DatCom Blog

DatCom has been serving the Tyler area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are the Apps on Your Device Safe?

Are the Apps on Your Device Safe?

It’s difficult to judge whether or not an app can expose your business to risk without first downloading it. Despite their best efforts, Google Play and the iTunes store can’t possibly identify every single malicious application out there. Unfortunately, you’re charged with taking the security of your mobile devices into your own hands, but thanks to Google Play Protect, this responsibility is a bit more mild.

0 Comments
Continue reading

Tip of the Week: Seven Extensions to Add to Chrome

Tip of the Week: Seven Extensions to Add to Chrome

Google Chrome is the most popular web browser in the world, and for good reason. The browser has many useful features, largely due to the user’s ability to install ‘extensions’--applications that add to the browser’s functionality or the user’s experience. Once an extension is added to the browser’s toolbar, it is ready for the user to use whenever they need.

0 Comments
Continue reading

Tip of the Week: Use Android Doze to Help Save Battery Power

Tip of the Week: Use Android Doze to Help Save Battery Power

How often have you grumbled as you’ve reached for a charger at 2 in the afternoon as your smartphone clings to its last moments of life? If you’re anything like the typical user, quite often, but Android has attempted to reduce that number with the Android Doze feature.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Network Security Business Computing Hackers User Tips Google Microsoft Hosted Solutions Tech Term Malware Backup Internet Business Software Mobile Devices Hardware Innovation Data Backup Data Email Smartphones Business Continuity Data Recovery VoIP Android Small Business Smartphone Workplace Tips Communications Communication IT Services Computer Disaster Recovery Managed IT Services Cloud Computing Ransomware Router Browser Chrome Law Enforcement Windows 10 Alert Outsourced IT Artificial Intelligence Windows 10 Cybercrime Network Productivity Internet of Things Cybersecurity Business Management Efficiency IT Support Office 365 Computers Password Money Collaboration Windows Server How To Miscellaneous Applications Mobile Device Holiday Saving Money Social Media BDR Spam Productivity Information Facebook Telephone Systems Managed IT Services Wi-Fi Passwords Gadgets Word Virtualization Government App BYOD Save Money Flexibility Apps Vulnerability Mobility Quick Tips Social Engineering Connectivity Settings Voice over Internet Protocol Mobile Device Management Avoiding Downtime Managed Service Office Two-factor Authentication Keyboard Work/Life Balance Data Protection Phishing Operating System Data Security Microsoft Office Sports IT Plan Content Management Remote Computing Google Docs Bring Your Own Device Botnet Telephony Managed IT Unsupported Software Windows 7 Comparison Blockchain Website Data Breach Automation Servers Identity Theft Infrastructure Paperless Office Encryption Health Human Resources Data Storage Bandwidth Data Management Upgrade Machine Learning OneNote VPN Redundancy Business Intelligence Private Cloud Virtual Assistant Employer-Employee Relationship IT Management Legal Scam Networking End of Support Fraud Access Control Update HaaS Remote Monitoring Office Tips Public Cloud Telephone System Google Drive Spam Blocking Entertainment CES Software as a Service Travel Google Apps Administrator The Internet of Things Workforce Digital Signature Users Hybrid Cloud webinar Cleaning Camera Windows 10s Windows Server 2008 Trending Supercomputer NIST Hacker Network Congestion Screen Mirroring Virtual Reality Amazon Web Services Nanotechnology Augmented Reality HBO Recycling Managing Stress Shortcuts Root Cause Analysis Remote Work Practices Budget Hacking Workers Smart Office Microchip FENG Net Neutrality PDF Hiring/Firing Information Technology Conferencing Online Shopping Smart Tech Music Computer Care Addiction Cryptocurrency Smartwatch IT Consultant Cast Worker Commute Remote Worker Outlook Scalability eWaste Social Battery Hosted Computing Software Tips Automobile Firewall Search Engine Skype Black Market FCC Risk Management Emails Evernote Wearable Technology Cache Warranty Solid State Drive Flash Search Specifications Advertising Safe Mode Leadership Wiring Frequently Asked Questions Content Criminal Patch Management Internet Exlporer HVAC Vendor Meetings Education Credit Cards Inventory Training Password Manager Apple Bing Start Menu Title II Politics Wireless Charging USB Samsung Wireless Internet Printer Audit How to Staff Current Events Document Management Devices Unified Threat Management Excel Audiobook Enterprise Content Management Display Computing Infrastructure Physical Security Video Games Business Mangement Big Data iPhone Techology YouTube Help Desk Tools Online Accountants Marketing MSP Cortana Value Wire Mouse Computer Fan Sync Recovery Millennials Electronic Medical Records Best Practice Experience Charger Thought Leadership Mobile Computing Tip of the week Instant Messaging Multi-Factor Security IBM Internet exploMicrosoft Password Management Security Cameras Knowledge Data loss History Amazon Authentication Netflix WiFi Gmail Company Culture Downtime IT Support Telecommuting HIPAA Wireless File Sharing Loyalty Shadow IT Compliance Twitter Benefits Worker Hosted Solution SaaS Regulation Wireless Technology Printers Smart Technology Emergency Rootkit Employer Employee Relationship Two Factor Authentication Business Owner Webinar Content Filtering Assessment Computer Accessories Vendor Management IT solutions Television CrashOverride Bluetooth Troubleshooting Safety Save Time Transportation Books Public Computer Managed Service Provider