fbpx

Don’t wait any longer. Get started today!

 
 

Directive Blogs

Directive has been serving the Oneonta area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

4 Giveaways that Your Email is Trying to Trick You

b2ap3_thumbnail_avoid_phishing400.jpgOne of the most common ways computer viruses spread is through email. Most of the malware-carrying messages are caught in your account's spam filter, so you don't have to worry about those. It's the malicious emails that make it to your inbox that you need to be mindful of, and phishing emails are by far the most dangerous.

Continue reading

2 Million Passwords Stolen! Have You been Hacked?

b2ap3_thumbnail_pword400.jpgOn December 3, 2013, security company Trustwave discovered over two million stolen user passwords for popular online services like Facebook, LinkedIn, Google, Twitter, Yahoo, and 93,000 other websites. There's a high probability that you use one of the services affected by the hack. Is your personal information compromised?

Continue reading

Watch Your @#%!ing Mouth at Work!

b2ap3_thumbnail_smdb400.jpgLanguage is one of the biggest contributors to determining office culture. For example, a workplace where the management motivates with threats will be a completely different environment than an office where encouragement is liberally applied. The allowance or forbiddance of swearing is another major indicator of your company's culture. How does the language in your office reflect your company's values?

Continue reading

Don't Make These eBay Mistakes

b2ap3_thumbnail_ebay400.jpgSince 1995, eBay has become an online giant, and an obvious choice in the ecommerce industry. Buyers and sellers have taken to this online platform as a convenient solution to acquire things they want, and sell things they don't.

Continue reading

3 Ways Green Technology Can Help Your Business

b2ap3_thumbnail_greengears400.jpgToday's business environment is environmentally conscious. Companies that implement green policies and use energy-saving technologies are making a positive impact on the environment. Going green is the responsible thing to do and will also positively impact your business. Here are three ways using green technology can benefit your business.

Continue reading

How Do You Store Your Priceless Pictures?

b2ap3_thumbnail_cheese400.jpgIf your house was on fire and you only had one trip to rush in and rescue one item, what would it be? Most family-minded individuals would choose their photo album because it's irreplaceable. Insurance money can replace most household and personal items, but not photos. It's important to have a backup plan to keep your prized pictures safe from disasters.

Continue reading

When Negative Customer Feedback Can Help Your Business

b2ap3_thumbnail_troll400.jpgAs a business owner, your business is your baby. Therefore, it's easy to take it personally when a customer says something negative about your company. It feels kind of like a stranger calling your newborn baby ugly. Don't overreact to negative opinions by overhauling your business model; you can actually use negative customer feedback to your advantage.

Continue reading

Don’t Let These 3 Easy Oversights Compromise Your Network

b2ap3_thumbnail_lockblu400.jpgThere is a common misperception that strong anti-virus software is all you need to cover the security of your network. While anti-virus software is an important component to network security, there's more to it if you want a secure network. You need to also take into account the human factor, which can disable even the strongest software solution.

Continue reading

How much is Your Printer Costing You?

b2ap3_thumbnail_loot400.jpgAs a business owner, you are always on the lookout for money saving solutions. Technology offers cost-effective options because it can be used to save money by implementing something new, instead of making cuts. A print server solution is one example of how upgrading your technology can save you money.

Continue reading

5 Tips to Help a Cyborg Make a Good Impression

b2ap3_thumbnail_humanbot400.jpgThe fact that over half of all working adults own a smartphone is changing not only the way we do business, but also how we interact as a species. With the development of smart glasses and watches, we are seeing technology becoming even more intertwined with our bodies, effectively turning people into cyborgs.

Continue reading

Is That Mobile Device Protection Plan Worth It?

b2ap3_thumbnail_shattereddreams400.jpgUpselling and add-ons are the reason why you go to buy a new smartphone, expecting to pay the too-good-to-be-true sale price, and walk out locked into a contract that costs twice as much as you planned on spending. One add-on that's pushed hard is the device protection plan (smartphone insurance). Is a protection plan worth the expense?

Continue reading

Losing Data? Stop Cloning

b2ap3_thumbnail_backupagain400.jpgWhat would you say if we told you that disc error rates have been found to be ten times worse than what the vendor's drive specifications state? They're not lying, they are just predicting their own drive's failure rate. In order to be accurate, you must account for failure rates associated with the disk controller, the cables, the PCI bus, the memory, and the processor as well.

