fbpx

Don’t wait any longer. Get started today!

 
 

Directive Blogs

Directive has been serving the Oneonta area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cyberattacks and data breaches are a threat to businesses everywhere. The most important places to start for preventing a breach is with your employees and their knowledge and use of cybersecurity best practices.

The cybersecurity tips below cover awareness, basic safety, online safety, social media, data security, tips for remote workers,...

Cyberattacks and data breaches are a threat to businesses everywhere. The most important places to start for preventing a breach is with your employees and their knowledge and use of cybersecurity best practices.

The cybersecurity tips below cover awareness, basic safety, online safety, social media, data security, tips for remote workers, small businesses, and considerations for business owners and managers to keep in mind.

More

Phishing Basics for Superhumans

Welcome to Cybersecurity Awareness Month! This year, learn the ways of cyber superhumans and discover how to protect your digital world from cyber threats.

In this Micro Training, we’ll focus on phishing—a deceptive tactic used by cybercriminals to steal your personal information.

Continue reading

Ghosts of Breaches Past

Your online actions leave a trace that can come back to haunt you long after you’ve forgotten about them.

In this Micro Training, learn how past breaches can resurface years later and strategies to protect your accounts from these digital phantoms.

Continue reading

Online Gaming Scams

Online gaming is fun, but it’s not just about defeating virtual enemies – real-life cybercriminals could be lurking behind the screen.

In this Micro Training, learn about some cybersecurity risks of online gaming and tips for gaming safely.

Continue reading

Election Scams

Billions of people are voting in major elections this year, and cybercriminals are using advanced techniques to influence voters and steal personal information.

In this Micro Training, we share common election-related scams and ways to protect yourself.

Continue reading

Insider Threats

Have you ever considered that the biggest threat to your cybersecurity might be sitting just a few desks away?

In this Micro Training, learn about insider threats and the dangers they pose for an organization.

Continue reading

Evil Twin Scams

Do you feel confident in your ability to spot a fake Wi-Fi network?

If not, this Micro Training video on evil twin attacks is a must watch!

Continue reading

Ransomware

The threat of ransomware has not diminished over the years. In fact, additional extortion techniques are making these attacks even more dangerous.

In this Micro Training, learn about what ransomware is, how damaging it can be, and the best practices for protecting your devices.

Continue reading

Dictionary Attacks

If your passwords are easy for you to remember, they may also be easy for a cybercriminal to guess using a dictionary attack.

In this Micro Training, learn about how dangerous dictionary attacks can be and how to protect your accounts.

Continue reading

Text-Based CEO Fraud

Cybercriminals are exploiting text messages in sophisticated CEO fraud schemes, tricking employees into revealing sensitive information or sending money under the guise of urgent requests from top executives.

In this Micro Training, learn the essential strategies to protect yourself and your organization from these increasingly common and deceptive scams.

Continue reading

Malicious Apps

App stores are brimming with helpful tools and entertainment options, but hidden among these useful applications are malicious threats waiting to trip up unwary users.

In this Micro Training, learn more about the signs of suspicious apps so you can steer clear of the malicious ones and explore app stores with confidence.

Continue reading

One-Time Password Scams

While one-time passwords can be a great way to verify a user’s identity, in the wrong hands, they can be used for harm.

In this Micro Training, we'll explore how cybercriminals are exploiting one-time passwords (OTPs) to carry out their scams.

Continue reading

Social Media Cyber Safety Part 2

Last week, we uncovered common scams found on social media.

In this Micro Training, we share helpful tips on how to use social media more safely.

Continue reading

Social Media Cyber Safety Part 1

Social media can be fun – but you should still use it with the same caution you use with any other online activity.

In this Micro Training, learn how to recognize common social media scams, such as phishing, account hijacking, and malware.

Continue reading

Cyber-Safe Travel Tips

Traveling can broaden your horizons and offer the chance to explore, but in today’s hyper-connected world, it can also make you more vulnerable to cybersecurity risks.

