One of the most common ways computer viruses spread is through email. Most of the malware-carrying messages are caught in your account's spam filter, so you don't have to worry about those. It's the malicious emails that make it to your inbox that you need to be mindful of, and phishing emails are by far the most dangerous.
Directive Blogs
On December 3, 2013, security company Trustwave discovered over two million stolen user passwords for popular online services like Facebook, LinkedIn, Google, Twitter, Yahoo, and 93,000 other websites. There's a high probability that you use one of the services affected by the hack. Is your personal information compromised?
Language is one of the biggest contributors to determining office culture. For example, a workplace where the management motivates with threats will be a completely different environment than an office where encouragement is liberally applied. The allowance or forbiddance of swearing is another major indicator of your company's culture. How does the language in your office reflect your company's values?
Today's business environment is environmentally conscious. Companies that implement green policies and use energy-saving technologies are making a positive impact on the environment. Going green is the responsible thing to do and will also positively impact your business. Here are three ways using green technology can benefit your business.
If your house was on fire and you only had one trip to rush in and rescue one item, what would it be? Most family-minded individuals would choose their photo album because it's irreplaceable. Insurance money can replace most household and personal items, but not photos. It's important to have a backup plan to keep your prized pictures safe from disasters.
As a business owner, your business is your baby. Therefore, it's easy to take it personally when a customer says something negative about your company. It feels kind of like a stranger calling your newborn baby ugly. Don't overreact to negative opinions by overhauling your business model; you can actually use negative customer feedback to your advantage.
There is a common misperception that strong anti-virus software is all you need to cover the security of your network. While anti-virus software is an important component to network security, there's more to it if you want a secure network. You need to also take into account the human factor, which can disable even the strongest software solution.
As a business owner, you are always on the lookout for money saving solutions. Technology offers cost-effective options because it can be used to save money by implementing something new, instead of making cuts. A print server solution is one example of how upgrading your technology can save you money.
The fact that over half of all working adults own a smartphone is changing not only the way we do business, but also how we interact as a species. With the development of smart glasses and watches, we are seeing technology becoming even more intertwined with our bodies, effectively turning people into cyborgs.
Upselling and add-ons are the reason why you go to buy a new smartphone, expecting to pay the too-good-to-be-true sale price, and walk out locked into a contract that costs twice as much as you planned on spending. One add-on that's pushed hard is the device protection plan (smartphone insurance). Is a protection plan worth the expense?
What would you say if we told you that disc error rates have been found to be ten times worse than what the vendor's drive specifications state? They're not lying, they are just predicting their own drive's failure rate. In order to be accurate, you must account for failure rates associated with the disk controller, the cables, the PCI bus, the memory, and the processor as well.
The cool thing about using mobile devices equipped with tools that will allow you to remotely access your company's files from anywhere, is that you now have the freedom to work from literally anywhere. Just be careful not to abuse this freedom. Here are 4 tips to help you work on the go without annoying everybody around you.
Driving a powerful car can be an exhilarating experience, but if you have no idea what you're doing, it can be dangerous. This is why governments require drivers to pass a safety class before they can speed down the road encased in steel and glass. The Internet is also a powerful tool that can be exciting, beneficial, and dangerous.
At the end of the workday you may be in a hurry to leave, and as you start tossing your belongings into your bag, you come across your USB drive plugged into your PC. You're now faced with a tough decision; do you take the time to safely remove the device, or do you save 30 seconds and just unplug it?
Voice over Internet Protocol (VoIP) is a communication tool designed for business. VoIP takes advantage of your Internet connection to dramatically reduce your phone bill, sometimes by as much as 80% compared to traditional long distance plans. VoIP also comes with unique features to that will assist your company in customer service and employee training.
The expiration date for Google Reader is set for July 1, 2013. Google’s decision to axe the Reader was not because it was unpopular, but rather, it seems like Google wants to focus their energy into fewer products. This announcement leaves many Google faithful out in the cold, and Feedly has welcomed the Google huddled masses yearning to read free.
There was a time when tape backup was the cheapest and the standard data backup solution for businesses. Over the years, cloud services have become more affordable, and now cloud backup solutions like a BDR are cheaper and give businesses more security features. If you are still backing up with tape, then you may be losing money and even putting your business at risk!
What do hackers look for when choosing a victim? While there are hackers out there that specialize in targeting high-profile companies and executives (a hacking method call whaling), most hackers do a broad sweep of the Internet and choose the easiest targets. If your company has weak network security, then you have a target on your back.
We are not guaranteed a life without problems. Problems will happen and your plans will be ruined (okay, it's not ALWAYS that bad!). While you can't totally eliminate problems from life, you can greatly reduce them by being proactive. This proactive problem solving approach also works great with technology!
