fbpx

Don’t wait any longer. Get started today!

 
 

Directive Blogs

Directive has been serving the Oneonta area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Network Firewalls Explained

b2ap3_thumbnail_Firewall400.jpgYou know that having a strong firewall is a key component to having strong network security, but do you how firewalls work? Firewalls take their name from the protective barriers that keep buildings and engines safe from fire. While it’s unlikely that your computer is in danger of incineration, a firewall does protect it from cyber-threats; here’s how!

Continue reading

Don't Be a Hacking Target

b2ap3_thumbnail_Hacking400.jpgWhat do hackers look for when choosing a victim? While there are hackers out there that specialize in targeting high-profile companies and executives (a hacking method call whaling), most hackers do a broad sweep of the Internet and choose the easiest targets. If your company has weak network security, then you have a target on your back.

Continue reading

4 Oversights that will Harm Your Network

b2ap3_thumbnail_SecurtyRisk400.jpgWith all the attention that hackers receive, you would think that they are solely responsible for every network security breach, but the truth of the matter is that most damages to company networks are due to negligence. Here are the four most common IT security oversights that can lead to major damages to your network.

Continue reading

Could Bitcoins become the Next World Currency?

b2ap3_thumbnail_bitcoin400.jpgThe Internet has given us many new and exciting ways to transact business. The newest frontier is in regards to a virtual currency called Bitcoins that is unregulated and accepted by Internet users worldwide. Bitcoins may be too much of a novelty for your business to take seriously, but that does not discredit it as an interesting investment opportunity.

Continue reading

Hackers are Taking Advantage of Technology Improvements

b2ap3_thumbnail_HackerSkull400.jpgUsing strong passwords is a critical part of keeping your network protected. For years we have been preaching the need to use complex passwords, along with the need to use different passwords for different accounts. As the technology of crackers (not the salted kind) improves, the need to be diligent about password security intensifies.

Continue reading

The 3 Biggest Reasons PC Upgrades are Avoided

b2ap3_thumbnail_OldComputer400.jpgAs an IT company, we get excited about the newest computer hardware and software. We try to convince everybody that upgrades are great, but some people cannot be shaken from their devotion to what is familiar and refuse to upgrade their tech. In our experience, here are the three biggest reasons why upgrades are avoided.

Continue reading

Who Can You Trust with Your Data?

b2ap3_thumbnail_Trust400.jpgYour company's information on your network is labeled as "sensitive" for a reason. The files on your servers contain the secrets to your success, along with financial records about you, your employees, and your customers. When trusting sensitive data to a third party, make sure that it is someone you trust.

Continue reading

In Windows, Hibernation Isn’t Sleep

b2ap3_thumbnail_Sleep400.jpgThe Windows family of operating systems (OS) have different power-saving modes for users to take advantage of if they find themselves away from their workstation or mobile computing device. Windows 8 features three: Sleep, Hibernate, and Hybrid Sleep.

Continue reading

Critical Updates on the Way for Windows, Office, and IE

b2ap3_thumbnail_Updates400.jpgMicrosoft will be dishing out multiple security updates this week, including four critical patches for Windows, Internet Explorer, Office, and SharePoint Server. Critical updates are considered Microsoft's highest threat rating, so installing these patches is important.

Continue reading

3 Benefits of Using Server Racks

b2ap3_thumbnail_ServerRack400.jpgThe largest and most important components of your network is your servers. Technically, you can line up your servers on a big table and they will work, but if you want to get the most out of your servers, then we recommend using a server rack.

Continue reading

3 Security Issues that Put Your Business at Risk!

b2ap3_thumbnail_Security400.jpgEverybody has a weakness; Superman has Kryptonite, the Wicked Witch of the West had water, and the Death Star had a womprat-sized exhaust port. Character weaknesses make for solid storylines because they drive conflict. Your company has its own set of vulnerabilities that you may not know about, and unlike stories, conflict in business is not a good thing. Here are a few of the lesser known IT weaknesses, and what you can do to resolve them.

