fbpx

Don’t wait any longer. Get started today!

 
 

Directive Blogs

Directive has been serving the Oneonta area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cyberattacks and data breaches are a threat to businesses everywhere. The most important places to start for preventing a breach is with your employees and their knowledge and use of cybersecurity best practices.

The cybersecurity tips below cover awareness, basic safety, online safety, social media, data security, tips for remote workers,...

Cyberattacks and data breaches are a threat to businesses everywhere. The most important places to start for preventing a breach is with your employees and their knowledge and use of cybersecurity best practices.

The cybersecurity tips below cover awareness, basic safety, online safety, social media, data security, tips for remote workers, small businesses, and considerations for business owners and managers to keep in mind.

More

Weekly Micro Training - Cyber Stories: Passwords

Your password is the first line of defense between you and a cybercriminal—but if it’s weak, reused, or predictable, it could prevent you from staying safe online.

In this Micro Training, we’re continuing Cybersecurity Awareness Month with tips on what makes a strong password, why password managers can help, and how cybercriminals exploit weak or reused passwords.

0 Comments
Continue reading

Hacking Fear Tactics: Intermediate

The truth is, fear is one of the most powerful tools hackers use because it works.

In this Micro Training, we’re going beyond just recognizing fear tactics—we’re going to teach you how to hack the attack.

0 Comments
Continue reading

Why Phishing is Getting Scarier: Advanced

You’ve seen phishing emails before. But have you noticed how they’ve evolved?

In this Micro Training, we’re going to show you how phishing has become emotional warfare—and why understanding its evolution could protect you from falling for the next attack.

0 Comments
Continue reading

How Fear Tactics Work: Beginner

Cybercriminals don’t need advanced tech to hack you—they just need to make you panic.

In this Micro Training, we'll discover how fear-based scams work, and what one might look like.

0 Comments
Continue reading

Critical Infrastructure: Advanced

Cyber hygiene is a foundational first line of defense, and just like any other physical structure relies on a solid foundation, so does critical infrastructure.

In this Micro Training, we'll take a look at how the world’s most targeted and essential industries prioritize cyber hygiene, and what other industries can learn from their best practices.

0 Comments
Continue reading

Critical Infrastructure: Intermediate

In this Micro Training, we’ll take a closer look at the specific methods attackers use to compromise these vital systems.

0 Comments
Continue reading

Critical Infrastructure: Beginner

In today’s hyperconnected world, protecting critical infrastructure—our most essential systems and services—is more important than ever.

In this Micro Training, we’ll explore the vast scale of critical infrastructure and uncover why these systems are so often targeted in cyberattacks.

0 Comments
Continue reading

Wearables: Retire Yours the Right Way

Many of us have wearable devices that we use every day, but eventually these devices will have to be retired.

In this Micro Training, we’ll go over techniques like account delinking, cloud data purging, and more, making sure that you stay protected even after you part ways with your wearable device.

0 Comments
Continue reading

Wearables: Breached and Exposed

Ever wonder what really happens during a wearable device breach—or how attackers can use compromised devices against you?

In this Micro Training, we’ll break it all down and show you how to protect your devices and personal data from falling into the wrong hands.

0 Comments
Continue reading

Wearables: How Yours Could Be Infiltrated

Did you know your wearable device could be silently connecting to Bluetooth devices and Wi-Fi networks you never approved of?

In this Micro Training, we’ll explore how hackers exploit these invisible connections, as well as how to lock down your wearable and keep your sensitive information out of the wrong hands.

0 Comments
Continue reading

Wearables: What Makes Wearables Risky

Smartwatches, fitness trackers, and other wearables are more than health tools — they’re internet-connected devices that can expose personal and work data if not secured.

In this Micro Training, you’ll learn how wearables fit into the Internet of Things (IoT), the cybersecurity risks they pose, and what you can do to stay safe.

0 Comments
Continue reading

ShadowIT - Advanced

By now, you’re familiar with the basics of shadow IT, and you’ve heard the risks.

In this Micro Training, dive deeper into our three-parts shadow IT series, exploring the role of software as a service (SaaS) and how it fuels the rise of shadow IT.

0 Comments
Continue reading

Shadow IT - Intermediate

Shadow IT isn’t just about someone downloading a random app, it’s often a response to unmet needs.

