fbpx

Don’t wait any longer. Get started today!

 
 

Directive Blogs

Directive has been serving the Oneonta area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cyberattacks and data breaches are a threat to businesses everywhere. The most important places to start for preventing a breach is with your employees and their knowledge and use of cybersecurity best practices.

The cybersecurity tips below cover awareness, basic safety, online safety, social media, data security, tips for remote workers,...

Cyberattacks and data breaches are a threat to businesses everywhere. The most important places to start for preventing a breach is with your employees and their knowledge and use of cybersecurity best practices.

The cybersecurity tips below cover awareness, basic safety, online safety, social media, data security, tips for remote workers, small businesses, and considerations for business owners and managers to keep in mind.

More

Social Media Cyber Safety Part 2

Last week, we uncovered common scams found on social media.

In this Micro Training, we share helpful tips on how to use social media more safely.

Continue reading

Social Media Cyber Safety Part 1

Social media can be fun – but you should still use it with the same caution you use with any other online activity.

In this Micro Training, learn how to recognize common social media scams, such as phishing, account hijacking, and malware.

Continue reading

Cyber-Safe Travel Tips

Traveling can broaden your horizons and offer the chance to explore, but in today’s hyper-connected world, it can also make you more vulnerable to cybersecurity risks.

In this Micro Training, learn practical strategies to protect yourself from cyber threats while traveling.

Continue reading

Top 3 Smishing Saves

Smishing is on the rise, and to better understand how it works, we are taking a look at the top smishing saves made by super cyber-aware users.

In this Micro Training, we will look at three scenarios of smishing and examine how each user was able to spot it.

Continue reading

AI Vishing

Artificial Intelligence and deepfake audio are increasingly being used by cybercriminals in their scams.

In this Micro Training, we will look at a specific AI vishing scam that targets a user’s relatives.

Continue reading

Stalkerware

Do you feel like someone knows what you are doing online? If someone knows information about you that they shouldn’t, or mysterious apps are popping up on your device, it could be a case of stalkerware.

In this Micro Training, we will define stalkerware and explain how to identify and avoid it.

Continue reading

Securing Your Workspace

What do a clean desk and a strong password have in common? They both increase security!

In this Micro Training, we will explore the possible cybersecurity repercussions that come with keeping a messy workspace.

Continue reading