Continue reading

Business Executives are Targeted with Whaling Scams

b2ap3_thumbnail_Whaling400_20130217-211452_1.jpgEven if you are using the best antivirus software available, sensitive company data can still be compromised by users falling victim to phishing scams. Phishing is a tactic where scammers trick users into giving out their personal information, usually through deceptive spam e-mails. Looking to fry bigger fish, scammers are trying their luck at whaling.

Continue reading

Don’t Underestimate the Hackers

b2ap3_thumbnail_Hacker400.jpgIn 2011, Ponemon Research surveyed 583 U.S. businesses and found that 90% of respondents reported that their company's computers had been breached at least once by hackers within the past year; 77% of these companies felt like they were attacked multiple times within the same year. If your SMB does not have any protection from hackers, then your sensitive data is at serious risk.

Continue reading

DeleteMe App Covers Your Internet Tracks

b2ap3_thumbnail_DeleteMeApp400.jpgIn today's digital age there are actually two of you. There is the flesh and blood you, that you are all-too-familiar with, and then there is the digital you, which amounts to a profile of yourself, compiled of data that is collected and exchanged by companies all over the internet. The worst part is how little you may know about your digital self.

Continue reading

Security Vulnerabilities Found in Java Software

b2ap3_thumbnail_orangejava400.jpgThere are several practices that you can do in order to keep your PC safe from computer viruses. Not visiting shady websites and keeping your antivirus program up-to-date are proven best practices; although, sometimes these practices are not enough. Sometimes hackers will find vulnerabilities in a trusted application and take advantage of them, this happened recently to Java.

Continue reading

4 Security Threats to Lookout for in 2013

b2ap3_thumbnail_threat400.jpgTechnology can change in an instant. The popularity of mobile devises and tablets has grown exponentially in a very short amount of time. In fact, having a tablet, smartphone, laptop and desktop is not an unusual occurrence, especially for small and medium business owners who are, essentially, always on the clock. And so, it stands to reason that threats and security are also evolving along with technology.

Continue reading

Network Security Stretched with BYOD and BYOA

b2ap3_thumbnail_byodrevolution.jpgWith 46% of American adults owning a smartphone, the Bring Your Own Device (BYOD) to work revolution is here to stay. BYOD may be convenient for employees, but it also presents challenges for IT network security. To complicate the matter further, we are now seeing a new revolution with Bring Your Own Application to work (BYOA).

Continue reading

Free Up Bandwidth with Internet Monitoring

b2ap3_thumbnail_2013time.jpgInternet bandwidth is a precious resource, and the amount your office can use is limited to whatever internet service package your company is signed up for. If your office is running short on bandwidth, then you will need to upgrade to a bigger package, which will be expensive. Before you spend money on upgrading, you should consider internet monitoring.

Continue reading

iTwin: A Hardware Solution for File Sharing

b2ap3_thumbnail_itwin10.jpgWith computing becoming increasing mobile, software companies have begun to roll out all kinds of file sharing options. There have been many of these file sharing options made available to consumers and companies alike, with most adhering to the freemium business model. Google (Drive), Apple (iCloud), and Microsoft (SkyDrive), and countless others have released file sharing and collaboration software via the cloud and while these services are great if you want to share small files like documents or playlists, when you need to share large files or a large quantity of files, these solutions quickly become expensive.

Continue reading

Stolen Device Damage Control

b2ap3_thumbnail_laptopstealer.jpgThe smartphone ownership rate for American adults increased to 46% in 2012, this according to a study by Pew Research. This study does not include other mobile devices like tablets, laptops, and notebooks, but the use of these devices is also growing, with worldwide sales for just smartphones and tablets projected to hit 1.2 billion in 2013.  

Continue reading

4 Tips to Shop Securely Online

b2ap3_thumbnail_addtocart10.jpgThe 2012 holiday online shopping season is shaping up to be the biggest yet. Harris Interactive conducted a survey regarding this holiday season, and found that 51% of Americans plan on shopping online this year. Everybody has different reasons to shop online, 71% of respondents thought they could find better deals, and 31% want to simply avoid the crowds.