In this Micro Training, learn what drives shadow IT and how understanding the "why" behind it can help strengthen your organization’s security.

0 Comments
Continue reading

Shadow IT - Beginner

The term "Shadow IT" may sound mysterious, but the practice is actually quite common in most workplaces.

In this Micro Training, jumpstart your learning journey with a beginner-friendly course that covers the fundamentals of this growing cybersecurity risk.

0 Comments
Continue reading

Cryptojacking Prevention

You don’t need to be an expert to stop cryptojacking—just a few smart habits and tools can do the trick.

In this Micro Training, learn practical steps to block cryptojacking attempts and what your IT provider can do to help keep your system clean and efficient.

0 Comments
Continue reading

Cryptojacking Fundamentals

Your device might be working overtime, and not for you. Cryptojacking is when cybercriminals secretly use your system to mine cryptocurrency.

In this Micro Training, learn what cryptojacking is, why it’s dangerous, and how cybercriminals use your device to mine cryptocurrency without your knowledge.

0 Comments
Continue reading

Fileless Attacks

Have you ever noticed your computer running more slowly, crashing randomly, and just behaving strangely? Fileless malware could be the culprit.

In this Micro Training, learn how fileless malware spreads, why it’s so difficult to detect, and the best ways to protect yourself from this invisible threat.

0 Comments
Continue reading

TOAD Attacks

Scammers are constantly evolving their tactics, and telephone-oriented attack deliveries (TOADs) are a prime example. These attacks combine phone calls and emails to deceive users into revealing sensitive information or installing malware.

In this Micro Training, learn how TOAD attacks work, why they’re so effective, and how to stay protected.

0 Comments
Continue reading

Out-of-Office Phishing Attacks

Picture this: You’re heading out on vacation, but while you’re enjoying some well-deserved time off, cybercriminals are hard at work, setting the stage for their next phishing attack.

In this Micro Training, learn how scammers can exploit your Out-of-Office auto-reply emails, and what you can do to stay protected.

0 Comments
Continue reading

Bitcoin ATM Scams

Did you know Americans lost over $65 million to Bitcoin ATM scams in just the first six months of 2024!

In this Micro Training, learn how these scams work and how you can protect yourself.

0 Comments
Continue reading

Fake Job Recruitment Scams

These latest scams are designed to lure you in with enticing job offers. The catch? You’re not even looking for a new job!

In this Micro Training, learn how scammers are getting more creative with fake job recruitment scams that could expose you to identity theft, malware, or financial fraud.

0 Comments
Continue reading

The Gray Web

By now you’ve already heard about the dark web and the deep web, but what about the gray web?

In this week's Micro Training, we will be further exploring this less distinct yet crucially important space to understand when navigating online environments.

0 Comments
Continue reading

The Deep Web

While the dark web and the deep web may sound similar, the two are vastly different.

In our Micro Training series on the dark, the deep, and the gray web, this edition we will be further exploring the deep web and how it works.

0 Comments
Continue reading

The Dark Web

The dark web, the deep web, and the gray web—these names may all sound similar, but it’s important to know just how different they are.

With this week’s Micro Training, we’ll kick off a three part series with the dark web, including how it works and who is on it.

0 Comments
Continue reading

How Scam Centers Work

Think one scammer is frightening? Imagine a collective team of scammers working together to defraud their victims.

In this Micro Training, learn the truth behind scam centers and hear an expert’s advice on how to stay safe.

0 Comments
Continue reading

Gift Card Scams

Imagine getting a call from a friend in trouble, begging you to help by sending money via a gift card. It seems urgent, but take a moment to pause and think, as you may be the target of a gift card scam.

In this Micro Training, learn how to recognize red flags that could indicate gift card scams, and how to protect yourself.

0 Comments
Continue reading

Brushing Scams

Beware of mysterious deliveries! Receiving a package you did not order could be a sign of a brushing scam.

In this Micro Training, we explore how brushing scams work, why they happen, and steps you can take to protect your personal information.

0 Comments
Continue reading

Sextortion Scams Part 2

Imagine getting an email that threatens to reveal your most personal secrets—only to realize it's all a carefully crafted lie meant to scare you.