Continue reading

4 Tips to Not Be that Guy

b2ap3_thumbnail_coffee400.pngThe cool thing about using mobile devices equipped with tools that will allow you to remotely access your company's files from anywhere, is that you now have the freedom to work from literally anywhere. Just be careful not to abuse this freedom. Here are 4 tips to help you work on the go without annoying everybody around you.

Continue reading

Bury Your Treasured Files With TrueCrypt

b2ap3_thumbnail_tcsquare400.pngHow vulnerable is your sensitive data on your PC to unwanted threats? Can anyone who gains access to your computer be able to easily find this data and do whatever they wish to it? If these files were encrypted and then hidden from view, you can neutralize the possibility of it happening.

Continue reading

Know the Risks of the Internet before Logging On

b2ap3_thumbnail_virus400.jpgDriving a powerful car can be an exhilarating experience, but if you have no idea what you're doing, it can be dangerous. This is why governments require drivers to pass a safety class before they can speed down the road encased in steel and glass. The Internet is also a powerful tool that can be exciting, beneficial, and dangerous.

Continue reading

Take the Time to Safely Remove Your Device

b2ap3_thumbnail_flash400.jpgAt the end of the workday you may be in a hurry to leave, and as you start tossing your belongings into your bag, you come across your USB drive plugged into your PC. You're now faced with a tough decision; do you take the time to safely remove the device, or do you save 30 seconds and just unplug it?

Continue reading

Train Your Employees with VoIP

b2ap3_thumbnail_voip.jpgVoice over Internet Protocol (VoIP) is a communication tool designed for business. VoIP takes advantage of your Internet connection to dramatically reduce your phone bill, sometimes by as much as 80% compared to traditional long distance plans. VoIP also comes with unique features to that will assist your company in customer service and employee training.

Continue reading

Google Reader Refugees Take To Feedly

b2ap3_thumbnail_feedly400.pngThe expiration date for Google Reader is set for July 1, 2013. Google’s decision to axe the Reader was not because it was unpopular, but rather, it seems like Google wants to focus their energy into fewer products. This announcement leaves many Google faithful out in the cold, and Feedly has welcomed the Google huddled masses yearning to read free.

Continue reading

Your Tape Backup is a Business Risk

b2ap3_thumbnail_tapefail400.jpgThere was a time when tape backup was the cheapest and the standard data backup solution for businesses. Over the years, cloud services have become more affordable, and now cloud backup solutions like a BDR are cheaper and give businesses more security features. If you are still backing up with tape, then you may be losing money and even putting your business at risk!

Continue reading

Don't Be a Hacking Target

b2ap3_thumbnail_Hacking400.jpgWhat do hackers look for when choosing a victim? While there are hackers out there that specialize in targeting high-profile companies and executives (a hacking method call whaling), most hackers do a broad sweep of the Internet and choose the easiest targets. If your company has weak network security, then you have a target on your back.

Continue reading

How to Catch PC Issues and Prevent Problems

b2ap3_thumbnail_notnowwhen.jpgWe are not guaranteed a life without problems. Problems will happen and your plans will be ruined (okay, it's not ALWAYS that bad!). While you can't totally eliminate problems from life, you can greatly reduce them by being proactive. This proactive problem solving approach also works great with technology!

Continue reading

Power Outage Protection with UPS

b2ap3_thumbnail_PowerOut400.jpgOne shocking IT scenario that we regularly encounter is expensive computer hardware plugged into inexpensive power strips. Power strips are adequate if you need a few extra outlets for your kitchen appliances, but if you want to protect the computer hardware that is mission critical to your business, like servers and NAS devices, then you will need a solution that is more powerful.

Continue reading

Your Computer Hardware is Built to Last

b2ap3_thumbnail_Hardware400.jpgWe understand your desire to upgrade to a new computer, using the latest technology has its advantages. Although, upgrading because your old PC has "worn out" may be an inaccurate assessment. There are many reasons why a computer's performance slows down, but it is doubtful that hardware deterioration is a cause. This is because PC hardware is built to last.

Continue reading

3 Security Issues that Put Your Business at Risk!

b2ap3_thumbnail_Security400.jpgEverybody has a weakness; Superman has Kryptonite, the Wicked Witch of the West had water, and the Death Star had a womprat-sized exhaust port. Character weaknesses make for solid storylines because they drive conflict. Your company has its own set of vulnerabilities that you may not know about, and unlike stories, conflict in business is not a good thing. Here are a few of the lesser known IT weaknesses, and what you can do to resolve them.

