fbpx

Don’t wait any longer. Get started today!

 
 

Directive Blogs

Directive has been serving the Oneonta area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Chris is a hopeless Technology Fanatic, an Inbound & Outbound Marketing Expert as well as a Senior IT Advisor, Web, Graphics & Software Designer. When he's not running Directive and JoomConnect he's probably sharpening his skills as an Amateur Photographer and Filmmaker. Chris lives with his wife Charlotte and their 2 sons in Upstate NY. Visit his photography site at www.directivestudios.com.

To Understand the Hacker, You Must Become the Hacker

b2ap3_thumbnail_hacker_information_400.jpgHackers are mysterious. Not much is known about them - until they get caught, at least. But until the divine hammer of justice is brought down upon them, they will continue to stalk the shadows and wait for us to unknowingly hand over our personal information. What they don't want you to know is that they generally act according to a few particular variables, and that it is possible to avoid their pitfalls.

0 Comments
Continue reading

Tip of the Week: Organize Your Microsoft Outlook Contact List

microsoft outlookWhat's your Microsoft Outlook contact list looking like these days? For many busy business owners, their email contacts list is jumbled and unorganized, making it difficult to do something simple like locate needed information. Here are a few tips to help you better organize your Outlook contacts so that you can quickly find what you're looking for.

0 Comments
Continue reading

“Zero Trust” Network Security: Only Trust Data as Far as You Can Throw It!

zero trust 400When it feels like everybody is out to get you, there's only one way to survive: Trust nobody. You may not have too many physical enemies ready to jump you, but there's an army of hackers wanting to breach your company's database. One of the securest ways to keep your company's information safe is to implement a "zero trust" network security model.

0 Comments
Continue reading

The Medieval Art of Guilds, IT-Style

it guilds 400In days of old, skilled people of all crafts joined together to improve the quality of their lives and their products. These were called guilds, and they're not unlike small businesses of today; a group of like-minded individuals who come together to make the public's lives easier. Your business is no different, and at Directive, we understand that.

0 Comments
Continue reading

Apple’s iPhone 6 and iPhone 6+ Bend Expectations

b2ap3_thumbnail_iphone_6_and_6_plus_400.jpgApple is back with another iPhone! The Silicon Valley-based hardware and software manufacturer has released the new versions of their extremely popular iPhone series of devices. The two-headed approach that Apple took with their second incantation of the iPhone 5 (the 5s and 5c), is replicated this time out as well. After being surpassed by Samsung over the past two years, does the iPhone 6 and its larger version, the iPhone 6+, have what it takes to get Apple back on top?

0 Comments
Continue reading

How Long Until Automation Takes Away Existing Jobs?

b2ap3_thumbnail_will_automation_userp_human_workers_400.jpgAutomation is an increasingly sought-after convenience in the workplace, especially when it comes to repetitive tasks. Some professionals foresee a world which has fully automated assembly lines, but most are only concerned about what this can do for their assets. Instead of freeing up menial positions for others to take on more meaningful existences, could automation destroy these jobs completely?

0 Comments
Continue reading

3 Benefits Virtual Servers Bring to Your Business

b2ap3_thumbnail_virtual_server_400.jpgVirtualization is all the rage in the technology world. In fact, virtual servers are practically omnipresent in modern workplaces. Why? Because they offer businesses unprecedented opportunity for growth and development. The benefits of virtualized servers far outweigh the costs, aiding businesses in expanding their goals and visions for the future.

0 Comments
Continue reading

Tip of the Week: How to Prevent IT Equipment Theft

b2ap3_thumbnail_device_theft_400.jpgHow familiar are you with the IT equipment owned by your business? If you don't keep detailed records of your equipment and enact security measures and policies, then you're making it easy for theft to occur. We've written a lot about protecting your business from data theft, but it's equally important that you take precautions to safeguard your stuff.

0 Comments
Continue reading

Herding Cats is Harder Than it Looks

b2ap3_thumbnail_cats_cats_cats_400.jpgHerding cats is a business term used to describe the task of organizing and controlling entities like people and systems known for being uncontrollable and even chaotic. Due to the unpredictable and independent nature of felines, cat herding captures the idea of controlled chaos perfectly. Does running your business feel like you're working on a cat ranch?

0 Comments
Continue reading

BadUSB: Theoretical Malware Turned Reality

b2ap3_thumbnail_usb_security_400.jpgWe reported in August that security researcher Karsten Nohl of SR Labs revealed a flaw in USB firmware that cripples the technology beyond repair. At the Black Hat security conference, it was revealed that USB devices of all kinds can be targeted by hidden malware. Nohl refused to release the code used in the research, due to being concerned that it would be used by the wrong hands, but it has been made public anyway, putting the masses at risk.

0 Comments
Continue reading

Small Businesses Need an Intranet

b2ap3_thumbnail_intranet_400.jpgAs a small business owner, you enjoy the ability to operate quickly when action is needed. You appreciate the ease of communication within your office, and you can get things accomplished simply and efficiently. At least, that's the goal; maybe things aren't so smooth. One way to fix that is by integrating an intranet into your workplace.

0 Comments
Continue reading

Just 28% of Organizational Data Stored Has a Clear Business Value

b2ap3_thumbnail_dark_data_400.jpgAccording to a recent survey by IDG Research Services of business and technology leaders, on average, only 28 percent of data stored and maintained has value to the day-to-day operations of a business. Translation: a whopping 72 percent of files stored by a business are useless.