In this Micro Training, we uncover how sextortion scams use fear and publicly available information to create fake threats. We also explain what to do if you’re the target of this type of sextortion scam.

0 Comments
Continue reading

Sextortion Scams Part 1

What would you do if someone you trusted turned your intimate photos into a weapon of blackmail? This alarming reality, known as sextortion, is a growing threat that could happen to anyone.

In this Micro Training, learn how to protect yourself from sextortion scams, recognize red flags, safeguard your online presence, and take immediate action if targeted.

0 Comments
Continue reading

The Final Guard - Software Updates

As Cybersecurity Awareness Month comes to an end, our superhero guide leaves you with one last piece of advice: update your software!

In thisMicro Training, find out why keeping your software up-to-date is an important step in securing our world.

0 Comments
Continue reading

Secure Our World with MFA

In today's digital world, passwords alone aren't enough to protect your accounts from cyber threats. That's why multi-factor authentication (MFA) is becoming a crucial tool in cybersecurity.

In this Micro Training, learn how implementing MFA can enhance your security and discover how cybercriminals are trying to capitalize on this growing security trend.

0 Comments
Continue reading

Phishing Basics for Superhumans

Welcome to Cybersecurity Awareness Month! This year, learn the ways of cyber superhumans and discover how to protect your digital world from cyber threats.

In this Micro Training, we’ll focus on phishing—a deceptive tactic used by cybercriminals to steal your personal information.

0 Comments
Continue reading

Ghosts of Breaches Past

Your online actions leave a trace that can come back to haunt you long after you’ve forgotten about them.

In this Micro Training, learn how past breaches can resurface years later and strategies to protect your accounts from these digital phantoms.

0 Comments
Continue reading

Online Gaming Scams

Online gaming is fun, but it’s not just about defeating virtual enemies – real-life cybercriminals could be lurking behind the screen.

In this Micro Training, learn about some cybersecurity risks of online gaming and tips for gaming safely.

0 Comments
Continue reading

Election Scams

Billions of people are voting in major elections this year, and cybercriminals are using advanced techniques to influence voters and steal personal information.

In this Micro Training, we share common election-related scams and ways to protect yourself.

0 Comments
Continue reading

Insider Threats

Have you ever considered that the biggest threat to your cybersecurity might be sitting just a few desks away?

In this Micro Training, learn about insider threats and the dangers they pose for an organization.

0 Comments
Continue reading

Evil Twin Scams

Do you feel confident in your ability to spot a fake Wi-Fi network?

If not, this Micro Training video on evil twin attacks is a must watch!

0 Comments
Continue reading

Ransomware

The threat of ransomware has not diminished over the years. In fact, additional extortion techniques are making these attacks even more dangerous.

In this Micro Training, learn about what ransomware is, how damaging it can be, and the best practices for protecting your devices.

0 Comments
Continue reading

Dictionary Attacks

If your passwords are easy for you to remember, they may also be easy for a cybercriminal to guess using a dictionary attack.

In this Micro Training, learn about how dangerous dictionary attacks can be and how to protect your accounts.

0 Comments
Continue reading

Text-Based CEO Fraud

Cybercriminals are exploiting text messages in sophisticated CEO fraud schemes, tricking employees into revealing sensitive information or sending money under the guise of urgent requests from top executives.

In this Micro Training, learn the essential strategies to protect yourself and your organization from these increasingly common and deceptive scams.

0 Comments
Continue reading

Malicious Apps

App stores are brimming with helpful tools and entertainment options, but hidden among these useful applications are malicious threats waiting to trip up unwary users.

In this Micro Training, learn more about the signs of suspicious apps so you can steer clear of the malicious ones and explore app stores with confidence.

0 Comments
Continue reading

One-Time Password Scams

While one-time passwords can be a great way to verify a user’s identity, in the wrong hands, they can be used for harm.

In this Micro Training, we'll explore how cybercriminals are exploiting one-time passwords (OTPs) to carry out their scams.

0 Comments
Continue reading

Social Media Cyber Safety Part 2

Last week, we uncovered common scams found on social media.

In this Micro Training, we share helpful tips on how to use social media more safely.

0 Comments
Continue reading

Social Media Cyber Safety Part 1

Social media can be fun – but you should still use it with the same caution you use with any other online activity.