Continue reading

Increase Security with Multi-Factor Identification

a1sx2_Original1_laptopsafepw.jpgUsing a strong password with complex combinations of letters and numbers will go a long way in protecting your account, but passwords provide only one level of protection against hackers. Additional levels of security can be added with multi-factor authentication. This is the best protection available for your internet accounts, and major technology companies have recently made this a reality for the public.

Continue reading

3 HandyTools to Remember Your Passwords, Part 2

a1sx2_Original1_passwordpostits.jpgLast time, we spoke about password security, we went over the importance of using strong passwords to avoid identity theft. In part two, we will discuss three easy password solutions that can help you manage all of your different passwords.

Continue reading

Password Vulnerability and Security, Part 1

a1sx2_Original1_lockeddownlaptop.jpgA weak password makes identity theft easy for hackers. You would never paint your social security number on the side of a truck and drive around town, but if your password is shared, left out in the open, and used on multiple sites, then you might as well ride shotgun with the Lifelock CEO (his SSN has been stolen 13 times).

Continue reading

Anatomy of a Hacker

 

a1sx2_Original1_scaryshadyhackerinthedark.jpgIf you have ever been the victim of a computer virus or cyber attack you know how bad it can hurt. You know the pain of having your data compromised or even your business operation completely shut down. You feel violated, and to add insult to injury, you have no idea who did this dirty deed.

Continue reading

6 Security Questions to Ask Your Pentesting Company

a1sx2_Original1_safefolder.jpgProminent companies falling victim to hacker has become all too common in the news. Some of the larger breaches in security involve the compromise of thousands of customers' information. Definitely not the kind of press you want, not to mention the irreparable damage to your business. This can be a little scary for a small business owner, especially if you consider that these large companies have the best cyber security money can buy.
Continue reading

5 Email Threats You Must Know

a1sx2_Original1_junkmail10.jpgIf only spam were true. You would have thousands in unclaimed money, cute singles would be lining up to meet you, and there would be a magic pill that would revolutionize your personal life. Some spam is so ridiculous they are instantly deleted, others are more subtle and dangerous. Here are some threats to watch out for before you open that unsolicited email.

Tags:
Continue reading

Travel With Free Wi-Fi

a1sx2_Original1_freewifilogo.jpgEverybody likes the free goodies in a hotel room, tiny shampoo bottles, coupons to nearby restaurants, and HBO top the list. Wi-Fi however, our favorite goodie, sometimes fails to make the complimentary goodie list. It seems a little messed up to us, that hotels (the place you work and sleep) charge you for Wi-Fi while Burger King gives it away for free, but we have found a Wi-Fi loophole to help you out.

Continue reading

Protect your Dropbox with Two-Step Authentication


a1sx2_Original3_phonepadlock.jpgDropbox, a popular file-hosting service for both home-users and businesses, recently added a new security feature to prevent unauthorized access to your Dropbox files and folders. You can enable Dropbox to send a security code to your mobile phone whenever you log in.

Continue reading

Ransomware: Computers Held Hostage

As computer technology around us continues to advance, so too does the development of computer viruses, spyware and malware. The latest digital plague is called Ransomware, malicious software that takes over the hard drive of infected computers until ransom is paid.

Continue reading

6 Million Passwords Stolen from LinkedIn

LinkedIn, the popular social network geared towards business networking and communication, has reported a major breach in security. A file containing over six million passwords was leaked and posted on the Internet. What does this mean for you, and what course of action should you take?

Continue reading

The BYOD Revolution

Today, your employees are more and more technologically empowered. With the consumer electronics market teaming with amazing gadgets and high-end devices, cool tech is no longer reserved for fancy geek toys. With employees bringing in their own smartphones and tablets, mobile security becomes a big concern for small businesses.

Continue reading

Is it Time to Ditch Windows XP?

Windows XP was released back in October 2001, and still today, many users and businesses still use it every day. Even in 2012, XP's market share is around 27%. Is your business still using Windows XP? How much longer should XP be kept around?

Continue reading

Mac Malware on the Rise

It looks like Mac users won't be getting a break from malware as another trojan is breaking out on OS X. In February, malware known as Flashback infected around 600,000 Macs. This month a new trojan called SabPub is making its rounds.

