DatCom Blog

DatCom has been serving the Tyler area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

An IT Christmas Carol

An IT Christmas Carol

The IT guy, Jacob left last month: to begin with. There is no doubt whatever about that. He left without an exit interview, and he didn’t seem very pleased with the way the situation played out. You could never tell if Scrooge cared or not. His demands have never wavered. He expected perfection and when mistakes were made, they were approached as catastrophic affronts to the sustainability of the business, even if that wasn’t the reality.

0 Comments
Continue reading

As 2018 Ends, Mobile Cyberthreats Won’t

As 2018 Ends, Mobile Cyberthreats Won’t

Mobile devices have made conducting business much more convenient, as the right application can allow transactions to be made from anywhere you may be reading this blog. However, this increased accessibility has come with a price - threats to mobile security - which requires any business to be aware of the state of cybersecurity, especially concerning mobile devices, now and in the foreseeable future.

0 Comments
Continue reading

Technology Has Influenced a Few Holiday Traditions

Technology Has Influenced a Few Holiday Traditions

Everyone has their own holiday traditions, and Christmastime is no exception. Some might stick to more traditional roots, while others focus on more contemporary trends to create a Christmas culture that changes with each passing year. Many of these newer traditions have been molded from modern technology solutions, so let’s celebrate both new and old holiday traditions by looking at how technology has changed them.

0 Comments
Continue reading

Monsters aren’t Real, But Ransomware Sure Is!

Monsters aren’t Real, But Ransomware Sure Is!

Halloween is a time when creatures like ghosts and goblins are celebrated rather than feared. Even adults use the holiday to lighten up and enjoy themselves, as they’re well aware that the monsters so often seen and heard about in stories are fictional. Unfortunately, the fact remains that there are monsters hiding in plain sight all around us, playing on the fears and misfortune of others--namely, hackers.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Network Security Business Computing User Tips Microsoft Google Hackers Hosted Solutions Tech Term Software Malware Backup Internet Business Data Backup Innovation Data Hardware Mobile Devices Email Smartphones VoIP Android Data Recovery Small Business Smartphone Communications Workplace Tips Business Continuity Ransomware Cloud Computing Router Communication Managed IT Services Computer Disaster Recovery IT Services Alert Network Outsourced IT Cybercrime Artificial Intelligence Productivity Windows 10 Law Enforcement Cybersecurity Browser Windows 10 Chrome How To Money Collaboration Windows Server IT Support Miscellaneous Applications Internet of Things Computers Password Business Management Office 365 Efficiency Facebook BDR Passwords Word Managed IT Services Telephone Systems Wi-Fi Information Gadgets Spam Saving Money Virtualization Social Media Mobile Device Holiday Productivity Mobility Phishing Office Social Engineering Data Security Avoiding Downtime Operating System Voice over Internet Protocol Work/Life Balance Connectivity Keyboard Vulnerability Government App Managed Service Two-factor Authentication Microsoft Office Save Money BYOD Settings Data Protection Mobile Device Management Flexibility Apps Quick Tips Sports Health Content Management Data Breach Google Drive Google Docs Spam Blocking Private Cloud Comparison Blockchain End of Support Website Servers Bandwidth Data Management Identity Theft IT Plan Paperless Office Legal Encryption Office Tips Infrastructure Public Cloud Human Resources Botnet Scam Networking Telephony Unsupported Software HaaS Machine Learning Windows 7 VPN Remote Monitoring Upgrade Business Intelligence Virtual Assistant Entertainment Fraud Access Control Data Storage Update Telephone System CES OneNote Remote Computing Automation Software as a Service Bring Your Own Device Redundancy Employer-Employee Relationship IT Management Managed IT Administrator Excel Worker Commute Workforce Digital Signature Hiring/Firing Travel Google Apps Advertising Battery Trending NIST Hacker Tools Scalability Amazon Web Services Nanotechnology Internet Exlporer Camera Music Computer Care Physical Security Recycling Managing Stress Shortcuts Computer Fan Sync Automobile Remote Work Practices Apple Augmented Reality Black Market Smart Office Microchip Firewall Tip of the week Net Neutrality PDF Risk Management Knowledge Data loss Search Workers Education Cryptocurrency Downtime Content Online Shopping Smart Tech Addiction Wearable Technology Netflix eWaste Marketing Social Patch Management The Internet of Things Hosted Computing iPhone Techology Remote Worker Training webinar Search Engine Windows 10s Windows Server 2008 Document Management FCC Politics Network Congestion Screen Mirroring How to HBO Computing Infrastructure Specifications Safe Mode Current Events Root Cause Analysis Audiobook Evernote Internet exploMicrosoft Cache Warranty USB Samsung Criminal Wireless HVAC Vendor FENG Video Games Credit Cards Inventory Wiring Conferencing Hybrid Cloud Bing Big Data Best Practice Title II IT Consultant Cast Recovery Password Manager Users Value Outlook History Staff Electronic Medical Records Instant Messaging Wireless Charging Wireless Internet Printer Enterprise Content Management Display IBM Skype Devices Unified Threat Management Experience Charger Emails Software Tips IT Support Information Technology YouTube Help Desk Solid State Drive Flash Online Accountants MSP HIPAA Leadership Business Mangement Mouse Frequently Asked Questions Virtual Reality Millennials Meetings Cortana Wire Multi-Factor Security Password Management Security Cameras Supercomputer Start Menu Amazon Authentication Thought Leadership Mobile Computing Cleaning Company Culture Audit Hacking Telecommuting File Sharing Budget WiFi Gmail Hosted Solution SaaS Compliance Smart Technology CrashOverride Twitter IT solutions Emergency Rootkit Business Owner Regulation Employer Employee Relationship Smartwatch Two Factor Authentication Printers Content Filtering Assessment Safety Computer Accessories Managed Service Provider Vendor Management Television Save Time Bluetooth Troubleshooting Transportation Books Public Computer Shadow IT Loyalty Benefits Webinar Wireless Technology Worker