In this Micro Training, learn how to recognize common social media scams, such as phishing, account hijacking, and malware.

0 Comments
Continue reading

Cyber-Safe Travel Tips

Traveling can broaden your horizons and offer the chance to explore, but in today’s hyper-connected world, it can also make you more vulnerable to cybersecurity risks.

In this Micro Training, learn practical strategies to protect yourself from cyber threats while traveling.

0 Comments
Continue reading

Top 3 Smishing Saves

Smishing is on the rise, and to better understand how it works, we are taking a look at the top smishing saves made by super cyber-aware users.

In this Micro Training, we will look at three scenarios of smishing and examine how each user was able to spot it.

0 Comments
Continue reading

AI Vishing

Artificial Intelligence and deepfake audio are increasingly being used by cybercriminals in their scams.

In this Micro Training, we will look at a specific AI vishing scam that targets a user’s relatives.

0 Comments
Continue reading

Stalkerware

Do you feel like someone knows what you are doing online? If someone knows information about you that they shouldn’t, or mysterious apps are popping up on your device, it could be a case of stalkerware.

In this Micro Training, we will define stalkerware and explain how to identify and avoid it.

0 Comments
Continue reading

TVs and Scammers

Did you know that Smart TVs are considered IoT devices?

In this Micro Training, explore this connection further, and see how cybercriminals are taking advantage of it.

0 Comments
Continue reading

Securing Your Workspace

What do a clean desk and a strong password have in common? They both increase security!

In this Micro Training, we will explore the possible cybersecurity repercussions that come with keeping a messy workspace.

0 Comments
Continue reading

AI and Spam

Does the internet ever feel like an avalanche of never-ending content?

In this Micro Training, learn how AI content farms exacerbate this feeling, leading to intentional and unintentional misinformation spreading like wildfire.

0 Comments
Continue reading

Putting Cybersecurity First

We are going back to the basics so you can learn how to put cybersecurity first in your work and personal life.

In this Micro Training, learn eight quick and simple tips on how you can put cybersecurity first.

0 Comments
Continue reading

Pig Butchering Scams

In a pig butchering scam, cybercriminals are playing the long game to squeeze as much as they can out of their victim.

In this Micro Training, learn about how pig butchering scams work and what you need to be on the lookout for.

0 Comments
Continue reading

QR Code Phishing

Have you received an email with a QR code in it recently? Watch out! It might be a scam.

In this Micro Training, find out more about the increasingly common tactic of QR code phishing, also known as Quishing.

0 Comments
Continue reading

Fitness Scams

Often times, our fitness goals get lumped in with our New Year’s resolutions, and in the spirit of our 2024 cybersecurity resolutions, we're joining forces in this training, too.

In this Micro Training, learn more about the world of fitness scams that may be encountered along your fitness journey.

0 Comments
Continue reading

The Cyber Twilight Zone

Imagine for a moment, if you will, your email account has been compromised!

In this Micro Training, we’ll cover one example of how cybercriminals can gain access to your email account, as well as what their nefarious next steps might look like.

0 Comments
Continue reading

Attack Surfaces: Physical and Digital

If attack vectors are the method that cybercriminals use to infiltrate a network, an attack surface is the number of potential entry points.

In this Micro Training, we will learn more about attack surfaces and their physical and digital states.

0 Comments
Continue reading

Attack Vectors: Active and Passive

Attack vectors may sound like a term out of a Sci-Fi film, but you’ve definitely run into them more often than you think.

In this Micro Training, we’ll define what an attack vector is, along with the active or passive roles that they may take.

0 Comments
Continue reading

Marketplace Scams

Online marketplaces are not only havens for bargain hunting and re-selling – they are also a favorite hunting ground for cybercriminals looking to scam you out of goods, money, and personal information.

In this Micro Training, we’ll review common marketplace scams and the best ways to protect yourself from them.

0 Comments
Continue reading

Delivery Scams

Congrats! You finally got through the process of making your online purchase. But wait! You’re not out of the scammers' grasp yet.

In this Micro Training, learn about three delivery scams that cybercriminals use to capitalize on the process of online shopping.

0 Comments
Continue reading

Securing Your Computer from Eavesdropping

If you’ve ever had the uneasy feeling like someone is reading over your shoulder or listening from around the corner, then you already have some experience with this scamming technique.