Continue reading

Public Safety Tip: Wi-Fi Hotspot Security

When traveling with your trusty laptop or tablet, it's pretty common to find publicly accessible Wi-Fi networks that you can connect to, enabling you to surf the web. Where ever you are, whether it's a coffee shop, hotel, airport, or anywhere else, it's important to be safe about public surfing.

Continue reading

Stuxnet: When Computer Viruses are Weapons

To most people, computer viruses are things that cause annoyance, downtime, and cost money to fix. That's pretty bad on it's own, but some viruses are much more complex than others and can be far more dangerous. Let's look at Stuxnet, coined as the first weapon made entirely out of code, and why it is so frightening.

Tags:
Continue reading

Social Media Scammers Play Dirty

Ever since the public has been logging on to the Internet, certain people have been using the Internet to take advantage of others. Whether it be through scams, viruses, malware, phishing, or a whole slew of other dangerous activity, cyber criminals have been very good at making Internet security an industry on its own. With the colossal popularity of social networks like Twitter and Facebook, miscreants are capable of targeting even more users than ever before. On top of that, their methods seem to be hitting people where it hurts. Learn how you can prevent falling into one of their traps.

Continue reading

Your Company's Social Media Policy

The time to implement a social media policy is now. Your social media policy outlines for employees your companies guidelines or principles for communicating in the online world.  Your company should have a communications policy in place that spell out your expectations for phone and email, it’s important that you add social media and online site usage to this policy.

 

Continue reading

Securing your Wi-Fi

A lot of businesses have been taking advantage of Wi-Fi wireless networking to increase mobility around the office for staff. Most businesses seem to understand that their Wi-Fi network needs to be password protected to keep outsiders from getting in, but most businesses often make the mistake in using WEP security on their wireless network instead of a more secure solution.

 

The WEP algorithm can be hacked in minutes by a savvy user with a notebook, not only giving them access to your internet access, but to your network and files. Read on to learn a better way to secure your wireless network.

Continue reading

What to do if your Laptop is Stolen

The problem with carrying around an expensive, portable piece of equipment is that it's possible for someone to pick it up and run with it. According to LoJack, a security firm that focuses on stolen property, two million laptops are stolen each year. What should you do if you are a victim of laptop theft?

Continue reading

Is Your Printer a Security Threat?

Your printer typically has pretty limited functionality, or at least one would think, right? It prints, maybe it can print on both sides of the paper, sometimes it can scan documents, and it can allow hackers the ability to steal your data and commandeer your network. Wait, say what?

Continue reading

How Safe is Your Email?

Email is (and has been) a prime method of communication for businesses of all sizes. With email comes a whole slew of issues that are essentially synonymous with the technology; spam, information overload, phishing, and information privacy. Even Upstate New York small businesses that only do business locally are at risk of these issues. Personal email accounts are equally at risk. Employing proper precautions and practices whenever communicating via email is very important to prevent the risk of security compromises, monetary loss, and even legality issues.

Continue reading

Is Free Wi-Fi Dangerous?

If you take a laptop out into the world, you've probably seen the notification saying "Wireless Network Detected." Free hotspots are not uncommon in coffee shops, hotels, airports, and other public locations,  There are some things to know before you simply hop on an unfamiliar wireless network.

Continue reading

6 Security Policies Upstate New York Businesses Should Consider

Security is an important aspect to a company's continuity, and while portions of business security involve things like anti-virus and firewalls, other aspects of security can't be handled by a piece of equipment. In these cases, your organization needs to create security policies, and keep them up to date as the company grows and changes. There are many policies and sub policies that are necessary for any organization that, if non-existent, can cause chaos down the road.

Continue reading

Are Digital Security Habits Linked to Real-World Security Habits?

Sometimes studies like these are laughable, but nevertheless, worth discussing.  Norton's latest Cybercrime report suggests that people who fall victim to malware are statistically more likely to be mugged in real life.  If someone is careless when it comes to online security, could that really reflect how susceptible they are in everyday life?