0 Comments
Continue reading

BYOD Might Not Be a Good Fit for Every Business

b2ap3_thumbnail_bring_your_own_device_400_20141006-204024_1.jpgThe concept behind BYOD seems really good--employees bring their personal devices to work and use them to accomplish company projects. Initially, BYOD was well received, but after reviewing the security risks, more companies are opting out of it. Is there another way to use mobile devices at work without all the hassle and risks of BYOD?

0 Comments
Continue reading

What Do You Look for in a Cloud Service Provider?

b2ap3_thumbnail_cloud_computing_400.jpgThe cloud is the next big thing for some businesses, but a lot of the time, there are too many options thrown at them all at once. They aren’t sure what the best path is for their business. A cloud solution can provide your company with a lot of benefits, but you want only the best for your business.

0 Comments
Continue reading

Tip of the Week: How to Find the Perfect VoIP Plan for Your Business

b2ap3_thumbnail_voip_for_you_400.jpgIf your business has a reliable and high-speed Internet connection, then you’ve got what it takes to experience significant savings by switching your company’s phone system to VoIP (Voice over Internet Protocol). Once you’ve decided to make the switch, you will next have to select a VoIP solution that’s right for your organization. Here are some tips to help you make this important decision.

0 Comments
Continue reading

Does the FCC’s Sack of the NFL Blackout Ruling Bode Well for Net Neutrality?

b2ap3_thumbnail_nfl_blackout_sacked_400.jpgAutumn is a time of change and tradition, and perhaps one of the most well-known is the return of football season. Previously, the broadcasting of local NFL games was restricted by the blackout rule, but a recent revocation of the rule could change everything. Whether you are a football fan or not, this decision to revoke the blackout rule could affect future decisions made by the FCC.

0 Comments
Continue reading

The End of an Era: the Harkonnen Hacking Operation is Over

b2ap3_thumbnail_harkonnen_hackers_400.jpgFor the past 12 years, the Harkonnen Operation has plagued Europe. The malware campaign, operating scams in Germany, Switzerland, and Austria since 2002, has finally ended, but that doesn't change the fact that it may be the most long-lived malware to have existed. What kept security firms from discovering these attacks and preventing them for so long?

0 Comments
Continue reading

Why Did Microsoft Skip Windows 9? Because Seven Eight Nine! (Get it?)

b2ap3_thumbnail_windows_10_400.jpgThe news is out; what was previously thought to be Windows 9, codenamed “Threshold,” has been revealed to be Windows 10. While leaks have already shown us quite a bit of what the latest installment of Windows can do, the official reveal goes into more detail about the nature of Windows 10 for enterprises and even common users. First, let’s go over what we already know about the enigmatic new operating system, then we’ll get into the juicy new details.

0 Comments
Continue reading

au·dit/ noun/: a systematic review or assessment of something

b2ap3_thumbnail_it_audit_400.jpgAre you confident that your company's network is 100 percent secure? The best way to answer "yes" to this question is with a network audit. This is a technical procedure where IT professionals analyze every nook and cranny of your system, looking for every possible vulnerability. No matter what the situation is with your company's IT management, a network audit is worth doing.

0 Comments
Continue reading

Fight the Power: How A California Restaurant is Tackling Yelp’s Rating System

b2ap3_thumbnail_decisions_400.jpgThe Internet makes marketing your business much easier, but it's not that way for everyone. A restaurant in California has responded to the standard Internet marketing strategy with an out-of-the-box method of its own. David Cerretini, co-owner of the Italian restaurant Botto Bistro, has told his strategy to USA Today; "I want to be the worst restaurant in the San Francisco area!"

0 Comments
Continue reading

As the Facebook Empire Grows, the Acquisitions Keep Coming

b2ap3_thumbnail_facebook_is_buying_400.jpgIt's no secret that Facebook is one of the most visited sites on the Internet. In fact, according to the Alexa rankings, which measure website traffic, facebook.com is ranked second after only Google.com. With this much exposure, and the emanated revenue that comes from this kind of traffic, it has become important for the world's largest and most successful social network to scout out and eliminate possible competitors, many times before those companies even consider themselves potential competitors.

0 Comments
Continue reading

Tip of the Week: How to Reorganize Your IT Infrastructure

b2ap3_thumbnail_get_your_it_in_order_400.jpgEveryone needs a tip occasionally. Therefore, we want to provide our followers with what we like to call, "Tips of the Week." These helpful tidbits are targeted toward helping you understand certain aspects of business technology. For our first tip, we will walk you through how to reorganize your IT infrastructure. For more tips, see our previous blog articles.

0 Comments
Continue reading

Save $11,000 Annually for Each Telecommuting Employee

b2ap3_thumbnail_tellecommuting_is_best_400.jpgA lot of employers are nervous about letting their employees work from home, but due to the increased evidence that it can be beneficial to productivity and cost-efficiency, it's getting more and more difficult to avoid thinking about it. In fact, according to Global Workplace Analytics, working from home has grown a whopping 80 percent in the United States since 2005.

0 Comments
Continue reading

Alert: Don’t Get Hit with Shellshock by the New Bash Bug

b2ap3_thumbnail_alret_bash_bug_400.jpgA new malicious threat in the technical marketplace has just been discovered. The bug, dubbed the Bash bug, or "shellshock," is on the loose for users of Unix-based operating systems, like Linux or Mac OS X. It allows the execution of arbitrary code on affected systems, and could potentially be very dangerous for your business. In fact, CNet is calling it "bigger than Heartbleed."