In this Micro Training, we’ll cover eavesdropping – what it is and what it means for the security of your desktop or laptop computer, as well as best practices for securing your system against it.

0 Comments
Continue reading

Transportation Scams

The holiday travel season is about to begin! This can be a hectic time for everyone, and cybercriminals are capitalizing on it.

In this Micro Training, we’ll cover some of the common transportation scams that are circulating the web this year.

0 Comments
Continue reading

Does Your Device Have Malware?

Is your device running slower than normal? Are excessive pop-ups ruining your online experience? If you answered “yes” to these questions, your device might have malware.

In this Micro Training, find out more about signs of malware and learn what steps to take if your device has been infected.

0 Comments
Continue reading

Display Name Scams

Did you know that the first element of an incoming message that we often see, especially on a mobile device, is not the sender’s email address but their display name.

In this Micro Training, tune in for another episode of the "Cyber Talk Show", and learn more about the sneaky tactic of display name spoofing.

0 Comments
Continue reading

Recognizing and Reporting Phishing

For this Micro Training, we’re doing a bait-and-switch on the cybercriminals: teaching you how to catch your own phish with tips on what to look out for, and advice on how to report suspicious activity.

0 Comments
Continue reading

Updating Pro Tips

For this Micro Training, learn the benefits of updating systems, and gain some tips on how to efficiently and effectively protect your devices through updates.

0 Comments
Continue reading

Securing Your Smart Home and IoT Devices From Eavesdropping

The “Internet of Things” is all around us, and cybercriminals are eager to make use of it.

In this Micro Training, we’ll look at the impact of eavesdropping attacks on smart home and IoT devices.

0 Comments
Continue reading

Credential Stuffing Attacks

If you reuse the same password across multiple accounts, watch this training video!

In this Micro Training, learn how cybercriminals are using previously exposed credentials to access different accounts.

0 Comments
Continue reading

Password Managers

Change is scary. Which is why, even though you know Password Managers help to manage complex passwords across several accounts, you still stick with the same, old passwords you’re comfortable with: using them over, and over, and over.

In this Micro Training, learn more about what Password Mangers have to offer, and see if this tool is a good match for your security goals.

0 Comments
Continue reading

Phishing 401

Phishing has a fascinating historical and societal impact that is often overlooked. With Phishing401, this “senior level” course dives deeper into the subject matter, allowing you to advance in your phishing studies.

In this Micro Training, we will take a look at how phishing began, why it has been successful, and what causes psychology to play such an important role for both the scammer, and the victim.

0 Comments
Continue reading

Insider Threats: Intentional

An insider threat is when an individual with authorized access for an organization, misuses their access in a way that harms the organization. As the name implies, these threats come from within.

In this micro training we’re looking at Intentional Insider Threats which are deliberate and often planned actions often carried out for personal gain or to right a perceived injustice.

0 Comments
Continue reading

Insider Threats: Unintentional

An insider threat is when an individual with authorized access for an organization, misuses their access in a way that harms the organization. As the name implies, these threats come from within.

In this micro training we’ll look at Unintentional Insider Threats, which are actions that may harm an organization that are NOT planned or carried out with malicious intent. The individual at fault is often referred to as a pawn.

0 Comments
Continue reading

6 Simple Tips To Protect From Insider Threats

An insider threat is when an individual with authorized access for an organization, misuses their access in a way that harms the organization. As the name implies, these threats come from within.

In this micro training, we review six simple tips for staff, management and IT to safeguard their organization from potential insider threats.

0 Comments
Continue reading

Romance Phishing Scams

Romance Scams are yet another area in which cybercriminals are leveraging our strongest emotions to cultivate an “error-prone mindset” leaving broken hearts and broken passwords in their wake.

In this Micro Training, we’ll look at some of the most common and recent iterations of the romance scam and how to cultivate the awareness it takes to beat them.

0 Comments
Continue reading

What is The Dark Web?

When you think of the Dark Web, you might picture a big spiderweb filled with illegal substances, counterfeit bills, and stolen credit cards. But did you know not everything on the Dark Web is nefarious?

So then what exactly is the Dark Web, and why is it associated with your personal information? Find out in this Micro Training.

