fbpx

Don’t wait any longer. Get started today!

 
 

Directive Blogs

Directive has been serving the Oneonta area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Your End Users From Contributing to Security Issues

Insider threats contribute to a significant number of data breaches. These cases of data exposure are enabled by a member of your staff, whether they intended to harm your business or simply made an honest mistake. With so much focus directed toward the threats out in the world, sometimes we forget that the biggest dangers can be among our ranks. To make up for this, we’ll discuss a few ways to keep insider threats from doing your business too much harm.

  0 Comments
0 Comments
Continue reading

One Of Your Biggest Security Risks: Your Employees

You might be surprised by how many of your organization’s security issues originate from within. A major contributor is user error, which can lead to some pretty severe problems reaching from your data security, to your workflow, all the way to the continuation of your business itself.

  0 Comments
0 Comments
Continue reading

Your Employees Can Be One Of Your Biggest Security Risks

A surprising number of security issues come from inside your organization. User error on the part of the employee can present major problems for your workflow, data security, and the integrity of your business. User error could be something as simple as an employee clicking on the wrong links when they receive a suspicious email in their inbox, or if they are accessing data that they simply have no business accessing in the first place. Sometimes businesses will even completely forget to remove employee credentials when they leave a project or the company creating a breachable hole in your network. Regardless of the reason, user error can be a detrimental occurrence, and one which must be prepared for.

  0 Comments
0 Comments
Continue reading

Tip of the Week: Even the Most Careful People Fall For These 4 Email Mistakes

b2ap3_thumbnail_email_gaffes_400.jpgDespite the rapid advancements of business technology in the past decade, enterprises the world over are still heavily dependent upon email. Therefore, every modern worker needs to be trained on how to send a professional email. If not, classic email mistakes will be made that could bruise your company’s reputation, like these four common email blunders.

  0 Comments
0 Comments
Continue reading

The Most Dangerous Threats to Your Business Could Be Internal

b2ap3_thumbnail_insider_mistakes_400.jpgMost of the time, when it comes to cybersecurity, businesses tend to focus primarily on external threats rather than those that might be lurking in the shadows of their internal operations. Believe it or not, the most dangerous entities out there could very well be working for you, right under your nose.

  0 Comments
0 Comments
Continue reading

The 5 Most Common Causes of Data Loss

b2ap3_thumbnail_PCleak400.jpgThe majority of businesses that experience data loss will not recover. You may think that, if you are careful, then you will not need a backup solution, but statistics say otherwise. A 2009 study by Blackblaze.com revealed that 46% of users experience data loss every year! This figure makes sense when you consider the five most common factors of data loss.

  0 Comments
0 Comments
Continue reading

Twitter Twits: 10 Epic Fails

Twitter bird shoutingWhile it may seem difficult to imagine embarrassing oneself in the space of a 140 character message, Twitter has been responsible for the downfall of companies, politicians and entire institutions. No one can deny that Twitter has been a boon for communication, politics and economics, but some people seem determined to prove that one cannot have Twitter without the word "twit." Here are a number of prominent examples from the recent past which demonstrate how Twitter's logo can swiftly become the bluebird of unhappiness for some.

  0 Comments
0 Comments
Continue reading

Are your Employees your Biggest Data Loss Risk?

laptop delete key

Take a look, a good hard look, at your employees. They are working diligently, right? You've staffed the company with some quality A-players and everyone has taken responsibility for their work. You see good communication, organization, and dare we say motivation emanating from each member of your well-armed team. Or maybe you don't and the company is working on improving that - we understand. We also understand that while an employee might be a rockstar at their job, they could still pose a risk to IT.

  0 Comments
0 Comments
Continue reading