Network Support Programs


Does your business need help with IT? Consider RemoteNet:

  • Knowledgeable, friendly helpdesk
  • Super fast response times
  • The best engineers
  • Affordable rates for small businesses
  • Proactive monitoring and maintenance

Learn More »

Cloud Computing


Ready to move your business to the cloud? Tired of dealing with crashing servers, constant maintenance, power outages, backups, viruses, etc? Direct iT is your one stop cloud provider:

  • Hosted mail solutions including Office 365™ and Google Apps™
  • Virtualize your servers and desktops into the cloud
  • Cloud-based backup
  • Cloud-based disaster recovery     Learn More »
Social Media Websites


Ready to jumpstart your marketing into the social media age?  Our blog-based websites will let you connect with current and potential customers like never before!

  • Blog-based site lets you easily post relevant news and articles
  • Connect with Facebook, Twitter, and LinkedIn
  • Professional-looking templates get you up and running very quickly

Learn More »

My Efact: Paperless Office


Ready to go paperless?  My Efact: Paperless Office is our cloud-based paperless office document management and scanning system.  Features include:

  • Scan and access documents from anywhere
  • Secure encrypted email for regulatory compliance
  • Unlimited users and scanners
  • Full DVD backup of your files mailed to you every 3 months
  • Free telephone support and training      Learn More »
Hosted Email: Office 365


Direct iT is an authorized reseller of Office 365™, Microsoft's new cloud-based email hosting system. Office 365™ brings you the features of Microsoft Exchange without the headaches of hosting your own.  Features include:

  • Share calendars with your co-workers
  • Outlook Web Access lets you access mail from anywhere
  • Outlook 2007™ and Outlook 2010™ support
  • 25GB mailbox - plenty of storage Watch a short video »

Direct IT Blog

  • Direct iT Meets White House Cybersecurity Coordinator

    DIT CEO David Javaheri with Rob Joyce

    Special Assistant to the President and White House Cybersecurity Coordinator Rob Joyce visited the Foley Hoag offices in Boston on 5/22/17. Joyce was in Massachusetts to speak about the President’s May 11 Executive Order on Cybersecurity and how IT and security companies can collaborate.

    Federal Government Focusing on Cybersecurity

    The meeting focused on a number of new initiatives including:
    1. CyberMA: Part of CyberUSA, CyberMA is a new threat sharing platform that allows security companies to securely share information about new threats with each other in order to collaborate (like the cyber-criminals do)
    2. Education: There was also a lot of focus on introducing cybersecurity as a career choice at all educational levels.
    3. Executive Order: Joyce explained the three primary points of the May 11 executive order — (1) securing the federal government, (2) securing corporate systems that are vital to our infrastructure, and (3) securing the global internet.   He also hinted that the President’s new office of innovation could potentially offer more resources for security in the future.
  • The Game Has Changed in CyberSecurity: The growing importance of managed workstation updates
    The Game Has Changed in CyberSecurity:
    The growing importance of managed workstation updates
    A global cyberattack last weekend used a Microsoft security hole to infect businesses and government agencies worldwide. Microsoft Windows Update is
    important but not enough….
    Workstation Updates – Now Available and Fully Managed from DIT
     Our fully managed program not only will update Microsoft, but over 50 other third party applications such as Adobe Reader, Adobe Flash, Java, Skype, Win Zip, web browsers update and more. This service is now available at a highly discounted rate of 15 minutes per desktop per month.
     For more details or to enroll in this program,
      Contact Direct iT


  • Massive Stolen Password Lists From LinkedIn and MySpace Put Over 500 Million Passwords in Hackers’ Clutches

    Massive Password Lists Stolen and Shared

    In the past few weeks, there has been a massive uptick in cyber attacks involving the use of stolen passwords to gain access to corporate email and other IT systems.  This increase can be traced to two recent events from May.  First, a hacker sold a list of 167 million LinkedIn account credentials (many including email addresses, usernames, and passwords) on the dark web.  Then, a few weeks later, the same hacker sold a bigger list containing 427 million MySpace usernames and passwords.  Very soon, both of these lists had been re-sold, copied, and shared around with hacker groups around the world.

    Why These Password Thefts Matter   vicepwds

    Now, most of us aren’t particularly worried about hackers getting into our LinkedIn or Myspace accounts as nothing critically important is kept there. However, the real impact of these breaches is due to the fact that millions of people re-use the same usernames and passwords for everything, and therefore this same list of usernames and passwords can be used to login to many corporate e-mail, IT, online banking, and other vital accounts.