Continue reading

An Old Internet Explorer Can Harm Your PC

b2ap3_thumbnail_InternetExplorer-logo.jpgIf you never connected your PC to the internet, then you could get away with not updating any of your software. Do to the changing nature of the internet, new security threats are constantly attacking your computer. Internet browsers are your door to the internet and require constant updating in order to keep your PC protected from these threats.

Continue reading

4 Practices to Speed up a Slow Computer

b2ap3_thumbnail_snailslow400.jpgThere are dozens of PC tricks and procedures you can try in order to speed up a slow computer. Before you do something drastic like open your case and tinker around with the hardware, or reinstall your OS, or even call your friendly IT techs for a service call, you may first want to adopt these four PC practices that are guaranteed to boost your computer's performance.

Continue reading

Improve Employee Productivity with Universal Threat Management

b2ap3_thumbnail_productivitygoup400.jpgThe concept behind company time is simple enough: you are employed, and therefore expected to do whatever you agreed upon while "on the clock." To be fair, you are given a few breaks to attend to personal matters; yet, as easy to grasp as this seems, the average employee wastes two hours of company time per day on the internet.

Continue reading

Web Design Best Practices for Content Presentation

b2ap3_thumbnail_363986.jpgIn the past 10 years, the number of people who use the internet in their daily life has skyrocketed. As a result, many jobs now include adding or writing content that is ultimately posted online. Your business depends on your ability to create cohesive, complete information presented in an aesthetically pleasing, and memorable way.  How can we know if the content we are writing is presented in the appropriate fashion? There are a few best practices to keep in mind that will keep users coming back to your site, time after time.

Continue reading

Free Up Bandwidth with Internet Monitoring

b2ap3_thumbnail_2013time.jpgInternet bandwidth is a precious resource, and the amount your office can use is limited to whatever internet service package your company is signed up for. If your office is running short on bandwidth, then you will need to upgrade to a bigger package, which will be expensive. Before you spend money on upgrading, you should consider internet monitoring.

Continue reading

DIY IT Repair Hinders Business Growth

b2ap3_thumbnail_littlemanonkeyboard.jpgYou are confident that your employees are good at problem solving, this is why you hired them. Your staff may even thrive on finding solutions with limited resources and keeping operations within budget. It is wonderful that you have surrounded yourself with skillful people, but using your bright staff to fix an IT problem may hurt your business in the long run.

Continue reading

Staying In Business: Backup Business Continuity

b2ap3_thumbnail_bdrbandaid.jpgStep back from your monitor for a moment and take a look at your business. Customers from all over the Upstate New York area and beyond are being helped. You have an inbox full of email from countless prospects and clients, and your activity on the world wide web is literally connecting you around the world. This complex coordination of of resources and people in front of you is called logistics.

Continue reading

Drew Carey Wishes he had BDR

b2ap3_thumbnail_DrewCarey.jpgThe expression on Drew's face is a perfect picture of what data loss looks like. There is nothing more frustrating than spending an entire day on a project, only to have it all disappear with a system error. Drew's mistake was that he was saving all of his work directly on his laptop. Not only is his work susceptible to a hard drive failure and the computer crashing, but his laptop is also at risk of being stolen along with all of his personal data.

Continue reading

Managed IT Service Prevents Costly Repairs

b2ap3_thumbnail_repairs.jpgDo you have a plan in place for when your technology breaks or crashes? As wonderful as computers are, the hardware wears down, and software can become buggy and crash. Having a go-to plan in place for IT hiccups, will save you time and frustration from having to react to a problem and scramble to find a fix.

Continue reading

Own Your Website! Register Your Domain Correctly

b2ap3_thumbnail_yourdomainname.jpgDomain registration is a fairly simple procedure. Virtually every web hosting company has a step-by-step process where you enter your information, create a website URL, decide how long the registration period will be, pay for everything, and then forget about it. As simple as registration can be, if done incorrectly it can come back to haunt you.

Continue reading

Is Your Network Monster-Proof?

a1sx2_Thumbnail1_fuzzmonster.jpgAre you ready for Halloween? Beyond having a cute costume picked out; we want to know if you are prepared for a disaster brought on by ghosts, ghouls, goblins, or ogres. Battling the dark legions can escalate quickly into a full-blown crisis, and as your IT Company, we view it as our duty to help you prepare for the worst.