0 Comments
Continue reading

Tip of the Week: How to Clean your Laptop

b2ap3_thumbnail_clean_laptop_400.jpgThis is our first article in a series of helpful technology tips that we will publish every week. For more great tips, check out our previous blog articles. This week, we're walking you through the proper way to clean your laptop.

0 Comments
Continue reading

Are You Sure Your Former Employees Won’t Stab You in the Back?

b2ap3_thumbnail_former_employee_theft_400.jpgAs a business owner, you've probably had the misfortune of letting a valued (or not-so-valued) employee go. The reasons might vary, but one thing is consistent: they're gone, and could potentially use their newfound residual malice to strike your business right where it hurts. How can you prepare yourself against former employees you may have once called "family?"

0 Comments
Continue reading

Organize Your Microsoft Outlook 2013 Contacts the Easy Way

b2ap3_thumbnail_big_data_help_400.jpgAs a business owner, your email contacts list is probably chock-full of clients and customers you've met over the years. This can make it difficult to find your target without sifting through countless names. Instead of getting flustered by an unorganized list, try sorting your contacts in various ways.

0 Comments
Continue reading

How to Find Greater Success By Reading More Books

b2ap3_thumbnail_read_with_spead_400.jpgAs a business leader, you know that you should read more about the latest industry trends and helpful management concepts. How's that going for you? For many business owners, finding time just to run their business is difficult enough, making book reading a luxury. We've found that you can do both by learning how to speed read.

0 Comments
Continue reading

Sexy New Windows 9 Photos Leaked All Over the Web [VIDEO]

b2ap3_thumbnail_windows_9_coming_400.jpgWell, now that we've got your attention, it's a good time to mention that leaked photos and a video of what may be Windows 9, currently called Threshold, have been leaked to the web. As the next entry in the Windows family of operating systems, it has been highly anticipated since the return of a Start menu was displayed in April 2014. Microsoft has a lot of ground to cover after Windows 8, but will Windows 9/Threshold deliver?

0 Comments
Continue reading

How Are Modern Businesses Taking Advantage of the Cloud?

b2ap3_thumbnail_cloud_computing_for_business_400.jpgFor the modern-day business owner, moving to the cloud means to take advantage of the several strategic advantages it offers. Companies no longer have to restrict themselves by relying on physical servers, desktops, or hardware. Most businesses see the value that cloud-based operations can offer them, and they are racing to take advantage of this fairly recent development. In fact, Joe McKendrick of Forbes magazine says that four-out-of-five small businesses will be based in the cloud in the near future.

0 Comments
Continue reading

New Security Threat: Don’t Get Jacked While Juicing!

b2ap3_thumbnail_usb_security_tips_400.jpgHackers today are trying every approach possible to steal your device's data, including the hijacking of public USB ports. This technique is known as "juice jacking," and with this new threat, you should think twice about charging your device using a public USB charging kiosk, or even the USB port on a friend's computer.

0 Comments
Continue reading

3 Shopping Tips to Protect Yourself from the Next Major Retail Data Breach

b2ap3_thumbnail_credit_card_security_400_20140917-125022_1.jpgMajor retailers are having a rough time of it these days concerning the security of their customer's financial information. Last December, Target was hit with malware that compromised 40 million customer credit and debit card accounts, and recently, Home Depot was hit with the same malware. What's a connoisseur of mass-produced boxed goods to do?

0 Comments
Continue reading

Even Farmers Can Take Advantage of the Internet of Things

b2ap3_thumbnail_big_data_farmer_400.jpgThe Internet of Things is on its way, and we are seeing new applications for web-connected devices every day. Perhaps one of the most interesting ways to use Internet of Things technology is its integration into agriculture, or more specifically, artichoke growing at Ocean Mist Farms in Salinas Valley, California.

0 Comments
Continue reading

Make Dynamic Infographics with Microsoft PowerPoint

b2ap3_thumbnail_powerpoint_for_infographs_400.jpgNot only can Microsoft PowerPoint make great slideshows, it can also make engaging infographics. The latest trend in marketing is fairly simple: Visual content sells. Images and videos are the most popular way to take advantage of this. Infographics can offer your marketing campaign a combination of text and image, allowing your marketing content to be both engaging and informative.

0 Comments
Continue reading

BYOD Privacy: When Two Phones are Better Than One

b2ap3_thumbnail_bring_your_own_device_400.jpgBring Your Own Device (BYOD) has been a hot IT trend for the past few years. Initially, everybody loved the idea of workers using their personal smartphone for work and organizations were quick to adopt BYOD. Now, after years of trying out the policy, companies and employees are having reservations about BYOD, making some even long for the days of Blackberry.

0 Comments
Continue reading

Don’t Get Caught in a Software-Licensing Nightmare

b2ap3_thumbnail_software_licensing_current_400.jpgA business owner must understand the licensing status of their company's software, but this has grown more complicated since the inception of the Internet. If you feel like your employees, or maybe even your corporate culture survives off of pirated software or applications, or stuff you found "for free" online, then your business could potentially suffer from legal issues.

0 Comments
Continue reading

OneNote Online - Microsoft OneDrive’s Note Taking Solution

b2ap3_thumbnail_microsoft_onenote_400.jpgTaking notes is a pain, and we all know that. One of the biggest problems with taking notes is that your team might store them all in different places. Before you know it, you have no idea where anything is or what has been done. Microsoft's OneNote on OneDrive changes that, providing a collaborative cloud-based solution for note taking.