In this Micro Training, learn practical strategies to protect yourself from cyber threats while traveling.

Continue reading

Top 3 Smishing Saves

Smishing is on the rise, and to better understand how it works, we are taking a look at the top smishing saves made by super cyber-aware users.

In this Micro Training, we will look at three scenarios of smishing and examine how each user was able to spot it.

Continue reading

AI Vishing

Artificial Intelligence and deepfake audio are increasingly being used by cybercriminals in their scams.

In this Micro Training, we will look at a specific AI vishing scam that targets a user’s relatives.

Continue reading

Stalkerware

Do you feel like someone knows what you are doing online? If someone knows information about you that they shouldn’t, or mysterious apps are popping up on your device, it could be a case of stalkerware.

In this Micro Training, we will define stalkerware and explain how to identify and avoid it.

Continue reading

TVs and Scammers

Did you know that Smart TVs are considered IoT devices?

In this Micro Training, explore this connection further, and see how cybercriminals are taking advantage of it.

Continue reading

Securing Your Workspace

What do a clean desk and a strong password have in common? They both increase security!

In this Micro Training, we will explore the possible cybersecurity repercussions that come with keeping a messy workspace.

Continue reading

AI and Spam

Does the internet ever feel like an avalanche of never-ending content?

In this Micro Training, learn how AI content farms exacerbate this feeling, leading to intentional and unintentional misinformation spreading like wildfire.

Continue reading

Putting Cybersecurity First

We are going back to the basics so you can learn how to put cybersecurity first in your work and personal life.

In this Micro Training, learn eight quick and simple tips on how you can put cybersecurity first.

Continue reading

Pig Butchering Scams

In a pig butchering scam, cybercriminals are playing the long game to squeeze as much as they can out of their victim.

In this Micro Training, learn about how pig butchering scams work and what you need to be on the lookout for.

Continue reading

QR Code Phishing

Have you received an email with a QR code in it recently? Watch out! It might be a scam.

In this Micro Training, find out more about the increasingly common tactic of QR code phishing, also known as Quishing.

Continue reading

Fitness Scams

Often times, our fitness goals get lumped in with our New Year’s resolutions, and in the spirit of our 2024 cybersecurity resolutions, we're joining forces in this training, too.

In this Micro Training, learn more about the world of fitness scams that may be encountered along your fitness journey.

Continue reading

The Cyber Twilight Zone

Imagine for a moment, if you will, your email account has been compromised!

In this Micro Training, we’ll cover one example of how cybercriminals can gain access to your email account, as well as what their nefarious next steps might look like.

Continue reading

Attack Surfaces: Physical and Digital

If attack vectors are the method that cybercriminals use to infiltrate a network, an attack surface is the number of potential entry points.

In this Micro Training, we will learn more about attack surfaces and their physical and digital states.

Continue reading

Attack Vectors: Active and Passive

Attack vectors may sound like a term out of a Sci-Fi film, but you’ve definitely run into them more often than you think.

In this Micro Training, we’ll define what an attack vector is, along with the active or passive roles that they may take.

Continue reading

Marketplace Scams

Online marketplaces are not only havens for bargain hunting and re-selling – they are also a favorite hunting ground for cybercriminals looking to scam you out of goods, money, and personal information.

In this Micro Training, we’ll review common marketplace scams and the best ways to protect yourself from them.

Continue reading

Delivery Scams

Congrats! You finally got through the process of making your online purchase. But wait! You’re not out of the scammers' grasp yet.

In this Micro Training, learn about three delivery scams that cybercriminals use to capitalize on the process of online shopping.

Continue reading

Securing Your Computer from Eavesdropping

If you’ve ever had the uneasy feeling like someone is reading over your shoulder or listening from around the corner, then you already have some experience with this scamming technique.

In this Micro Training, we’ll cover eavesdropping – what it is and what it means for the security of your desktop or laptop computer, as well as best practices for securing your system against it.