Continue reading

Password Vulnerability and Security, Part 1

a1sx2_Original1_lockeddownlaptop.jpgA weak password makes identity theft easy for hackers. You would never paint your social security number on the side of a truck and drive around town, but if your password is shared, left out in the open, and used on multiple sites, then you might as well ride shotgun with the Lifelock CEO (his SSN has been stolen 13 times).

Continue reading

Troubleshooting a Wet Cell Phone

a1sx2_Original1_sinkingphone.jpgStories about smartphones getting wet usually have a funny twist to them, unless it is your own device, in which case the story is comparable to a Shakespearean tragedy. Whether your toddler threw your iPhone in the toilet, or your Galaxy S3 took up swimming, there are a few tricks you can try before dropping cash on a new device.

Continue reading

The Quest for the Paperless Office

a1sx2_Original1_paperlessoffice10.jpgEver since the first microfilm machine was rolled off the line 100 years ago, mankind has been striving to achieve the paperless office. If you are too young to remember using microfilm, think of an arcade cabinet, except, instead of Mortal Kombat, documents battle it out over a projected screen. Thankfully, we have come a long way in 100 years.

Continue reading

Pirates Ahead, Be Ye Warned!

a1sx2_Original1_pirateman.jpg"Ahoy ye swabbies! We be takin' heavy damage on the starboard side! Brace ye-selves for impact! Arrrr!" That is pirate talk for "Hello fellow co-worker. Our CRM tools crashed again and IT needs to reboot the server." September 19th is Talk like a Pirate Day!

Continue reading

Protect your Dropbox with Two-Step Authentication


a1sx2_Original3_phonepadlock.jpgDropbox, a popular file-hosting service for both home-users and businesses, recently added a new security feature to prevent unauthorized access to your Dropbox files and folders. You can enable Dropbox to send a security code to your mobile phone whenever you log in.

Continue reading

Use Outlook Rules to Save Time when Managing your Inbox

Business owners and employees alike are inundated with email. According to a study done in 2011, as much as half of an employee's day is spent sifting through their email, and as the study puts it, "necessary, yet unproductive tasks." Freeing up that time and spending less time managing email can open a worker up to more productivity. Here's a quick and simple way to start organizing your inbox to free yourself from your email and get more done!

Continue reading

Public Safety Tip: Wi-Fi Hotspot Security

When traveling with your trusty laptop or tablet, it's pretty common to find publicly accessible Wi-Fi networks that you can connect to, enabling you to surf the web. Where ever you are, whether it's a coffee shop, hotel, airport, or anywhere else, it's important to be safe about public surfing.

Continue reading

How Network Monitoring Reduces Tech Support Costs

At Directive, we hate seeing our clients suffer from slow computers, bogged down networks, and other computer issues that prevent work from happening seamlessly. That's why we are so passionate about proactively safeguarding your network BEFORE issues happen, in order to prevent expensive downtime.

Continue reading

Your Company's Social Media Policy

The time to implement a social media policy is now. Your social media policy outlines for employees your companies guidelines or principles for communicating in the online world.  Your company should have a communications policy in place that spell out your expectations for phone and email, it’s important that you add social media and online site usage to this policy.

 

Continue reading

Securing your Wi-Fi

A lot of businesses have been taking advantage of Wi-Fi wireless networking to increase mobility around the office for staff. Most businesses seem to understand that their Wi-Fi network needs to be password protected to keep outsiders from getting in, but most businesses often make the mistake in using WEP security on their wireless network instead of a more secure solution.

 

The WEP algorithm can be hacked in minutes by a savvy user with a notebook, not only giving them access to your internet access, but to your network and files. Read on to learn a better way to secure your wireless network.

Continue reading

Size Matters: Optimizing Images for the Web

With all the fancy content management systems out there making it easy for users to manage and update their website, suddenly creating new content and pages on your site becomes a snap, and anyone can do it. While CMS's like Joomla empower those outside the professional web design field to completely turn their website into a living, breathing dynamic canvas, there are still a few simple best practices that one might not know without a little experience. One of the big ones that often get missed are images.  In this article, we'll show you how to work with images for the web so you get the best results possible when putting pictures on your website.  This will apply to blogs, social media, and just about any other method of publishing on the web.

Continue reading

What to do if your Laptop is Stolen

The problem with carrying around an expensive, portable piece of equipment is that it's possible for someone to pick it up and run with it. According to LoJack, a security firm that focuses on stolen property, two million laptops are stolen each year. What should you do if you are a victim of laptop theft?