0 Comments
Continue reading

Can Minecraft Teach Kids Valuable Real-World Programming Skills? [VIDEO]

b2ap3_thumbnail_minecraft_class_400.jpgChildren across the world are heading back to school, and their parents breathe a sigh of relief. Instead of playing video games, children can now expand their minds in institutions designed for learning. But, what if a popular video game could teach children how valuable programming is as a real-world skill?

0 Comments
Continue reading

The Legendary Router Malware

b2ap3_thumbnail_router_protection_400.jpgWhen diagnosing your computer's security problems, it should be noted that malware is not always located on the PC itself. A lot of the time, problems could be occurring in a number of different operating systems and browsers, making it difficult to diagnose the cause. A recent study by Ronald Kaplan and Dylan Kaplan proved that malware can be located not only on your computer and devices, but even on your wireless router.

0 Comments
Continue reading

New Study Shows Data Center Growth Threatens the Environment

b2ap3_thumbnail_data_center_growth_400.jpgMost of the Internet's data is stored in data centers. Logistically, data centers are a great solution to store ridiculous amounts of data. However, from an environmental perspective, data centers may be doing more harm than good. This, according to a new report by the National Resources Defense Council.

0 Comments
Continue reading

Malware Puts Regional UPS Customers at Risk

b2ap3_thumbnail_you_have_been_hacked_400.jpgThe Vestal, NY location of UPS has recently notified customers that they have been the victim of a data breach that has affected over 50 stores. According to a spokeswoman for UPS, any customer who had used a credit or debit card at the affected stores between April 29, 2014 and August 11, 2014 could be impacted.

0 Comments
Continue reading

Programming Classes to Enter French Primary Schools

b2ap3_thumbnail_ecole_en_francais_400.jpgAcross the country kids are hopping on buses and heading back to school. Schools sure have changed and classes aren't quite the same as they used to be. Perhaps the most important thing about these changes has been the classes available for the kids. In fact, some schools have started teaching children how to code, and France is next on the list.

0 Comments
Continue reading

Do We Have the Right to Be Forgotten?

b2ap3_thumbnail_right_to_be_forgotten_400.jpgIn Europe, there's a lot of discussion about whether or not citizens have the right to be forgotten, or rather, be forgotten by search engines. According to a May 2014 ruling, search engines must consider requests from the public for removal of content. Not just any content, though; according to ZDNet, the content must be "inadequate, irrelevant, or no longer relevant." As you might guess, this concept is extremely controversial.

0 Comments
Continue reading

3 Easy Actions Your Business Can Take to Go Green!

b2ap3_thumbnail_start_going_green_400.jpgWith more businesses becoming aware of the environmental impact of their day-to-day operations, one would assume that a practice like printing would be on the decline due to how wasteful it is. Unfortunately, this isn't the case. Despite advances in digital communication, paper consumption continues to increase by 20 percent each year in modern offices.

0 Comments
Continue reading

Public Cloud Computing: Right For Your Business, but Not For Jennifer Lawrence

b2ap3_thumbnail_confidential_files_leaked_400.jpgHow your business chooses to store its data is a major decision. You can implement a private cloud computing model and spend more on equipment and maintenance than you need to, or you can save money with a public cloud. Although, in light of the recent celebrity-nude-photo-iCloud hack, is the public cloud secure enough to host your company's data? Let's address this concern and explore your cloud computing options.

0 Comments
Continue reading

Data Recovery Testing: The One Test That Will Save Your Business!

b2ap3_thumbnail_test_your_data_redundancy_system_400.jpgEvery business owner understands the importance of planning and the proper implementation of said plans. However, after everything is set up, it's easy to overlook the testing of one's plans, which can really come back to hurt you when all of your careful planning falls apart. Nowhere is this more true than with data recovery.

0 Comments
Continue reading

3 Ways to Keep IT Simple Stupid (KISS)

b2ap3_thumbnail_keep_it_simple_stupid_400.jpgKeep It Simple Stupid, aka KISS, is a sure way to find success in business. By keeping operations simple, the cost of doing business is reduced, there's less room for error, and more people understand what's going on. Your IT infrastructure is at the heart of your organization, keeping IT simple will help your business kiss many of its problems goodbye!

0 Comments
Continue reading

3 Sure Ways to Increase Workplace Productivity

b2ap3_thumbnail_stay_productive_for_your_business_400.jpgThe office is a unique place designed solely for the purpose of getting work done. Therefore, no matter how your workplace is designed, there's always room to improve it in order to squeeze out a few more precious minutes of productivity from each worker. As productivity goes, every minute saved adds up!

0 Comments
Continue reading

How Much Cash Can Hackers Cost Your Business?

b2ap3_thumbnail_costs_of_data_security_400.jpgCrime might pay for those bold enough to do it, but that doesn't mean everyone should. Hackers likely don't take into account the fact that they are costing the world countless millions of dollars in damage only to further their own gain, and their influence can have far-reaching effects on people all over the world, let alone your business.

0 Comments
Continue reading

Almost Half of Business Owners Reply to Work Email While on Vacation

b2ap3_thumbnail_relax_on_a_beach_400.jpgYou're on vacation with your family and your smartphone notifies you about a work email entitled "URGENT!" What do you do? Checking the message could mean hours spent putting out a fire at the office. Ignoring it will give you more time with your family, but you'll be distracted and stressed the whole time thinking about the worst-case scenario.

