Don’t wait any longer. Get started today!


Directive Blogs

Directive has been serving the Oneonta area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Easiest Way to Commit to Strong, Secure Passwords

In order to protect your personal information, as well as your company information, you need to put a lot of effort and brainpower into your passwords. They are supposed to be long and complex, they are supposed to be random. You are supposed to use a different password on each account… 

If you are thinking to yourself, man that’s a lot of work, you aren’t wrong. We’re on your side.

There’s an easier way, and it’s something that businesses can implement for their entire staff that solves a lot of headaches and goes a long way toward keeping data safe.

Continue reading

Protecting Your Users From Self-Inflicted Cybersecurity Threats

You know the old idiom, “you are your own worst enemy?” 

That can be the case when it comes to cybersecurity, especially in a business environment. In fact, most cybersecurity threats these days happen because of user error, mistakes, or missteps.

Continue reading

ALERT: SFCU Members are Being Targeted by a Phishing Scam in Oneonta

Central NY residents who use Sidney Federal Credit Union have been seeing a rash of phishing scams that could put their information and their money at risk. Here’s what we know so far, and how to protect yourself from this targeted scam.

Continue reading

Won’t More IT Security Just Slow Me Down?

When I was a kid, there was a Tex Avery cartoon where Droopy Dog was chasing down a crook who escaped from jail. There was a particular scene where the crook (I think it was a wolf in a black-and-white striped jumpsuit) takes a bus, a plane, a ship, and a taxi to a secluded cabin, and then closes a series of increasingly complex doors with a large number of locks, in order to hide away from the pursuing cartoon basset hound. 

Of course, when he turns around, exhausted by all the effort he puts in, he realizes that Droopy is standing right behind him, and greets him with a monotone “hello.”

I haven’t seen this cartoon since I was 7 years old, but I almost always think about it when I am using multi-factor authentication. 

Continue reading

How to Get Back Into Your Multi-Factor Authentication Account

Multi-factor authentication is great when it works, but when it doesn’t, it can leave you in a pretty difficult situation. After all, what happens when all of a sudden, you cannot access your secondary authentication methods? We’re here to help you bypass this particularly challenging and frustrating scenario.

Continue reading

A Cool New Security Technology May Make the Password a Thing of the Past

Whether you love them or hate them, passwords serve an important purpose in the realm of cybersecurity. They are the first line of defense against potential threats, yet they are also notoriously easy to crack. Some of the biggest names in technology have been working on ways to get around the challenges presented by password security, including one that we are excited to highlight in today’s blog.

Continue reading

Multi-Layer Security That Works to Keep Your Accounts Secure

Unfortunately, the number of cyberattacks is consistently growing and many of those attacks target business end users. This means that any account that requires a password for access could conceivably be compromised should attackers gain access to its credentials. At Directive, we promote the use of multi-factor authentication (also known as two-factor authentication or 2FA) to mitigate some of the risk inherent with the use of password-based accounts in business. 

Continue reading

How Cybercriminals Are Breaking 2FA

It’s no surprise that many security breaches are due to weak passwords and poor team training. What may be a surprise is that when multi-factor authentication was implemented, cybersecurity breaches were blocked by more than 90%. However, bad actors are constantly evolving and have found a way to break through one of the most popular types of multi-factor authentication that uses text messaging. Here’s how.

Continue reading

How to Set Up Two-Factor Authentication for Your Google, Apple, and Microsoft Accounts

Two-factor authentication is commonplace in the office environment, but it’s not commonplace enough, if you ask us. Too many organizations pass on it, placing their security at risk for no good reason. While the methods might vary, the benefits of two-factor authentication are too good to ignore. We’ll walk you through how to set up two-factor authentication for three of the most common accounts in the business environment: Microsoft, Google, and Apple.

Continue reading

Disney+ Hacked Within Days of Launching. Here’s What SMBs Can Learn From This

Disney+, Disney’s new Netflix-like streaming service launched with a lot of fanfare on November 12th. The service promises to offer Disney’s massive library of shows and movies, including content from all of the franchises the company has been buying up over the last decade. Unfortunately, many thousands of subscribers have come to find their credentials stolen, and the House of Mouse isn’t exactly giving anyone a clear answer.

This leads to the question, how would your business handle a data breach?

Continue reading

Does Your IT Provider Practice Good Cyberhygiene?

I have a confession to make: it’s actually a pretty trying time to be in the IT business right now. A year ago, the Department of Homeland Security issued a statement for IT and Managed Service Providers (MSPs) about an increased risk of being targeted by cybercriminals.

Continue reading