Continue reading

Bullet-Proof Your Business Continuity Plan with this Checklist

It's always important to be prepared for emergencies, and for a small business these days even a minor disaster can have long term ramifications with serious consequences. Whether the disaster is short lived, like a power outage or hardware failure in your server, or a more serious event like a flood or fire, you want to be able to get back in business as quickly as possible Here are some steps Upstate New York businesses should take to prepare and add to their disaster plans.

Continue reading

Can your Backup Solution Handle a Fire?

Some companies go to great lengths to make sure their backup is up to date. Data is extremely important, and yet fragile. There are so many situations that can cause data loss, is your backup solution ready?

Continue reading

Manage Technology Like you Manage People

For a small or midsize business, technology budgets are naturally fairly slim. It goes without saying that a company needs to get the best bang for their buck with their IT infrastructure, and it's not uncommon to see workstations and other devices still in play years after their prime. This leads to underperforming technology, which in turn, limits what your bottom line can accomplish (remember, your team is only as good as your worst player). Some small businesses are approaching technology in ways that would normally be reserved for HR's interactions with employees, but they are finding that this can improve performance.

Continue reading

5 Benefits of the Paperless Office

At many businesses, if you look in the waste bin or the recycle bin, you'll probably find a lot of paper. Paper is one of the most common waste products at businesses and as such is also one of the biggest sustainability opportunities for businesses large and small. The environmental benefits are great, but going paperless has some huge benefits for small businesses beyond being green.

Continue reading

Quick Maintenance that can Improve Workstation Speeds

Is your computer's speed (or lack there of) stressing you out? Intel sponsored a survey and found that computer users experience stress while waiting for their sluggish workstation to respond. They found that 51 percent of adults surveyed said they have done something 'uncharacteristic' out of frustration while waiting for something to load, and of those, 29 percent admit to banging on their keyboard and computer screen. The survey may sound fairly comical, but humans don't like unexpected waiting, especially when we're trying to meet deadlines and get work done. It's a pretty fair assumption to say slow technology is stressful.

Fortunately, there are a few steps that can be taken that will likely give your workstation a little boost, at least closer to where it was when it was first unboxed.

Continue reading

Have no doubt, every hard drive fails

We’re not trying to be negative here. We're not trying to scare you and make you run out and buy a backup device (We’ll save those horror stories for another time). Today we’re going to talk about why hard drives fail. It doesn’t matter what manufacturer your drive comes from, what connection interface it has, who you bought your computer from, and believe it or not, it has nothing to do with the day your warranty runs out (no sir, that’s just a Murphy’s Law coincidence). All hard drives are built in pretty much the same fashion.

Continue reading

IT Support Horror Stories

Everyone here at Directive would like to wish our clients a happy and safe Halloween! We'd like to share a couple computer and tech support horror stories to set today's spooky mood!  Get out your flashlights and gather around the campfire for these chilling tales that could happen to any small business.

Continue reading

10 New Year Resolutions

We grew a lot in 2009.  This is a great thing but it has also exposed a lot about our company that we want to improve on. It's pretty obvious what we need to work on to support the growth we expect in 2010 and beyond.

 

While this isn't a complete list, here are 10 of the things we are going to focus and improve on this year. They are in no particular order:

Continue reading

2 Important Networking Trends You Must Consider

b2ap3_thumbnail_your_company_network_400.jpgOne sometimes-frustrating aspect about computer networking comes from the always-changing nature of technology. For example, let’s say that you have your network perfectly set up with everything running smoothly, then comes along some newfangled IT trend or mission-critical technology workflow that requires you to change everything. You can’t prevent this from happening, but you can stay on top of the latest IT trends so that you’re not caught off guard.

Continue reading

3 Vendor Scenarios You Can Do Without

b2ap3_thumbnail_vendor_agreements_400.jpgVendors can be a hassle. You need their product or service to keep the gears of business turning, but sometimes, having to deal with vendors can be way too time-consuming. This is where our vendor management service comes in.

Continue reading

The Most Dangerous Threats to Your Business Could Be Internal

b2ap3_thumbnail_insider_mistakes_400.jpgMost of the time, when it comes to cybersecurity, businesses tend to focus primarily on external threats rather than those that might be lurking in the shadows of their internal operations. Believe it or not, the most dangerous entities out there could very well be working for you, right under your nose.

Continue reading