0 Comments
Continue reading

Dish Network Speaks Out Against Proposed TimeWarner Cable-Comcast Merger

b2ap3_thumbnail_net_neutrality_petition_400.jpgThere have been a lot of complaints against the proposed Comcast-Time Warner Cable merger, and finally, another prominent service provider has spoken out against it. Dish Network has expressed their dismay over the cable juggernauts' union in a very long, in-depth petition aimed at convincing the Federal Communications Commission to shoot down the merger before it destroys cable provider competition.

0 Comments
Continue reading

Understanding Basic Formulas in Microsoft Excel 2013

b2ap3_thumbnail_Excel_for_databases_and_spreadsheets_400.jpgIt can be difficult to keep track of your budget and expenses, especially when prices and needs are always changing. But perhaps the biggest annoyance is the intense paper trail that you leave behind when building your budget. By taking advantage of Microsoft Excel's formulas, you can easily keep track of your budget and alter it as prices change and demand increases.

0 Comments
Continue reading

Sun Tzu Says, Protect Your IT Network!

b2ap3_thumbnail_sun_tzu_it_provider_400.jpgThe art of war is of vital importance to the State. It is a matter of life and death, a road either to safety or to ruin. Hence it is a subject of inquiry which can on no account be neglected.
- Sun Tzu, The Art of War

The ancient Chinese military general Sun Tzu might have been around long before the Internet was a thing, but he sure knew how to make an impression on the world. In his extremely influential book on ancient Chinese warfare, The Art of War, he says that "every battle is won before it's ever fought." This applies to protecting your IT network, too.

0 Comments
Continue reading

Staying Ahead of Big Data is No Small Task

b2ap3_thumbnail_big_data_analytics_400.jpgCivilization has passed through various ages, like the Stone Age, the Ice Age, Bronze Age, and so on. And now, we're progressing through another one - the Data Age. In fact, 90 percent of the world's data was created in 2013. With each new device and system comes an incredible amount of data that must be processed, stored, and catalogued. This is Big Data, and the way that your business works with this information will determine the success of your business in the Data Age.

0 Comments
Continue reading

The Dangerous Consequences of Posting Pics, and 3 Steps You Can Take to Protect Yourself

b2ap3_thumbnail_protect_your_likeness_400.jpgToday, almost everybody has an Internet-connected camera in their pocket. A crazy amount of photos are posted online. In fact, Facebook alone claims to have over 250 billion photos, with 350 million user images posted every day. All of these pictures are fun, but how do you ensure that only the people you want to see your photos are seeing them?

0 Comments
Continue reading

Mobile Devices Leaving an Unsavory Taste in Restaurant Owner’s Mouth

b2ap3_thumbnail_problems_for_smartphones_restaurant_400.jpgSmartphones have revolutionized the way that we communicate with each other and increased productivity, but for some businesses, they are only making things worse. A perfect example of this is the restaurant business - in fact, one restaurant owner decided to take matters into his own hands, and has performed a study which examined their business before and after the mobile revolution.

0 Comments
Continue reading

Have You Experienced Internet Troubles Lately?

b2ap3_thumbnail_internet_speed_slow_400.jpgYou may have noticed last week that the Internet was having some trouble with its operating speeds, but now we know for sure why. The root of the problem lies in Tier 1's Internet routers' Border Gateway Protocol routing tables, which have exceeded their maximum size, and has brought about the failure of these routers to operate at maximum speed. 

0 Comments
Continue reading

Hackers Lay Claim to 4½ Million Medical Records

b2ap3_thumbnail_stethescope_keyboard_400.jpgIf 2014 hasn't been a legendary year for data breaches yet, it certainly is now. Community Health Systems, a hospital network for over 206 facilities across the United States, has been the target of a data breach resulting in 4.5 million records being compromised by Chinese hackers, including Social Security numbers, birthdays, names, addresses, and telephone numbers.

0 Comments
Continue reading

Oh No, My Laptop is Stolen! Now What? Here are 4 Steps.

b2ap3_thumbnail_stolen_laptop_what_now_400.jpgPicture this, you're at the airport with your laptop, knocking out an important project between flights. Suddenly, you're approached by some touristy-looking people about taking their picture. You're a nice person so you grant them their request. After a longer-than-expected photo session, you return to your seat only to find that your laptop has been stolen. You've been conned.

0 Comments
Continue reading

Hairballs and WiFi Data are What the Cat Dragged In

b2ap3_thumbnail_warkitteh_on_the_loose_400.jpgFor Washington D.C. residents, there's a dubious threat looming in their backyards putting their personal data at risk. It's Coco, a Siamese cat wearing a high-tech collar designed for hacking WiFi networks. Have you taken the proper security measures to protect your sensitive information from feline foes like Coco?

0 Comments
Continue reading

Grab the Air Freshener for These 2 Stinky IT Brain Fart Stories!

b2ap3_thumbnail_it_mistakes_400.jpgWe all experience temporary mental lapses (also known as "brain farts"). The worst kind of brain flatulence is when the consequences stink up the workplace, causing downtime and loss of revenue. One of the worst places to let a brain fart rip is in the IT department.