    What You Can Do About It

    1. Make sure you never re-use old passwords

    2. Periodically review and change all important passwords on your network

    3. Use strong passwords

    4. If you ever used a password on LinkedIn or Myspace or any other breached site, make extra sure that you have not reused that password for anything else.



  • Microsoft Sues Justice Department Over Spying

    lawsuitbuttonOn April 14th, Microsoft filed a lawsuit against the Justice Department in the Federal District Court in Seattle.  The lawsuit alleges that federal law enforcement agencies have used an unconstitutional interpretation of the Electronic Communications Privacy Act of 1986 in order to access to thousands of Microsoft customers’ data that is stored in the cloud (primarily email such as Office 365 and Hotmail).  Microsoft claims that because this spying is so widespread, and because many of the orders also demand that the spying be kept secret, and have no end date (either for the spying or the secrecy), this violates the Fourth Amendment right to protection from unlawful search and seizures. Microsoft also claims that their First Amendment right to inform customers they are being spied on is also being violated.

    “From September 2014 to March 2016, Microsoft received 5,624 federal demands in the United States for customer information or data. Nearly half — 2,576 — were accompanied by secrecy orders.”

    Often, gag orders prevent companies from reporting government spying on their customers.  However, some companies use what is referred to as a “warrant canary” — which is a statement somewhere on their website/service that they have never been subject to any warrants/spying.  The idea is that when the government begins spying, the company can remove the canary notice from their site, so that users can realize the notice is gone and become aware that spying may have occurred, without the company specifically notifying the users in violation of the gag order. You can read more about warrant canaries at  

    You can also read the coverage in the New York Times at


  • Hackers Impersonating CEOs In Wire Fraud Attempts


    Local businesses are being targeted by a new category of phishing attacks, called BEC (Business Email Compromise) or CEO scams.  According to the FBI, the total losses from BEC scams is over 1.2 billion dollars.  BEC scammers impersonate CEOs by sending emails to business associates (such as attorneys, accountants, partners, assistants, etc) asking them to authorize a wire transfer. There are a few things that are different about these BEC scams compared to e-mail fraud we are used to:

    • The request for a wire transfer is usually very specific and well-written — customized for the particular target
    • Details about the targeted business and its employees from LinkedIn, Facebook, and other public websites are integrated into the email to make it seem more legitimate
    • Sometimes fake domain names are registered that are very very similar to real domain names as part of the scam, so that the attacker can send and receive email pretending to be someone else.  For instance, if your real business domain name was, the hackers might actually register so they could send and receive messages that look extremely similar to your real email address
    • Sometimes the hackers also might try to find publicly-posted emails from you or trick someone at your firm into sending an email so they can see what your standard signature / style of email is, so that the fake email they craft can have your real salutations and signatures.
    • In some cases they may use stolen passwords to actually gain access to an email account if possible


    According to the FBI’s Internet Crime Complaint Center statistics, the average loss from successful BEC scams is around $100,000.  There are a few things you can do to protect your business:


    • Training, training, training.  The #1 most important step for security is to make sure your employees understand the risks and take them seriously.
    • Make sure your accountants and associates know to not authorize any wire transactions based only on e-mail
    • Use strong passwords and never re-use your corporate password for other sites
    • Remember never to click on unfamiliar or suspicious links or attachments in email


Direct IT

Sign up for a Free Network Audit

For no charge, Direct iT will have one of our engineers audit your servers and network infrastructure.

Name (required)

Email (required)



As a Direct iT client for more than eight years, we are always happy with their response time and how they handle our problems. Direct iT employees understand time is money and help us manage both in a way that fixes our problems in an efficient manner. We rely on and trust their judgment — Tony Benevento President Benevento Insurance Agency, Inc.

About Direct iT

Direct iT, Inc. is a New England based IT services firm offering products and services for small businesses in Greater Boston, New Hampshire, Rhode Island, and the rest of New England. Cloud, compliance, and document management services are also available worldwide. Many of our customers are along the Route 128 technology corridor.

Direct iT, Inc. Main Offices

39 Emerson Rd. Suite 215
Waltham, MA 02451
Sales: 781-890-4400
Support 781-890-1907