DatCom Blog

DatCom has been serving the Tyler area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What is a Router Botnet? Find Out Today!

What is a Router Botnet? Find Out Today!

Ordinarily, one of the best ways to protect your organization’s infrastructure is to make sure any and all patches administered to the software you use are applied as soon as possible after they’ve been released. However, patches don’t help against threats that aren’t discovered at the moment they are released. The recent spread of BCMUPnP_Hunter botnet shows that it’s not enough for people to keep patching their systems.

Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Network Security Business Computing User Tips Google Hackers Microsoft Tech Term Hosted Solutions Backup Malware Internet Business Software Hardware Data Innovation Data Backup Mobile Devices Email Smartphones Communications VoIP Business Continuity Android Data Recovery Workplace Tips Small Business Smartphone Communication Cloud Computing Disaster Recovery Managed IT Services Ransomware IT Services Computer Router Alert Chrome Outsourced IT Cybercrime Law Enforcement Windows 10 Productivity Artificial Intelligence Windows 10 Network Cybersecurity Internet of Things Browser Money Collaboration Computers Windows IT Support Password Miscellaneous Applications Server Business Management How To Office 365 Efficiency BDR Word Information Saving Money Social Media Wi-Fi Managed IT Services Telephone Systems Spam Productivity Facebook Passwords Virtualization Mobile Device Holiday Gadgets Phishing Operating System Mobility Data Security Government App Connectivity Social Engineering Managed Service Avoiding Downtime Vulnerability Quick Tips Work/Life Balance Keyboard Voice over Internet Protocol Settings Microsoft Office BYOD Mobile Device Management Office Save Money Two-factor Authentication Flexibility Apps Data Protection Google Drive CES Bring Your Own Device Spam Blocking Servers Paperless Office IT Plan Content Management Data Breach Google Docs Botnet Machine Learning Data Management Virtual Assistant Unsupported Software Comparison Legal Blockchain Bandwidth Telephony Automation Identity Theft Website Windows 7 HaaS Infrastructure Encryption Telephone System Health Human Resources Scam Networking Entertainment Remote Monitoring Data Storage Upgrade Software as a Service VPN Private Cloud Sports Business Intelligence OneNote End of Support Fraud Access Control Employer-Employee Relationship IT Management Redundancy Update Remote Computing Public Cloud Managed IT Office Tips Cryptocurrency Smartwatch Internet exploMicrosoft Amazon Authentication Budget Addiction Multi-Factor Security Worker Commute Computer Fan Sync Telecommuting Scalability Hiring/Firing Knowledge Data loss Remote Worker WiFi Wireless Gmail Battery Tip of the week Social Downtime Users Travel Hybrid Cloud Google Apps Black Market Music Computer Care Netflix Search Engine Workforce Digital Signature Automobile Safe Mode Amazon Web Services Search Nanotechnology webinar Cache Warranty Trending The Internet of Things Remote Work Practices Content Risk Management Network Congestion Screen Mirroring Wiring Recycling Education Firewall Windows 10s Windows Server 2008 HVAC Vendor Root Cause Analysis Information Technology Workers Wearable Technology HBO Bing Net Neutrality PDF Online Shopping How to Smart Tech Training Conferencing Wireless Internet Printer Document Management Patch Management FENG Enterprise Content Management Display Hosted Computing Audiobook Politics IT Consultant Cast Devices Unified Threat Management eWaste Computing Infrastructure Current Events MSP USB Samsung Outlook YouTube Help Desk FCC Video Games Advertising Evernote Recovery Emails Software Tips Wire Mouse Specifications Best Practice Skype Password Management Security Cameras Internet Exlporer Credit Cards Instant Messaging Inventory Leadership Thought Leadership Mobile Computing History Criminal Big Data Solid State Drive Flash Electronic Medical Records Meetings File Sharing IT Support Password Manager Value Frequently Asked Questions Company Culture Apple Title II Wireless Charging Experience Charger Administrator Staff IBM Start Menu NIST Hacker HIPAA Camera Virtual Reality Audit Augmented Reality Marketing Business Mangement Excel Managing Stress Shortcuts iPhone Online Techology Accountants Tools Cortana Cleaning Physical Security Smart Office Microchip Millennials Hacking Supercomputer Worker Printers Hosted Solution SaaS Managed Service Provider Smart Technology Rootkit Business Owner Emergency Employer Employee Relationship Two Factor Authentication Computer Accessories Content Filtering Assessment Vendor Management Save Time Bluetooth Television Troubleshooting Compliance Shadow IT Webinar Transportation Twitter Books Public Computer Loyalty Regulation IT solutions Safety Wireless Technology Benefits CrashOverride