0 Comments
Continue reading

3 Results Businesses are Demanding from Their Outsourced IT Provider

b2ap3_thumbnail_outsourced_it_key_to_success_400.jpgOutsourcing your companies IT is a great way to free up money and take advantage of time-saving remote services. Businesses have different reasons for signing up for the outsourcing service, but many clients have similar expectations of the results they want out of their managed IT service provider.

0 Comments
Continue reading

Even the White House Needs IT Services

b2ap3_thumbnail_white_house_needs_it_services_400.jpgA change is happening in the White House. Mikey Dickerson, a Google site reliability engineer, has just been appointed by the United States government as the deputy federal CIO, proving that even the big wigs need consulting from time-to-time.

0 Comments
Continue reading

Smartphone Demographics - Shaken, not Stirred, with a Lemon Twist

b2ap3_thumbnail_what_kind_of_smartphone_user_are_you_400.jpgThe battle between iOS and Android operating system enthusiasts has been a long and bloody affair with plenty of third-party casualties (sorry Blackberry), but did you know that you might be able to tell a lot about someone just by looking at their smartphone?

0 Comments
Continue reading

Microsoft to Discontinue Support for Old Internet Explorer Versions

b2ap3_thumbnail_internet_explorer_400.jpgIn an attempt to push users toward the most recent installment of Internet Explorer (IE 11), Microsoft has announced that, as of January 2016, all older versions of Internet Explorer will reach their end-of-support date. This means discontinued patching and security update support, putting all who refuse the upgrade at risk.

0 Comments
Continue reading

Is Your Antivirus Software Up to Snuff?

b2ap3_thumbnail_is_your_antivirus_working_for_you_400.jpgAll of the security breaches and vulnerabilities of 2014 sure have made for an interesting year; first Heartbleed, then the Internet Explorer vulnerability, GameOver Zeus, and the Russian password-stealing gang. In light of these events, you really have to ask the question, "how can we fight these threats?" Symantec has told The Wall Street Journal that they feel antivirus technology is "dead."

0 Comments
Continue reading

5 Gmail and Outlook Tricks to Cut Corners On Your Email Time

b2ap3_thumbnail_email_tricks_400.jpgWe all know how annoying email can be at times. Your inbox is constantly being filled with new messages, and before you know it, you have no idea what you've responded to or what needs to be responded to. To make matters worse, the average office worker spends roughly two hours staring at their email inbox and responding to messages. Not only is this counterproductive, but is also a massive time-wasting practice.

0 Comments
Continue reading

Computing Giants Microsoft and Apple Still Fighting in New Mobile Frontier

b2ap3_thumbnail_apple_windows_mobile_400.jpgMicrosoft and Apple have been at the forefront of personal computing since the 1970s. The competition has caused partnerships and strain between the two companies and in the interim, created hardware and software that would change the world. Although the two companies will be forever linked, they both are betting on mobile, and for good reason.

0 Comments
Continue reading

DecryptCryptoLocker Provides Fix for Nasty Ransomware

b2ap3_thumbnail_decryptolocker_400.jpgA few months ago, we mentioned that a ransomware called CryptoLocker was spreading at a dangerous rate due to the GameOver Zeus malware. The ransomware would lock down files on victims' computers until a fee was paid, but not anymore. Now, with the help of FireEye and Fox-IT, a solution has been created called DecryptCryptoLocker.

0 Comments
Continue reading

4 Benefits of Virtualizing Your Desktop

b2ap3_thumbnail_hosted_desktop_solutions_400.jpgDesktop virtualization isn't necessarily a new subject, but it is something that has been growing in popularity over the past few years, and it's easy to understand why. Instead of keeping your desktop in physical form on your computer, it's becoming more reliable to just keep it safe and secure on a hosted server. This takes care of most physical problems that computers often deal with, such as a sudden crash or old age.

0 Comments
Continue reading

Is it Time for the PC to Make a Comeback?

b2ap3_thumbnail_pc_sales_are_rebounding_400.jpgOver the past few years, we've seen a revolution in the computer market as mobile device sales skyrocketed and PC sales slumped. If this trend were to continue for just a few more years, PCs would have possibly become extinct. However, as is the case with any trend, it appears things in the computer world may be normalizing.

0 Comments
Continue reading

USB Software is Bad to the Bone, Literally

b2ap3_thumbnail_badusb_a_threat_400.jpgUSB devices have long been a staple of the technology world, but are notoriously vulnerable to exploitation from hackers and malware. As malware grows more and more sophisticated, you can no longer trust simple antivirus scans to protect your business.

0 Comments
Continue reading

When it Rains, it Pours – Keep Your Cloud-Based Data Safe

b2ap3_thumbnail_keep_cloud_data_safe_400.jpgDo you see those black clouds culminating on the horizon? They represent the possibility that hackers will gain access to your cloud storage. Though it is protected a number of ways, it will not stop an experienced hacker. To them, your defenses are as transparent as those thin, wispy, cirrus clouds that are so welcome on a boiling hot summer day.

0 Comments
Continue reading

Be the Life of the Party: Server Hosting

b2ap3_thumbnail_server_host_400.jpgWhen it comes to hosting a party, it can be exhausting – it's a matter of space, cost, and responsibility, among other things. If you're too busy trying to organize everything, nobody will get to see the best side of you. Wouldn't it be so much easier to just hire someone to take care of the details? You would actually be able to enjoy your party!