0 Comments
Continue reading

Cybersecurity and Burnout

When the afternoon slump hits, cybercriminals get to work pushing out their Spear Phishing campaigns. Why? Because people are more likely to make mistakes and click the link when they are burnt out.

In this Micro Training, learn the different signs and types of burnouts, and how they can affect your cybersecurity awareness.

0 Comments
Continue reading

Spotting a Phishing Landing Page

Phishing landing pages are commonly found after a user clicks a link in a malicious message or by being redirected during a web browsing session.

But how can you spot these sneaky sites? Learn the difference between a phishing landing page and the real deal in this Micro Training.

0 Comments
Continue reading

Five Physical Security Tips

While the focus of cybersecurity is often on technological safeguards, there are also many physical security measures that play an important role in keeping data safe.

We take a look at five physical security tips to protect devices and sensitive information.

0 Comments
Continue reading

Top 3 Phishing Saves

Phishing messages come in many forms, with many different ways to catch and respond to them.

To wrap up Cybersecurity Awareness Month, we’ll look at the importance of recognizing and reporting an incident by analyzing three different phishing attempts.

0 Comments
Continue reading

Public WiFi Scams

Sooner or later we all find ourselves in a public place with a device in our hands and a Public WiFi network as our best means of connecting to the internet. However, Public WiFi can pose as a serious threat to our security and privacy.

This Micro Training focuses on simple steps we can all take to stay more secure and more aware when using Public WiFi connections.

0 Comments
Continue reading

The 6 Principles of Social Engineering

Social engineering is a tactic many scammers know well, and without our awareness of their tricks, it could leave the door open to a scam.

In this Micro Training, we unpack the 6 Principles of Social Engineering and look at examples of how a scammer may utilize each tactic.

0 Comments
Continue reading

The 3 R’s of Password Protection

The 3 R’s (aka: Reduce, Reuse, and Recycle) is not just a way to keep our planet cleaner but also a way to evaluate password strength.

In this Micro Training, we break down the three ways to ensure your password stays “in the green.”

0 Comments
Continue reading

Deepfake Scams

Deepfakes have been making their rounds on social media sites. Most are just harmless fun, but advancements in technology are opening avenues for scams.

In this Micro Training, learn more about how scammers use deepfake audio and video to enhance their scams.

0 Comments
Continue reading

Phishing Email Unboxing

Did you know that the average employee receives 1.2 phishing emails per day?

In this Micro Training, we’re unboxing two of the cleverest phishing emails that are currently circulating the internet so that you’ll be better prepared when one lands in your inbox.

0 Comments
Continue reading

Wrong Number Scams

Unsolicited text messages from unknown numbers have always been a go-to tactic for scammers. But when a message simply says, “Hi,” or “Sorry, wrong number,” curiosity may take over.

In this Micro Training, learn how scammers are carrying out wrong number scams and what to do if you receive one of these mysterious text messages.

0 Comments
Continue reading

IoT and Smart Devices

Smart devices are quickly becoming an integral part of society. But as the world continues to get more connected, the number of connected devices susceptible to cybercriminals grows, as well.

In this Micro Training, find out how to keep your data safe despite the increasing number of smart devices connected to the Internet of Things.

0 Comments
Continue reading

Online Tracking

Many users are aware that they are being tracked online. While some of this tracking can be used to customize the user experience, it is important to know how to protect your tracked data from cybercriminals’ prying eyes.

In this Micro Training, follow along as we dive into how internet tracking works and the many ways to protect your data.

0 Comments
Continue reading

MFA Fatigue Attacks

Multi-Factor Authentication is a great way to restrict access to accounts if there were to be an exposure of your credentials, but cybercriminals are finding ways to get around these defenses.

In this Micro Training, learn the tricks cybercriminals are using to get past these security measures and the tips to make this process stronger.

0 Comments
Continue reading

Top 3 Cybersecurity Shields

It can often be challenging to keep up with all of the cybersecurity threats and corresponding preventative measures.

That is why, in this Micro Training, we’re providing you with three essential cybersecurity guidelines to help keep your shields up.

0 Comments
Continue reading

Event Scams

Learn to spot event scams so you don’t get played!

In this Micro Training, we will tackle the topic of event scams and explore how to spot advertisements and ticket opportunities that are too good to be true.

0 Comments
Continue reading