fbpx

Don’t wait any longer. Get started today!

 
 

Directive Blogs

Directive has been serving the Oneonta area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Protect your Dropbox with Two-Step Authentication


a1sx2_Original3_phonepadlock.jpgDropbox, a popular file-hosting service for both home-users and businesses, recently added a new security feature to prevent unauthorized access to your Dropbox files and folders. You can enable Dropbox to send a security code to your mobile phone whenever you log in.

Continue reading

Making Your Business BYOD Compliant

We talk a lot about smartphones and tablets as business tools, but these days more and more people are using high-end devices personally. It's likely that they are bringing these devices in to work, and often using them to become more productive at their job. We call this Bring-Your-Own-Device, or BYOD, and it isn't a bad thing. The catch is managing security risks when users are using their own personal gadgets.

Continue reading

Your Company's Social Media Policy

The time to implement a social media policy is now. Your social media policy outlines for employees your companies guidelines or principles for communicating in the online world.  Your company should have a communications policy in place that spell out your expectations for phone and email, it’s important that you add social media and online site usage to this policy.

 

Continue reading

Is Your Printer a Security Threat?

Your printer typically has pretty limited functionality, or at least one would think, right? It prints, maybe it can print on both sides of the paper, sometimes it can scan documents, and it can allow hackers the ability to steal your data and commandeer your network. Wait, say what?

Continue reading

How Safe is Your Email?

Email is (and has been) a prime method of communication for businesses of all sizes. With email comes a whole slew of issues that are essentially synonymous with the technology; spam, information overload, phishing, and information privacy. Even Upstate New York small businesses that only do business locally are at risk of these issues. Personal email accounts are equally at risk. Employing proper precautions and practices whenever communicating via email is very important to prevent the risk of security compromises, monetary loss, and even legality issues.

Continue reading

Is Free Wi-Fi Dangerous?

If you take a laptop out into the world, you've probably seen the notification saying "Wireless Network Detected." Free hotspots are not uncommon in coffee shops, hotels, airports, and other public locations,  There are some things to know before you simply hop on an unfamiliar wireless network.

Continue reading

Encrypting your Emails

Remember in "Mission Impossible," after an agent listens to his secret mission, the recording goes on to mention "This message will self destruct…" followed by the oversized tape-recorder puffing out billows of smoke. Businesses have gone a long way since then (we've replaced sending tape-recorders with the much more efficient email), and encrypting email messages is easy and cost effective for businesses that want to ensure that certain messages are only seen by certain recipients.

Continue reading

How a Firewall Protects Your Data From the Worst of the Web

b2ap3_thumbnail_firewall_security_400.jpgSince you run a business, you know that your business’s network requires a secure firewall in order to keep threats out. In fact, the firewall is the most basic of security protocol that you should be taking advantage of. Knowing what a firewall protects you from, and what it doesn’t protect you from, is an important first step toward improving your data infrastructure’s security, and in turn improving your business’s continuity.

Continue reading

How Sloppy Security Practices Put Companies at Risk

b2ap3_thumbnail_identities_400.jpgIn today’s online business environment, security is nothing to scoff at. Yet, there are many businesses that don’t play by the rules when it comes to monitoring account security on a shared network. This puts both themselves, and their businesses, in danger.

Continue reading

How Your Business Can Benefit From a Virtual Private Network

b2ap3_thumbnail_virtual_private_network_400.jpgMost of your business’ technology is a direct result of your need to quickly and securely disseminate information. While there are solutions meant to improve efficiency peppered in there, the vast majority of IT solutions are designed to create, share, or protect information. On today’s Internet there are many threats looking to corrupt or intercept that information. One way your organization can share information more securely is through the use of a Virtual Private Network (VPN).

Continue reading