Continue reading

Transportation Scams

The holiday travel season is about to begin! This can be a hectic time for everyone, and cybercriminals are capitalizing on it.

In this Micro Training, we’ll cover some of the common transportation scams that are circulating the web this year.

Continue reading

Does Your Device Have Malware?

Is your device running slower than normal? Are excessive pop-ups ruining your online experience? If you answered “yes” to these questions, your device might have malware.

In this Micro Training, find out more about signs of malware and learn what steps to take if your device has been infected.

Continue reading

Display Name Scams

Did you know that the first element of an incoming message that we often see, especially on a mobile device, is not the sender’s email address but their display name.

In this Micro Training, tune in for another episode of the "Cyber Talk Show", and learn more about the sneaky tactic of display name spoofing.

Continue reading

Recognizing and Reporting Phishing

For this Micro Training, we’re doing a bait-and-switch on the cybercriminals: teaching you how to catch your own phish with tips on what to look out for, and advice on how to report suspicious activity.

Continue reading

Updating Pro Tips

For this Micro Training, learn the benefits of updating systems, and gain some tips on how to efficiently and effectively protect your devices through updates.

Continue reading

Securing Your Smart Home and IoT Devices From Eavesdropping

The “Internet of Things” is all around us, and cybercriminals are eager to make use of it.

In this Micro Training, we’ll look at the impact of eavesdropping attacks on smart home and IoT devices.

Continue reading

Credential Stuffing Attacks

If you reuse the same password across multiple accounts, watch this training video!

In this Micro Training, learn how cybercriminals are using previously exposed credentials to access different accounts.

Continue reading

Password Managers

Change is scary. Which is why, even though you know Password Managers help to manage complex passwords across several accounts, you still stick with the same, old passwords you’re comfortable with: using them over, and over, and over.

In this Micro Training, learn more about what Password Mangers have to offer, and see if this tool is a good match for your security goals.

Continue reading

Phishing 401

Phishing has a fascinating historical and societal impact that is often overlooked. With Phishing401, this “senior level” course dives deeper into the subject matter, allowing you to advance in your phishing studies.

In this Micro Training, we will take a look at how phishing began, why it has been successful, and what causes psychology to play such an important role for both the scammer, and the victim.

Continue reading

Insider Threats: Intentional

An insider threat is when an individual with authorized access for an organization, misuses their access in a way that harms the organization. As the name implies, these threats come from within.

In this micro training we’re looking at Intentional Insider Threats which are deliberate and often planned actions often carried out for personal gain or to right a perceived injustice.

Continue reading

Insider Threats: Unintentional

An insider threat is when an individual with authorized access for an organization, misuses their access in a way that harms the organization. As the name implies, these threats come from within.

In this micro training we’ll look at Unintentional Insider Threats, which are actions that may harm an organization that are NOT planned or carried out with malicious intent. The individual at fault is often referred to as a pawn.

Continue reading

6 Simple Tips To Protect From Insider Threats

An insider threat is when an individual with authorized access for an organization, misuses their access in a way that harms the organization. As the name implies, these threats come from within.

In this micro training, we review six simple tips for staff, management and IT to safeguard their organization from potential insider threats.

Continue reading

Romance Phishing Scams

Romance Scams are yet another area in which cybercriminals are leveraging our strongest emotions to cultivate an “error-prone mindset” leaving broken hearts and broken passwords in their wake.

In this Micro Training, we’ll look at some of the most common and recent iterations of the romance scam and how to cultivate the awareness it takes to beat them.

Continue reading

What is The Dark Web?

When you think of the Dark Web, you might picture a big spiderweb filled with illegal substances, counterfeit bills, and stolen credit cards. But did you know not everything on the Dark Web is nefarious?

So then what exactly is the Dark Web, and why is it associated with your personal information? Find out in this Micro Training.

Continue reading

Cybersecurity and Burnout

When the afternoon slump hits, cybercriminals get to work pushing out their Spear Phishing campaigns. Why? Because people are more likely to make mistakes and click the link when they are burnt out.