0 Comments
Continue reading

Troubleshoot Performance Issues with These 3 Network Cabling Tips

b2ap3_thumbnail_useful_cabling_tips_400.jpgWhen you experience an error or a performance issue with your company's computer system, you will troubleshoot the problem in hopes of resolving it quickly. Before you open the case of your hardware and start messing with components, check your cables. Even a small cabling issue can cause big problems with your entire network.

0 Comments
Continue reading

Use a Firewall Before You Get Burned

b2ap3_thumbnail_security_procedure_including_firewall_400.jpgToo many people think that their systems are safe from the corruption of hackers and viruses. They're wrong. In order to keep your business safe from all of the common threats found on the Internet, you should think about installing some protective software.

0 Comments
Continue reading

ALERT: Back Off! New Point-of-Sale Malware Threatens Businesses

b2ap3_thumbnail_point_of_sale_malware_400.jpgIf your business purchases hardware or other supplies from a retailer, or if you are your own point-of-sale, your company might be targeted by a new type of Point-of-Sale malware known as Backoff. The malware is capable of stealing credit card information from unsuspecting victims, and should be a cause for concern for those unprepared to fight against it.

0 Comments
Continue reading

What’s it Take to Have Your Idea See Potato-Salad Success? [VIDEO]

b2ap3_thumbnail_yummy_potato_salad_400.jpgGot a great business idea but lack the capital to make it happen? Many startups are looking to the Internet to find the funds they need to get their project off the ground. Known as crowdfunding, this tool presents entrepreneurs a chance to find supporters in unlikely places, and even find wild potato-salad-like success!

0 Comments
Continue reading

How an Intimate Selfie That’s Deleted Can Be Recovered and Used for Blackmail

b2ap3_thumbnail_smartphone_security_400.jpgWhen it comes time to upgrade, many smartphone users will sell off their old device in hopes of making extra cash. However, if the phone's memory is improperly wiped, an experienced hacker can use advanced tools to recover sensitive data off the used phone. Let's talk about how this happens and what can possibly be recovered by a hacker.

0 Comments
Continue reading

Would You Give a Hitchhiking Robot a Ride Cross-Country?

robot-beach-blog-banner-image.jpgSome robots are programed to imitate artificial intelligence, or be the smartest Jeopardy contestant. Others try to fool people into thinking they are real people, and coerce them into giving up sensitive information. But some robots, like the hitchBOT, simply want to hitchhike a ride across Canada.

0 Comments
Continue reading

New Google X Initiative Studies the Molecular and Genetic Structure of the Human Body

b2ap3_thumbnail_google_logo_400.jpgGoogle's not just good for scouring the Internet for cat videos and funny memes. Google X, with a new project called Baseline, is now looking to study the makeup of the human body, which they are hoping will be able to prevent disease and foster a more healthy existence for individuals around the world.

0 Comments
Continue reading

A Teenage Girl’s Phone Explodes! [VIDEO]

b2ap3_thumbnail_burned_up_phone_400.jpgAny user of the latest mobile technology may have noticed their device running a little hot. In normal circumstances, a device that's warm to the touch is nothing to be concerned about. Although, there are documented cases where a device in perfectly good working order overheats and goes kablooey!

0 Comments
Continue reading

Beware of Government-Grade Malware - Especially from Hackers

b2ap3_thumbnail_government_grade_malware_400.jpgThanks to Edward Snowden's revelations concerning the National Security Agency's (NSA) questionable online practices, we now know that there are ways that we can be watched by others and not even know about it. But what's really scary is that malware exists that can accomplish this same goal.

0 Comments
Continue reading

Consume Your Media On-the Go this Summer with these 3 Tablet Tips

b2ap3_thumbnail_tablet_on_vacation_400.jpgIt's summertime, and the living's easy... unless you're a small business owner. The heat and great weather is the perfect excuse to take off for a while and use that vacation time you've been saving up. But if you're still worried about leaving your business behind, the mobile technology of a tablet can help you keep in contact and still enjoy your vacation.

0 Comments
Continue reading

Not So Fast: Time Warner Declines 21st Century Fox’s Takeover Bid

b2ap3_thumbnail_not_so_fast_400.jpgWe recently covered net neutrality and all of the threats that could compromise our right to indiscriminate Internet service, but a new development concerning 21st Century Fox and Time Warner might be one of the most scary situations yet. In a $80 billion bid, 21st Century Fox attempted a takeover of the media supergiant.

0 Comments
Continue reading

Apple’s iOS May Contain Backdoors to Leak Sensitive Information

b2ap3_thumbnail_ios_vulnerability_is_curious_400.jpgApple's iOS operating system might be well known for its impressive security features, but that doesn't mean that it's invulnerable to all threats. In fact, backdoors may have been located in the operating system, which allow Apple and law enforcement agencies like the NSA to access the devices.

0 Comments
Continue reading

Internet Users in 1993 Had Too Much Faith in Humanity [VIDEO]

b2ap3_thumbnail_look_what_is_possible_400.jpgEvery new technology comes with optimism that it will better the future. Take for example gunpowder. Invented in the Ninth Century, Chinese alchemists created it while searching for an elixir of immortality. Twenty years ago, the early adopters of the Internet had the same optimism about how this new tech would make the world a nicer place.

0 Comments
Continue reading

What Could Anti-Surveillance Technology Mean for National Security?

b2ap3_thumbnail_are_they_watching_you_400.jpgThe Hackers on Planet Earth (HOPE) conference which took place on Saturday, July 21st 2014, had an important panelist, that being Edward Snowden. Whether he's a whistleblower or a traitor is a hot topic on the web, but one thing is certain - he has called for assistance in creating and promoting anti-surveillance technology to mitigate government spying.