One shocking IT scenario that we regularly encounter is expensive computer hardware plugged into inexpensive power strips. Power strips are adequate if you need a few extra outlets for your kitchen appliances, but if you want to protect the computer hardware that is mission critical to your business, like servers and NAS devices, then you will need a solution that is more powerful.
We understand your desire to upgrade to a new computer, using the latest technology has its advantages. Although, upgrading because your old PC has "worn out" may be an inaccurate assessment. There are many reasons why a computer's performance slows down, but it is doubtful that hardware deterioration is a cause. This is because PC hardware is built to last.
Everybody has a weakness; Superman has Kryptonite, the Wicked Witch of the West had water, and the Death Star had a womprat-sized exhaust port. Character weaknesses make for solid storylines because they drive conflict. Your company has its own set of vulnerabilities that you may not know about, and unlike stories, conflict in business is not a good thing. Here are a few of the lesser known IT weaknesses, and what you can do to resolve them.
If you never connected your PC to the internet, then you could get away with not updating any of your software. Do to the changing nature of the internet, new security threats are constantly attacking your computer. Internet browsers are your door to the internet and require constant updating in order to keep your PC protected from these threats.
There are dozens of PC tricks and procedures you can try in order to speed up a slow computer. Before you do something drastic like open your case and tinker around with the hardware, or reinstall your OS, or even call your friendly IT techs for a service call, you may first want to adopt these four PC practices that are guaranteed to boost your computer's performance.
The concept behind company time is simple enough: you are employed, and therefore expected to do whatever you agreed upon while "on the clock." To be fair, you are given a few breaks to attend to personal matters; yet, as easy to grasp as this seems, the average employee wastes two hours of company time per day on the internet.
In the past 10 years, the number of people who use the internet in their daily life has skyrocketed. As a result, many jobs now include adding or writing content that is ultimately posted online. Your business depends on your ability to create cohesive, complete information presented in an aesthetically pleasing, and memorable way. How can we know if the content we are writing is presented in the appropriate fashion? There are a few best practices to keep in mind that will keep users coming back to your site, time after time.
Internet bandwidth is a precious resource, and the amount your office can use is limited to whatever internet service package your company is signed up for. If your office is running short on bandwidth, then you will need to upgrade to a bigger package, which will be expensive. Before you spend money on upgrading, you should consider internet monitoring.
You are confident that your employees are good at problem solving, this is why you hired them. Your staff may even thrive on finding solutions with limited resources and keeping operations within budget. It is wonderful that you have surrounded yourself with skillful people, but using your bright staff to fix an IT problem may hurt your business in the long run.
Step back from your monitor for a moment and take a look at your business. Customers from all over the Upstate New York area and beyond are being helped. You have an inbox full of email from countless prospects and clients, and your activity on the world wide web is literally connecting you around the world. This complex coordination of of resources and people in front of you is called logistics.
The expression on Drew's face is a perfect picture of what data loss looks like. There is nothing more frustrating than spending an entire day on a project, only to have it all disappear with a system error. Drew's mistake was that he was saving all of his work directly on his laptop. Not only is his work susceptible to a hard drive failure and the computer crashing, but his laptop is also at risk of being stolen along with all of his personal data.
Do you have a plan in place for when your technology breaks or crashes? As wonderful as computers are, the hardware wears down, and software can become buggy and crash. Having a go-to plan in place for IT hiccups, will save you time and frustration from having to react to a problem and scramble to find a fix.
Domain registration is a fairly simple procedure. Virtually every web hosting company has a step-by-step process where you enter your information, create a website URL, decide how long the registration period will be, pay for everything, and then forget about it. As simple as registration can be, if done incorrectly it can come back to haunt you.
Are you ready for Halloween? Beyond having a cute costume picked out; we want to know if you are prepared for a disaster brought on by ghosts, ghouls, goblins, or ogres. Battling the dark legions can escalate quickly into a full-blown crisis, and as your IT Company, we view it as our duty to help you prepare for the worst.
A weak password makes identity theft easy for hackers. You would never paint your social security number on the side of a truck and drive around town, but if your password is shared, left out in the open, and used on multiple sites, then you might as well ride shotgun with the Lifelock CEO (his SSN has been stolen 13 times).
Stories about smartphones getting wet usually have a funny twist to them, unless it is your own device, in which case the story is comparable to a Shakespearean tragedy. Whether your toddler threw your iPhone in the toilet, or your Galaxy S3 took up swimming, there are a few tricks you can try before dropping cash on a new device.
Ever since the first microfilm machine was rolled off the line 100 years ago, mankind has been striving to achieve the paperless office. If you are too young to remember using microfilm, think of an arcade cabinet, except, instead of Mortal Kombat, documents battle it out over a projected screen. Thankfully, we have come a long way in 100 years.
