DatCom Blog

DatCom has been serving the Tyler area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are the Apps on Your Device Safe?

Are the Apps on Your Device Safe?

It’s difficult to judge whether or not an app can expose your business to risk without first downloading it. Despite their best efforts, Google Play and the iTunes store can’t possibly identify every single malicious application out there. Unfortunately, you’re charged with taking the security of your mobile devices into your own hands, but thanks to Google Play Protect, this responsibility is a bit more mild.

0 Comments
Continue reading

Tip of the Week: Seven Extensions to Add to Chrome

Tip of the Week: Seven Extensions to Add to Chrome

Google Chrome is the most popular web browser in the world, and for good reason. The browser has many useful features, largely due to the user’s ability to install ‘extensions’--applications that add to the browser’s functionality or the user’s experience. Once an extension is added to the browser’s toolbar, it is ready for the user to use whenever they need.

0 Comments
Continue reading

Tip of the Week: Use Android Doze to Help Save Battery Power

Tip of the Week: Use Android Doze to Help Save Battery Power

How often have you grumbled as you’ve reached for a charger at 2 in the afternoon as your smartphone clings to its last moments of life? If you’re anything like the typical user, quite often, but Android has attempted to reduce that number with the Android Doze feature.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Hosted Solutions Network Security Google User Tips Microsoft Hackers Internet Tech Term Software Productivity Malware Workplace Tips Business Email Innovation Mobile Devices Backup Hardware Data Smartphones Data Backup Communications VoIP Android Cloud Computing Small Business Smartphone Data Recovery IT Services Business Continuity Efficiency Ransomware Managed IT Services Windows 10 Computer Router Cybersecurity Communication Disaster Recovery Network Server Artificial Intelligence Alert Outsourced IT Business Management Browser Law Enforcement Cybercrime Internet of Things Windows Chrome Windows 10 IT Support Miscellaneous Applications Mobile Device Office 365 Gadgets How To Money Collaboration Computers Password BDR Quick Tips Productivity Spam Facebook Passwords Telephone Systems Virtualization Holiday Information Operating System Word Saving Money Social Media Managed IT Services Wi-Fi Data Protection Vulnerability Health Work/Life Balance Social Engineering Office Microsoft Office Private Cloud Settings Save Money Mobile Device Management BYOD Keyboard Flexibility Apps Paperless Office Encryption Phishing Connectivity Government App Voice over Internet Protocol Mobility Managed Service Data Security Two-factor Authentication Avoiding Downtime Telephone System Telephony Legal Automation Unsupported Software CES Windows 7 Data Breach Software as a Service HaaS Sports Data Storage Entertainment Content Management Bandwidth Augmented Reality Meetings Google Docs OneNote End of Support Net Neutrality Employer-Employee Relationship IT Management Comparison Blockchain Cryptocurrency Redundancy Identity Theft Scam Networking Office Tips Remote Computing Website Servers Public Cloud Infrastructure Remote Monitoring Managed IT Google Drive Human Resources Spam Blocking Upgrade Machine Learning VPN IT Plan Business Intelligence Virtual Assistant Fraud Access Control Bring Your Own Device Botnet Data Management Update Google Search FENG Document Management Cortana Hiring/Firing Wire Mouse Conferencing How to Millennials Computing Infrastructure Amazon Authentication Thought Leadership Mobile Computing IT Consultant Cast Audiobook Multi-Factor Security Music Computer Care Password Management Security Cameras File Sharing Video Games WiFi Gmail Company Culture Advertising Outlook Telecommuting Proactive IT Skype Best Practice Save Time Travel Google Apps Risk Management Administrator Internet Exlporer Emails Software Tips Recovery Workforce Digital Signature Firewall History Amazon Web Services Nanotechnology Camera Apple Leadership Instant Messaging Trending Wearable Technology NIST Hacker Solid State Drive Flash Remote Work Practices Patch Management Recycling Training Managing Stress Shortcuts Frequently Asked Questions IT Support ISP Start Menu Workers Politics Smart Office Microchip PDF Virtual Reality Online Shopping Smart Tech Current Events Addiction iPhone Techology USB Samsung Marketing Smartwatch Audit Hosted Computing Remote Worker eWaste Social Excel Cryptomining Tools Hacking Search Engine Internet exploMicrosoft Physical Security FCC Big Data Computer Fan Sync Worker Commute Evernote Electronic Medical Records Cache Warranty Specifications Value Safe Mode Employee Wireless Credit Cards Inventory IBM Wiring Knowledge Data loss Scalability Criminal Experience Charger HVAC Users Vendor Hybrid Cloud Tip of the week Battery Database Downtime Automobile Password Manager HIPAA Bing Netflix Black Market Title II The Internet of Things Wireless Charging Wireless Internet Printer webinar Search Staff Digital Signage Supercomputer Devices Unified Threat Management Network Congestion Screen Mirroring Content Cleaning Enterprise Content Management Display Information Technology Windows 10s Windows Server 2008 Education MSP Business Technology Root Cause Analysis Business Mangement Budget YouTube Help Desk HBO Online Accountants Hosted Solution SaaS Smart Technology Emergency Rootkit Compliance Biometric Security Employer Employee Relationship Two Factor Authentication Twitter Regulation Computer Accessories Webinar Shadow IT Content Filtering Assessment Printers Safety Vendor Management CrashOverride Wireless Technology Bluetooth IT solutions Television Managed Service Provider Troubleshooting Transportation Books Public Computer Business Owner Loyalty Benefits Worker