Tags:
Continue reading

Fake Antivirus

Have you ever been browsing the internet when out of nowhere your computer starts telling you that you are at risk or that you've downloaded a virus, and before you know it your screen is inundated with warnings and virus scanners? In most cases, this over-dramatic display is caused by a fake antivirus program. Today we're going to discuss how to prevent getting tricked by a fake antivirus attack.

Continue reading

This Patch Tuesday Fixes Dangerous Security Flaws

Patch Tuesday is typically the second Tuesday of each month, and is the day Microsoft releases security patches for Windows Update. This month's Patch Tuesday has some of the most significant updates compared to the past several months, fixing many dangerous flaws with imminent exploits. These are critical updates that, if not installed, will leave computers vulnerable to attack.

Continue reading

So Why ARE Updates Important?

We're asked all time, both by existing clients and during dialog while on boarding new prospects to our NOCOLOGY IT Support Services.  'What exactly is the point of running Windows updates, especially when my workstation or server is running fine?'

We'll cover why updates are so important, discuss a couple ways you can make sure they are always done as well as how we test and prevent "bad updates".

Continue reading

Encrypting your Emails

Remember in "Mission Impossible," after an agent listens to his secret mission, the recording goes on to mention "This message will self destruct…" followed by the oversized tape-recorder puffing out billows of smoke. Businesses have gone a long way since then (we've replaced sending tape-recorders with the much more efficient email), and encrypting email messages is easy and cost effective for businesses that want to ensure that certain messages are only seen by certain recipients.

Continue reading

The Most Dangerous Threats to Your Business Could Be Internal

b2ap3_thumbnail_insider_mistakes_400.jpgMost of the time, when it comes to cybersecurity, businesses tend to focus primarily on external threats rather than those that might be lurking in the shadows of their internal operations. Believe it or not, the most dangerous entities out there could very well be working for you, right under your nose.

Continue reading

How a Firewall Protects Your Data From the Worst of the Web

b2ap3_thumbnail_firewall_security_400.jpgSince you run a business, you know that your business’s network requires a secure firewall in order to keep threats out. In fact, the firewall is the most basic of security protocol that you should be taking advantage of. Knowing what a firewall protects you from, and what it doesn’t protect you from, is an important first step toward improving your data infrastructure’s security, and in turn improving your business’s continuity.

Continue reading

Complacent IT Technicians Can Be a Company’s Worst Nightmare

b2ap3_thumbnail_be_safe_on_network_400.jpgThe modern business is inundated with all types of threats, from people outside the organization phishing around for information, to employees that are aloof to their role in your network’s security. If your network’s security is like a levee, it is indisputably an IT department’s job to fill in the gaps to ensure a deluge of misfortune doesn’t swamp your company’s IT. So what happens when your company’s IT department is the biggest offender of perilous activity?

Continue reading

How Sloppy Security Practices Put Companies at Risk

b2ap3_thumbnail_identities_400.jpgIn today’s online business environment, security is nothing to scoff at. Yet, there are many businesses that don’t play by the rules when it comes to monitoring account security on a shared network. This puts both themselves, and their businesses, in danger.

Continue reading

Mobile Botnets Make the Internet Even Less Secure

b2ap3_thumbnail_hackers_are_using_botnets_400.jpgTechnology is often exploited by hackers for their benefit, but one avenue of attack that’s consistently neglected is the mobile device. Smartphones and tablets are arguably at greater risk than desktops and workstations due to them being exposed to more wireless networks. One of the greatest threats to these devices is the botnet, a threat that usually targets desktop computers, enslaving them and turning the machine against its owner (and the rest of the Internet).

Continue reading

Ransomware: A Look at Today’s Worst Cyberthreat

b2ap3_thumbnail_get_your_encryption_key_400.jpgThere are many types of malware out there, but few are as scary as ransomware. Imagine being struck by a threat that instantaneously locks down your files and keeps you from accessing them until you pay a certain amount of money. If your business is targeted by ransomware, would you be able to protect it from dragging your operations into a bitter pit of despair?

Continue reading