In this Micro Training, learn the different signs and types of burnouts, and how they can affect your cybersecurity awareness.

Continue reading

Spotting a Phishing Landing Page

Phishing landing pages are commonly found after a user clicks a link in a malicious message or by being redirected during a web browsing session.

But how can you spot these sneaky sites? Learn the difference between a phishing landing page and the real deal in this Micro Training.

Continue reading

Five Physical Security Tips

While the focus of cybersecurity is often on technological safeguards, there are also many physical security measures that play an important role in keeping data safe.

We take a look at five physical security tips to protect devices and sensitive information.

Continue reading

Top 3 Phishing Saves

Phishing messages come in many forms, with many different ways to catch and respond to them.

To wrap up Cybersecurity Awareness Month, we’ll look at the importance of recognizing and reporting an incident by analyzing three different phishing attempts.

Continue reading

Public WiFi Scams

Sooner or later we all find ourselves in a public place with a device in our hands and a Public WiFi network as our best means of connecting to the internet. However, Public WiFi can pose as a serious threat to our security and privacy.

This Micro Training focuses on simple steps we can all take to stay more secure and more aware when using Public WiFi connections.

Continue reading

The 6 Principles of Social Engineering

Social engineering is a tactic many scammers know well, and without our awareness of their tricks, it could leave the door open to a scam.

In this Micro Training, we unpack the 6 Principles of Social Engineering and look at examples of how a scammer may utilize each tactic.

Continue reading

The 3 R’s of Password Protection

The 3 R’s (aka: Reduce, Reuse, and Recycle) is not just a way to keep our planet cleaner but also a way to evaluate password strength.

In this Micro Training, we break down the three ways to ensure your password stays “in the green.”

Continue reading

Deepfake Scams

Deepfakes have been making their rounds on social media sites. Most are just harmless fun, but advancements in technology are opening avenues for scams.

In this Micro Training, learn more about how scammers use deepfake audio and video to enhance their scams.

Continue reading

Phishing Email Unboxing

Did you know that the average employee receives 1.2 phishing emails per day?

In this Micro Training, we’re unboxing two of the cleverest phishing emails that are currently circulating the internet so that you’ll be better prepared when one lands in your inbox.

Continue reading

Wrong Number Scams

Unsolicited text messages from unknown numbers have always been a go-to tactic for scammers. But when a message simply says, “Hi,” or “Sorry, wrong number,” curiosity may take over.

In this Micro Training, learn how scammers are carrying out wrong number scams and what to do if you receive one of these mysterious text messages.

Continue reading

IoT and Smart Devices

Smart devices are quickly becoming an integral part of society. But as the world continues to get more connected, the number of connected devices susceptible to cybercriminals grows, as well.

In this Micro Training, find out how to keep your data safe despite the increasing number of smart devices connected to the Internet of Things.

Continue reading

Online Tracking

Many users are aware that they are being tracked online. While some of this tracking can be used to customize the user experience, it is important to know how to protect your tracked data from cybercriminals’ prying eyes.

In this Micro Training, follow along as we dive into how internet tracking works and the many ways to protect your data.

Continue reading

MFA Fatigue Attacks

Multi-Factor Authentication is a great way to restrict access to accounts if there were to be an exposure of your credentials, but cybercriminals are finding ways to get around these defenses.

In this Micro Training, learn the tricks cybercriminals are using to get past these security measures and the tips to make this process stronger.

Continue reading

Top 3 Cybersecurity Shields

It can often be challenging to keep up with all of the cybersecurity threats and corresponding preventative measures.

That is why, in this Micro Training, we’re providing you with three essential cybersecurity guidelines to help keep your shields up.

Continue reading

Event Scams

Learn to spot event scams so you don’t get played!

In this Micro Training, we will tackle the topic of event scams and explore how to spot advertisements and ticket opportunities that are too good to be true.

Continue reading