Business owners and employees alike are inundated with email. According to a study done in 2011, as much as half of an employee's day is spent sifting through their email, and as the study puts it, "necessary, yet unproductive tasks." Freeing up that time and spending less time managing email can open a worker up to more productivity. Here's a quick and simple way to start organizing your inbox to free yourself from your email and get more done!
The time to implement a social media policy is now. Your social media policy outlines for employees your companies guidelines or principles for communicating in the online world. Your company should have a communications policy in place that spell out your expectations for phone and email, it’s important that you add social media and online site usage to this policy.
A lot of businesses have been taking advantage of Wi-Fi wireless networking to increase mobility around the office for staff. Most businesses seem to understand that their Wi-Fi network needs to be password protected to keep outsiders from getting in, but most businesses often make the mistake in using WEP security on their wireless network instead of a more secure solution.
The WEP algorithm can be hacked in minutes by a savvy user with a notebook, not only giving them access to your internet access, but to your network and files. Read on to learn a better way to secure your wireless network.
With all the fancy content management systems out there making it easy for users to manage and update their website, suddenly creating new content and pages on your site becomes a snap, and anyone can do it. While CMS's like Joomla empower those outside the professional web design field to completely turn their website into a living, breathing dynamic canvas, there are still a few simple best practices that one might not know without a little experience. One of the big ones that often get missed are images. In this article, we'll show you how to work with images for the web so you get the best results possible when putting pictures on your website. This will apply to blogs, social media, and just about any other method of publishing on the web.
The problem with carrying around an expensive, portable piece of equipment is that it's possible for someone to pick it up and run with it. According to LoJack, a security firm that focuses on stolen property, two million laptops are stolen each year. What should you do if you are a victim of laptop theft?
It's always important to be prepared for emergencies, and for a small business these days even a minor disaster can have long term ramifications with serious consequences. Whether the disaster is short lived, like a power outage or hardware failure in your server, or a more serious event like a flood or fire, you want to be able to get back in business as quickly as possible Here are some steps Upstate New York businesses should take to prepare and add to their disaster plans.
For a small or midsize business, technology budgets are naturally fairly slim. It goes without saying that a company needs to get the best bang for their buck with their IT infrastructure, and it's not uncommon to see workstations and other devices still in play years after their prime. This leads to underperforming technology, which in turn, limits what your bottom line can accomplish (remember, your team is only as good as your worst player). Some small businesses are approaching technology in ways that would normally be reserved for HR's interactions with employees, but they are finding that this can improve performance.
At many businesses, if you look in the waste bin or the recycle bin, you'll probably find a lot of paper. Paper is one of the most common waste products at businesses and as such is also one of the biggest sustainability opportunities for businesses large and small. The environmental benefits are great, but going paperless has some huge benefits for small businesses beyond being green.
Is your computer's speed (or lack there of) stressing you out? Intel sponsored a survey and found that computer users experience stress while waiting for their sluggish workstation to respond. They found that 51 percent of adults surveyed said they have done something 'uncharacteristic' out of frustration while waiting for something to load, and of those, 29 percent admit to banging on their keyboard and computer screen. The survey may sound fairly comical, but humans don't like unexpected waiting, especially when we're trying to meet deadlines and get work done. It's a pretty fair assumption to say slow technology is stressful.
Fortunately, there are a few steps that can be taken that will likely give your workstation a little boost, at least closer to where it was when it was first unboxed.
We’re not trying to be negative here. We're not trying to scare you and make you run out and buy a backup device (We’ll save those horror stories for another time). Today we’re going to talk about why hard drives fail. It doesn’t matter what manufacturer your drive comes from, what connection interface it has, who you bought your computer from, and believe it or not, it has nothing to do with the day your warranty runs out (no sir, that’s just a Murphy’s Law coincidence). All hard drives are built in pretty much the same fashion.
Everyone here at Directive would like to wish our clients a happy and safe Halloween! We'd like to share a couple computer and tech support horror stories to set today's spooky mood! Get out your flashlights and gather around the campfire for these chilling tales that could happen to any small business.
We grew a lot in 2009. This is a great thing but it has also exposed a lot about our company that we want to improve on. It's pretty obvious what we need to work on to support the growth we expect in 2010 and beyond.
While this isn't a complete list, here are 10 of the things we are going to focus and improve on this year. They are in no particular order:
One sometimes-frustrating aspect about computer networking comes from the always-changing nature of technology. For example, let’s say that you have your network perfectly set up with everything running smoothly, then comes along some newfangled IT trend or mission-critical technology workflow that requires you to change everything. You can’t prevent this from happening, but you can stay on top of the latest IT trends so that you’re not caught off guard.
Most of the time, when it comes to cybersecurity, businesses tend to focus primarily on external threats rather than those that might be lurking in the shadows of their internal operations. Believe it or not, the most dangerous entities out there could very well be working for you, right under your nose.