DatCom Blog

DatCom has been serving the Tyler area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Any Version of Internet Explorer Prior to 11 Can’t Be Trusted

Any Version of Internet Explorer Prior to 11 Can’t Be Trusted

We often talk about how important it is that your business use the most recent and up-to-date versions of your software solutions, but it’s not often that we get to say that people using Internet Explorer 11 have the right idea. As it turns out, nearly a quarter of all Windows PCs are still using unsupported versions of Internet Explorer, with half of them being found on computers still running Windows XP. What has this world come to?

Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Network Security Google Hackers Microsoft User Tips Tech Term Hosted Solutions Malware Backup Internet Business Software Data Data Backup Hardware Mobile Devices Innovation Email Smartphones VoIP Communications Workplace Tips Business Continuity Data Recovery Android Small Business Smartphone Router Cloud Computing Disaster Recovery Computer IT Services Communication Ransomware Managed IT Services Productivity Law Enforcement Windows 10 Alert Cybersecurity Browser Outsourced IT Artificial Intelligence Network Chrome Windows 10 Cybercrime Internet of Things Miscellaneous How To Applications Computers Password Office 365 IT Support Money Collaboration Business Management Efficiency Server Windows Wi-Fi BDR Managed IT Services Gadgets Telephone Systems Saving Money Virtualization Mobile Device Social Media Word Holiday Productivity Facebook Information Passwords Spam Avoiding Downtime Managed Service Settings Operating System Mobile Device Management Two-factor Authentication Social Engineering Work/Life Balance Data Protection Government App Phishing Microsoft Office Save Money Keyboard BYOD Data Security Flexibility Apps Quick Tips Mobility Vulnerability Office Connectivity Voice over Internet Protocol Machine Learning VPN Data Storage Data Management Upgrade Data Breach Business Intelligence Office Tips Virtual Assistant Legal Public Cloud OneNote Fraud Access Control HaaS Employer-Employee Relationship IT Management Update Redundancy Bandwidth Telephone System CES Entertainment Software as a Service Google Drive Scam Networking Spam Blocking Sports Content Management Remote Monitoring IT Plan Automation Remote Computing Google Docs Managed IT Comparison Blockchain Botnet Health Telephony Servers Identity Theft Unsupported Software Website Encryption Infrastructure Windows 7 Paperless Office Human Resources Private Cloud Bring Your Own Device End of Support Bing Title II Leadership iPhone Techology Music Computer Care Password Manager Solid State Drive Flash Marketing Staff Meetings Document Management Wireless Charging Frequently Asked Questions Wireless Internet Printer How to Start Menu Enterprise Content Management Display Computing Infrastructure Risk Management Internet exploMicrosoft Devices Unified Threat Management Audiobook Firewall Wireless YouTube Help Desk Online Accountants MSP Video Games Wearable Technology Business Mangement Audit Patch Management Millennials Best Practice Training Cortana Excel Users Hybrid Cloud Wire Mouse Recovery Multi-Factor Security Tools Password Management Security Cameras History Politics Amazon Authentication Physical Security Thought Leadership Mobile Computing Instant Messaging Sync Company Culture IT Support Current Events Telecommuting File Sharing USB Samsung WiFi Gmail Computer Fan Workforce Digital Signature Knowledge Data loss Travel Google Apps Tip of the week Information Technology Administrator Trending Downtime NIST Hacker Virtual Reality Amazon Web Services Nanotechnology Netflix Camera Big Data The Internet of Things Managing Stress Shortcuts Electronic Medical Records Remote Work Practices webinar Augmented Reality Value Recycling IBM Net Neutrality PDF Network Congestion Screen Mirroring Hacking Experience Charger Workers Windows 10s Windows Server 2008 Smart Office Microchip Root Cause Analysis Cryptocurrency Worker Commute HIPAA Online Shopping Smart Tech HBO Advertising Addiction FENG Social Battery Hosted Computing Conferencing Internet Exlporer Remote Worker Scalability eWaste Search Engine Black Market Supercomputer FCC IT Consultant Cast Apple Automobile Cleaning Specifications Safe Mode Budget Evernote Outlook Cache Warranty Search Skype HVAC Vendor Education Hiring/Firing Credit Cards Inventory Emails Software Tips Wiring Content Criminal Smart Technology Emergency Safety Rootkit Employer Employee Relationship Webinar Two Factor Authentication Managed Service Provider Save Time CrashOverride Computer Accessories IT solutions Content Filtering Assessment Shadow IT Compliance Vendor Management Bluetooth Twitter Television Troubleshooting Transportation Regulation Wireless Technology Smartwatch Printers Books Public Computer Loyalty Benefits Business Owner Worker Hosted Solution SaaS