0 Comments
Continue reading

Old Mobile Devices Might Be Hurting Your Business’s Security

b2ap3_thumbnail_old_tech_security_risk_400.jpgOne of the greatest things about today's technology is that it has grown more mobile, and some employees like to bring their own devices from home to use for their workplace. This is called BYOD, and while it is useful sometimes, it might be putting your business at risk.

0 Comments
Continue reading

5 of the Best Android Smartphones on the Market Right Now

b2ap3_thumbnail_top_android_smartphones_400.jpgBusiness is on the move. There is no argument from industry professionals that more business is done on the go today than ever before. A big part of this upward trend in mobile computing is the proliferation of smartphone technology to boost productivity. The capabilities of these devices have increased to the point where any worker can accomplish a cursory amount of work.

0 Comments
Continue reading

Google Strengthens Zero-Day Exploit Research

b2ap3_thumbnail_google_research_400.jpgWith all of the zero-day exploits popping up lately, such as the GameOver Zeus malware and Heartbleed bug a few months ago, it only makes sense to step up research on how and why it occurs. Google is doing just that with its new research program, rightfully dubbed Project Zero.

0 Comments
Continue reading

It’s Bizarro World at Microsoft as Use of XP Grows and Windows 8 Declines!

b2ap3_thumbnail_xp_use_makes_for_confusion_400.jpgWindows XP is a product that has consistently performed well for Microsoft and it continues to see growth, even though it's not supposed to. With its support ending this past April, Windows XP was supposed to never be heard from again. Instead, XP is refusing to go quietly into the night by posting positive usage numbers for June 2014.

0 Comments
Continue reading

Alert: Google and Yahoo Doppelgangers Threaten the Internet

b2ap3_thumbnail_doppleganger_scam_400.jpgDon't trust Google and Yahoo just yet - they might be fake! On July 10th, 2014, Microsoft issued a warning concerning the nature of identical SSL certificates and domains of some popular sites that might allow malicious copycat sites to emerge. As of now, the cause is unknown, but we know that this could be dangerous if you're not prepared to deal with it.

0 Comments
Continue reading

Make Lasting Business Connections with LinkedIn

b2ap3_thumbnail_linkedin_for_business_400_20140716-125539_1.jpgIt's no secret that social media has opened a lot of doors for businesses that may not have been there a short time ago. LinkedIn in particular has been an immensely useful tool for people looking for employment, and for employers to find prospective hires.

0 Comments
Continue reading

Forget 3D Movies - 3D Printing is the New Thing

b2ap3_thumbnail_3d_printing_technology_400.jpg3D Printing is something that has been talked about for years, but has finally become a reality. No longer do we have to deal with flat, lifeless images printed out of ink-wasting printers and machines - but, do we know what kind of impact this new innovation will have on several industries around the world?

0 Comments
Continue reading

Skype Translator Looks to put Human Translators Out of a Job!

b2ap3_thumbnail_skype_translator_400.jpgCan you imagine a world where language isn't a barrier? Humanity would be able to achieve some crazy things, like perhaps rocketing a skyscraper into outer space! With every passing year, new technology innovations like Skype Translator chip away at the language barrier, making one bright and coherent future!

0 Comments
Continue reading

Windows 7 End of Mainstream Support Looms on the Horizon

b2ap3_thumbnail_windows_7_support_400.jpgIf you have yet to upgrade away from Windows XP for some reason, you might want to think twice about upgrading to Windows 7. Microsoft has cautioned users about the end of mainstream support for several of its products within the next six months, and the popular operating system is one of them.

0 Comments
Continue reading

Prevent the Summer Heat from Roasting Your Servers with this Portable Solution

b2ap3_thumbnail_severs_get_hot_400.jpgTechnically speaking, it needs to be 158°F for a raw egg to become firm. The summer heat doesn't get that hot, but outdoor objects like sidewalks and car hoods that come in contact with it can. Thus the phrase, "It's so hot you can fry an egg on the sidewalk!" When it's hot outside, you need to keep your server units cool inside.

0 Comments
Continue reading

Tuff eNuff? You Bet We Are! [VIDEO]

On the 4th of July, in Oneonta, NY's Neahwa Park, Team Directive participated in the LEAF Council's Tuff eNuff 5K Obstacle Challenge. Our team was comprised of 13 participants, 3 volunteers, and 2 videographers. At 10:30am, they began their heat of the race, along with about 40 other participants.

teamdirective-tuff-enuff.jpgBy the time they reached the finish line, our team was tired and muddy. The majority had some scrapes and bruises. But in the end, everyone from Team Directive who began the challenge, finished it!

We can officially say that: We are Tuff eNuff.

Tuff eNuff is the only local 5K of its kind. Its competitors faced challenges of strength, speed, and endurance, including cross-country running, wading through waist-high water, several climbing obstacles, and a downhill mudslide.

0 Comments
Continue reading

What's a Hard Drive Crash and How Can I Prevent It?

b2ap3_thumbnail_hard_drive_basics_400.jpgYou've heard about how bad a computer crash can be. You may have even experienced a crash yourself, but are you familiar with the technical reason behind a crash? A crash happens when the tiny pieces of a hard disk drive stop working by crashing into each other at very high speeds. When this happens, the data on your computer is lost.

0 Comments
Continue reading