matters worse, the average office worker spends roughly two hours staring at their email inbox and responding to messages. Not only is this counterproductive, but is also a massive time-wasting practice.
Microsoft and Apple have been at the forefront of personal computing since the 1970s. The competition has caused partnerships and strain between the two companies and in the interim, created hardware and software that would change the world. Although the two companies will be forever linked, they both are betting on mobile, and for good reason.
A few months ago, we mentioned that a ransomware called CryptoLocker was spreading at a dangerous rate due to the GameOver Zeus malware. The ransomware would lock down files on victims' computers until a fee was paid, but not anymore. Now, with the help of FireEye and Fox-IT, a solution has been created called DecryptCryptoLocker.
Desktop virtualization isn't necessarily a new subject, but it is something that has been growing in popularity over the past few years, and it's easy to understand why. Instead of keeping your desktop in physical form on your computer, it's becoming more reliable to just keep it safe and secure on a hosted server. This takes care of most physical problems that computers often deal with, such as a sudden crash or old age.
Over the past few years, we've seen a revolution in the computer market as mobile device sales skyrocketed and PC sales slumped. If this trend were to continue for just a few more years, PCs would have possibly become extinct. However, as is the case with any trend, it appears things in the computer world may be normalizing.
Do you see those black clouds culminating on the horizon? They represent the possibility that hackers will gain access to your cloud storage. Though it is protected a number of ways, it will not stop an experienced hacker. To them, your defenses are as transparent as those thin, wispy, cirrus clouds that are so welcome on a boiling hot summer day.
When it comes to hosting a party, it can be exhausting – it's a matter of space, cost, and responsibility, among other things. If you're too busy trying to organize everything, nobody will get to see the best side of you. Wouldn't it be so much easier to just hire someone to take care of the details? You would actually be able to enjoy your party!
When you experience an error or a performance issue with your company's computer system, you will troubleshoot the problem in hopes of resolving it quickly. Before you open the case of your hardware and start messing with components, check your cables. Even a small cabling issue can cause big problems with your entire network.
If your business purchases hardware or other supplies from a retailer, or if you are your own point-of-sale, your company might be targeted by a new type of Point-of-Sale malware known as Backoff. The malware is capable of stealing credit card information from unsuspecting victims, and should be a cause for concern for those unprepared to fight against it.
Got a great business idea but lack the capital to make it happen? Many startups are looking to the Internet to find the funds they need to get their project off the ground. Known as crowdfunding, this tool presents entrepreneurs a chance to find supporters in unlikely places, and even find wild potato-salad-like success!
When it comes time to upgrade, many smartphone users will sell off their old device in hopes of making extra cash. However, if the phone's memory is improperly wiped, an experienced hacker can use advanced tools to recover sensitive data off the used phone. Let's talk about how this happens and what can possibly be recovered by a hacker.
Some robots are programed to imitate artificial intelligence, or be the smartest Jeopardy contestant. Others try to fool people into thinking they are real people, and coerce them into giving up sensitive information. But some robots, like the hitchBOT, simply want to hitchhike a ride across Canada.
Google's not just good for scouring the Internet for cat videos and funny memes. Google X, with a new project called Baseline, is now looking to study the makeup of the human body, which they are hoping will be able to prevent disease and foster a more healthy existence for individuals around the world.
It's summertime, and the living's easy... unless you're a small business owner. The heat and great weather is the perfect excuse to take off for a while and use that vacation time you've been saving up. But if you're still worried about leaving your business behind, the mobile technology of a tablet can help you keep in contact and still enjoy your vacation.
We recently covered net neutrality and all of the threats that could compromise our right to indiscriminate Internet service, but a new development concerning 21st Century Fox and Time Warner might be one of the most scary situations yet. In a $80 billion bid, 21st Century Fox attempted a takeover of the media supergiant.
Every new technology comes with optimism that it will better the future. Take for example gunpowder. Invented in the Ninth Century, Chinese alchemists created it while searching for an elixir of immortality. Twenty years ago, the early adopters of the Internet had the same optimism about how this new tech would make the world a nicer place.
The Hackers on Planet Earth (HOPE) conference which took place on Saturday, July 21st 2014, had an important panelist, that being Edward Snowden. Whether he's a whistleblower or a traitor is a hot topic on the web, but one thing is certain - he has called for assistance in creating and promoting anti-surveillance technology to mitigate government spying.
Business is on the move. There is no argument from industry professionals that more business is done on the go today than ever before. A big part of this upward trend in mobile computing is the proliferation of smartphone technology to boost productivity. The capabilities of these devices have increased to the point where any worker can accomplish a cursory amount of work.
Windows XP is a product that has consistently performed well for Microsoft and it continues to see growth, even though it's not supposed to. With its support ending this past April, Windows XP was supposed to never be heard from again. Instead, XP is refusing to go quietly into the night by posting positive usage numbers for June 2014.
Don't trust Google and Yahoo just yet - they might be fake! On July 10th, 2014, Microsoft issued a warning concerning the nature of identical SSL certificates and domains of some popular sites that might allow malicious copycat sites to emerge. As of now, the cause is unknown, but we know that this could be dangerous if you're not prepared to deal with it.
3D Printing is something that has been talked about for years, but has finally become a reality. No longer do we have to deal with flat, lifeless images printed out of ink-wasting printers and machines - but, do we know what kind of impact this new innovation will have on several industries around the world?
Can you imagine a world where language isn't a barrier? Humanity would be able to achieve some crazy things, like perhaps rocketing a skyscraper into outer space! With every passing year, new technology innovations like Skype Translator chip away at the language barrier, making one bright and coherent future!
Technically speaking, it needs to be 158°F for a raw egg to become firm. The summer heat doesn't get that hot, but outdoor objects like sidewalks and car hoods that come in contact with it can. Thus the phrase, "It's so hot you can fry an egg on the sidewalk!" When it's hot outside, you need to keep your server units cool inside.
On the 4th of July, in Oneonta, NY's Neahwa Park, Team Directive participated in the LEAF Council's Tuff eNuff 5K Obstacle Challenge. Our team was comprised of 13 participants, 3 volunteers, and 2 videographers. At 10:30am, they began their heat of the race, along with about 40 other participants.
By the time they reached the finish line, our team was tired and muddy. The majority had some scrapes and bruises. But in the end, everyone from Team Directive who began the challenge, finished it!
We can officially say that: We are Tuff eNuff.
Tuff eNuff is the only local 5K of its kind. Its competitors faced challenges of strength, speed, and endurance, including cross-country running, wading through waist-high water, several climbing obstacles, and a downhill mudslide.
You've heard about how bad a computer crash can be. You may have even experienced a crash yourself, but are you familiar with the technical reason behind a crash? A crash happens when the tiny pieces of a hard disk drive stop working by crashing into each other at very high speeds. When this happens, the data on your computer is lost.