DatCom Blog

DatCom has been serving the Tyler area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Computer Forensics, Defined

Tech Term: Computer Forensics, Defined

Pop culture gives us an impression of what cyber investigations look like. Official-looking people, in impeccable suits, typing away at terminals and analyzing the data scrolling past them on their heads-up displays. In reality, computer forensics (as they are actually called) are a little less dramatic, and much more serious. For today’s tech term, we’ll dig into the field of computer forensics.

0 Comments
Continue reading

Perpetrators of Three Major Cyber Crimes Have Pled Guilty

Perpetrators of Three Major Cyber Crimes Have Pled Guilty

Every so often, it’s nice to hear about when the good guys win and cybercriminals get their comeuppance. Three such cybercriminals have entered guilty pleas to charges related to major cybersecurity events.

0 Comments
Continue reading

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Do you know what a botnet is and how it works? It’s basically a network of infected computers that can be used to perform Distributed Denial of Service attacks, overloading target networks and forcing them to endure downtime. They can also be used to distribute malware and other threats. What’s worse than this, you ask? Hackers can purchase botnets on the black market to use against their targets, but a new type of botnet strain is changing the way this works.

0 Comments
Continue reading

Essential Cybersecurity Tips From The FBI

Essential Cybersecurity Tips From The FBI

In 2016 former President of the United States Barack Obama passed the Cybersecurity National Action Plan that implemented near-term action and developed a longer-term strategy of bringing awareness and protections to public computing systems connected to the Internet. The strategy is to make an immediate effort to empower citizens to protect their own privacy, while also maintaining public safety and national and economic security, as many of the most critical systems this nation utilizes are networked on the web.

0 Comments
Continue reading

Step Aside Sherlock, Supercomputer Watson is Investigating Cybercrime

Step Aside Sherlock, Supercomputer Watson is Investigating Cybercrime

When it comes to solving crime few are as well renowned as Sherlock Holmes. However, now Watson is stepping forward to strike back against cyber criminals--but not Dr. Watson, Holmes’ faithful companion. Instead, we’re referring to Watson, IBM’s renowned supercomputer.

0 Comments
Continue reading

For NATO, Cyberspace is Today’s Frontlines

For NATO, Cyberspace is Today’s Frontlines

It’s clear that security professionals have waged war with hackers since the Internet’s inception, but NATO has reaffirmed that cybersecurity is not just a localized problem; it’s a nation-state-wide issue, and one that needs to be addressed. Just like land, air, and sea, cyberspace is now an operational domain, a place that can be considered a battlefield.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Network Security Microsoft User Tips Hackers Google Hosted Solutions Tech Term Software Malware Backup Internet Business Innovation Mobile Devices Data Backup Hardware Data Email Smartphones Data Recovery Small Business Smartphone Communications Business Continuity Android VoIP Workplace Tips Ransomware Communication Computer IT Services Router Managed IT Services Cloud Computing Disaster Recovery Productivity Network Cybersecurity Artificial Intelligence Browser Alert Chrome Windows 10 Outsourced IT Cybercrime Internet of Things Law Enforcement Windows 10 Applications Server IT Support Office 365 Business Management Efficiency Money Collaboration Windows Computers Password How To Miscellaneous Facebook Word Virtualization Passwords Mobile Device Information Holiday Gadgets Spam BDR Saving Money Wi-Fi Managed IT Services Social Media Telephone Systems Productivity Data Security Keyboard Microsoft Office BYOD Office Save Money Flexibility Apps Vulnerability Connectivity Operating System Managed Service Mobility Voice over Internet Protocol Government App Settings Mobile Device Management Two-factor Authentication Avoiding Downtime Social Engineering Data Protection Phishing Quick Tips Work/Life Balance Health Spam Blocking Scam Networking Content Management Entertainment IT Plan Remote Monitoring Google Docs Servers Private Cloud Paperless Office End of Support Comparison Blockchain Botnet Identity Theft Unsupported Software Website Remote Computing Telephony Managed IT Encryption Office Tips Infrastructure Windows 7 Public Cloud Machine Learning Human Resources Bring Your Own Device Virtual Assistant VPN Data Storage Upgrade Business Intelligence Data Breach Fraud Access Control Telephone System OneNote Employer-Employee Relationship IT Management Update Data Management Redundancy Software as a Service Legal Sports Bandwidth Automation CES HaaS Google Drive Workforce Recovery Knowledge Digital Signature Data loss Managing Stress Shortcuts Current Events Travel Best Practice Google Apps Tip of the week Augmented Reality Advertising USB Samsung Smart Office Microchip History Amazon Web Services Netflix Nanotechnology Internet Exlporer Trending Instant Messaging Downtime Big Data IT Support Remote Work webinar Practices Cryptocurrency Apple Smartwatch Recycling The Internet of Things Addiction Net Neutrality Network Congestion PDF Screen Mirroring Social Electronic Medical Records Workers Windows 10s Windows Server 2008 Remote Worker Value Search Engine IBM Online Shopping Virtual Reality Smart Tech HBO Experience Charger Root Cause Analysis Warranty Conferencing Hosted Computing Safe Mode iPhone Techology HIPAA eWaste FENG Cache Marketing FCC IT Consultant Cast HVAC Vendor Hacking Wiring Bing Supercomputer Evernote Worker Commute Outlook Internet exploMicrosoft Cleaning Specifications Wireless Internet Printer Wireless Credit Cards Battery Emails Inventory Software Tips Budget Scalability Criminal Skype Title II Black Market Leadership Enterprise Content Management Display Hiring/Firing Password Manager Automobile Solid State Drive Flash Devices Users Unified Threat Management Hybrid Cloud YouTube Help Desk Wireless Charging Frequently Asked Questions MSP Music Computer Care Search Staff Meetings Wire Mouse Education Content Start Menu Online Accountants Password Management Security Cameras Risk Management Business Mangement Audit Thought Leadership Mobile Computing Information Technology Firewall Company Culture Cortana Document Management Excel File Sharing Wearable Technology Millennials How to Administrator Patch Management Amazon Computing Infrastructure Authentication Physical Security Training Multi-Factor Security Audiobook Tools Telecommuting NIST Hacker Politics WiFi Video Games Gmail Computer Fan Sync Camera Save Time Regulation Vendor Management Television Bluetooth Printers Shadow IT Troubleshooting Transportation Books Public Computer Safety Wireless Technology Loyalty Benefits Managed Service Provider Worker Hosted Solution SaaS Smart Technology Business Owner Emergency Webinar Rootkit Employer Employee Relationship Two Factor Authentication IT solutions Compliance CrashOverride Content Filtering Assessment Computer Accessories Twitter