DatCom Blog

DatCom has been serving the Tyler area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Using a QR Code to Log In

Using a QR Code to Log In

Passwords are still an incredibly valuable part of security, but it’s becoming quite difficult to maximize network security through passwords alone. Even if you somehow manage to sell the idea of network security to your staff, whether or not they follow through is another thing entirely. It’s critical that you make it as easy as possible for your employees to stay secure, and that’s where scannable QR codes come in.

0 Comments
Continue reading

Why Your IT Toolkit Should Include a VPN

Why Your IT Toolkit Should Include a VPN

Have you ever felt like someone was watching you while you’re doing your work from somewhere outside of your business’ infrastructure? If you’re working from a remote location, this situation might not be far from the truth. If you’re not using a private connection, onlookers could see everything that you’re doing or steal data. How can you keep your business secure while working out of the office?

0 Comments
Continue reading

The IoT Can Be Very Useful, but Also Risky

The IoT Can Be Very Useful, but Also Risky

You might be surprised to hear how the scope of the Internet of Things has increased over the past few years. These connected devices are all over the place. In order to ensure that your business isn’t affected in a negative way by these IoT devices, you’ll need to consider the many risks and how you will respond to them.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Network Security Microsoft User Tips Hackers Google Tech Term Hosted Solutions Internet Business Software Malware Backup Data Data Backup Innovation Mobile Devices Hardware Email Smartphones Workplace Tips Small Business Smartphone Communications Data Recovery Business Continuity VoIP Android Ransomware IT Services Router Computer Communication Managed IT Services Cloud Computing Disaster Recovery Productivity Internet of Things Network Cybersecurity Browser Alert Chrome Outsourced IT Cybercrime Law Enforcement Artificial Intelligence Windows 10 Windows 10 Miscellaneous How To Applications Server Business Management Office 365 Efficiency Money Collaboration IT Support Computers Windows Password Productivity Facebook Passwords Virtualization Mobile Device Word Holiday Gadgets BDR Spam Saving Money Social Media Information Wi-Fi Managed IT Services Telephone Systems Mobile Device Management Quick Tips Managed Service Work/Life Balance Two-factor Authentication Keyboard Data Protection Phishing Office Microsoft Office BYOD Save Money Data Security Flexibility Apps Operating System Mobility Government App Vulnerability Social Engineering Avoiding Downtime Voice over Internet Protocol Settings Connectivity Machine Learning VPN Upgrade OneNote Business Intelligence Employer-Employee Relationship IT Management HaaS Health Virtual Assistant Redundancy Fraud Access Control Scam Networking Entertainment Remote Monitoring Update Google Drive Telephone System Private Cloud CES Spam Blocking End of Support Software as a Service IT Plan Office Tips Remote Computing Public Cloud Sports Content Management Managed IT Botnet Bring Your Own Device Google Docs Unsupported Software Telephony Comparison Blockchain Windows 7 Servers Identity Theft Data Breach Website Paperless Office Encryption Infrastructure Human Resources Data Storage Data Management Legal Automation Bandwidth Start Menu Audiobook Bing Politics Title II Computing Infrastructure Password Manager Current Events Staff USB Samsung Wireless Charging Audit Video Games Advertising Wireless Internet Printer Recovery Enterprise Content Management Display Excel Best Practice Internet Exlporer Devices Unified Threat Management Tools Instant Messaging YouTube Help Desk Online Accountants Physical Security History Apple MSP Big Data Business Mangement Electronic Medical Records Millennials IT Support Value Cortana Computer Fan Sync Wire Mouse IBM Multi-Factor Security Knowledge Data loss Password Management Security Cameras Experience Charger Amazon Authentication Tip of the week Thought Leadership Mobile Computing Downtime Marketing Company Culture HIPAA Telecommuting Netflix iPhone Virtual Reality Techology File Sharing WiFi Gmail Administrator Workforce Digital Signature webinar Travel Google Apps The Internet of Things Supercomputer Trending Network Congestion Screen Mirroring NIST Hacker Cleaning Amazon Web Services Nanotechnology Windows 10s Windows Server 2008 Internet exploMicrosoft Hacking Camera Root Cause Analysis Wireless Managing Stress Shortcuts Budget Remote Work Practices HBO Worker Commute Augmented Reality Recycling Scalability Hybrid Cloud Smart Office Microchip Hiring/Firing Net Neutrality PDF Conferencing Battery Workers FENG Users IT Consultant Cast Black Market Cryptocurrency Smartwatch Music Computer Care Online Shopping Smart Tech Addiction Automobile eWaste Search Social Hosted Computing Outlook Remote Worker Information Technology Content Search Engine Risk Management FCC Emails Software Tips Education Firewall Skype Specifications Leadership Safe Mode Wearable Technology Evernote Solid State Drive Flash Cache Warranty Criminal Meetings How to HVAC Vendor Training Credit Cards Inventory Frequently Asked Questions Document Management Wiring Patch Management Computer Accessories Webinar Content Filtering Assessment Vendor Management Save Time CrashOverride Bluetooth IT solutions Television Troubleshooting Shadow IT Transportation Books Public Computer Safety Compliance Loyalty Benefits Wireless Technology Twitter Worker Managed Service Provider Regulation Hosted Solution SaaS Smart Technology Printers Rootkit Business Owner Emergency Employer Employee Relationship Two Factor Authentication