DatCom Blog

DatCom has been serving the Tyler area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Computer Forensics, Defined

Tech Term: Computer Forensics, Defined

Pop culture gives us an impression of what cyber investigations look like. Official-looking people, in impeccable suits, typing away at terminals and analyzing the data scrolling past them on their heads-up displays. In reality, computer forensics (as they are actually called) are a little less dramatic, and much more serious. For today’s tech term, we’ll dig into the field of computer forensics.

0 Comments
Continue reading

Essential Cybersecurity Tips From The FBI

Essential Cybersecurity Tips From The FBI

In 2016 former President of the United States Barack Obama passed the Cybersecurity National Action Plan that implemented near-term action and developed a longer-term strategy of bringing awareness and protections to public computing systems connected to the Internet. The strategy is to make an immediate effort to empower citizens to protect their own privacy, while also maintaining public safety and national and economic security, as many of the most critical systems this nation utilizes are networked on the web.

0 Comments
Continue reading

These Police Officers Called for Backup... and it was Infected with Ransomware

These Police Officers Called for Backup... and it was Infected with Ransomware

The police exist to serve, protect, and enforce the law, but who can we turn to if even the cops are made victim of a cyberattack? This is the question the residents of Cockrell, Texas have to answer, as their police department fell victim to a ransomware attack known as the Osiris Ransomware.

0 Comments
Continue reading

Alert: New ATM Scam Can Steal 32,000 Card Numbers Per Machine

Alert: New ATM Scam Can Steal 32,000 Card Numbers Per Machine

Banks and companies that manage automated teller machines, better known as ATMs, have been warned against another method thieves have been utilizing to commit identity theft--by no less than the Secret Service.

0 Comments
Continue reading

According to FBI Director, Privacy is a Misnomer

According to FBI Director, Privacy is a Misnomer

There’s an ongoing debate concerning whether the United States Constitution gives the American government the right to access data held on electronic devices by its citizens. In case they didn’t make themselves heard clearly enough, the director of the FBI, James Comey, has released a statement at Symantec’s Annual Government Symposium. You might not like his answer.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Hosted Solutions Network Security User Tips Google Hackers Microsoft Software Productivity Malware Internet Tech Term Workplace Tips Backup Mobile Devices Business Email Innovation Data Data Backup Communications Hardware Smartphones Android VoIP Smartphone Data Recovery Business Continuity IT Services Efficiency Cloud Computing Small Business Router Computer Cybersecurity Communication Disaster Recovery Ransomware Managed IT Services Windows 10 Server Artificial Intelligence Law Enforcement Business Management Browser Windows 10 Internet of Things Alert Chrome IT Support Outsourced IT Cybercrime Windows Network Miscellaneous Gadgets Applications How To Mobile Device Office 365 Computers Password Money Collaboration Telephone Systems Operating System Information Virtualization Holiday Word Saving Money Social Media Quick Tips Productivity BDR Spam Facebook Wi-Fi Passwords Managed IT Services Settings Work/Life Balance Mobile Device Management Keyboard Microsoft Office Paperless Office Encryption Government App BYOD Phishing Save Money Connectivity Voice over Internet Protocol Managed Service Flexibility Apps Data Security Two-factor Authentication Mobility Data Protection Health Vulnerability Avoiding Downtime Office Social Engineering Private Cloud Bandwidth Augmented Reality Meetings End of Support Google Docs OneNote HaaS Net Neutrality Redundancy Office Tips Employer-Employee Relationship IT Management Public Cloud Comparison Blockchain Cryptocurrency Identity Theft Scam Networking Entertainment Website Servers Infrastructure Remote Monitoring Google Drive Human Resources Spam Blocking VPN Remote Computing Upgrade Machine Learning Virtual Assistant Managed IT IT Plan Business Intelligence Fraud Access Control Bring Your Own Device Botnet Automation Update Telephone System Telephony Unsupported Software Windows 7 CES Data Breach Software as a Service Sports Data Management Data Storage Content Management Legal Remote Work Practices Patch Management Audiobook Recycling Training Computing Infrastructure Managing Stress Shortcuts Frequently Asked Questions Video Games ISP Start Menu iPhone Techology Workers Politics Smart Office Microchip Marketing PDF Smartwatch Audit Online Shopping Smart Tech Recovery Current Events Addiction USB Best Practice Samsung Save Time Hosted Computing Instant Messaging Remote Worker Internet exploMicrosoft eWaste History Social Excel Big Data Cryptomining Tools IT Support Search Engine Physical Security Wireless FCC Safe Mode Employee Computer Fan Sync Evernote Electronic Medical Records Cache Warranty Users Hybrid Cloud Specifications Value Credit Cards Inventory IBM Wiring Knowledge Data loss Criminal Experience Charger Virtual Reality HVAC Vendor Tip of the week Database Downtime Password Manager HIPAA Bing Netflix Title II Digital Signage The Internet of Things Wireless Charging Wireless Internet Printer webinar Information Technology Staff Hacking Supercomputer Devices Unified Threat Management Network Congestion Screen Mirroring Cleaning Worker Commute Enterprise Content Management Display Windows 10s Windows Server 2008 Online Accountants Scalability MSP Business Technology Root Cause Analysis Business Mangement Budget Battery YouTube Help Desk HBO Google Search FENG Cortana Hiring/Firing Black Market Wire Mouse Conferencing Millennials Automobile Amazon Authentication Search Thought Leadership Mobile Computing IT Consultant Cast Advertising Multi-Factor Security Music Computer Care Password Management Security Cameras Telecommuting Content File Sharing Internet Exlporer WiFi Gmail Education Company Culture Outlook Proactive IT Skype Apple Travel Google Apps Risk Management Administrator Emails Software Tips Workforce Digital Signature Firewall Solid State Drive Flash Amazon Web Services Nanotechnology How to Camera Leadership Trending Wearable Technology Document Management NIST Hacker Assessment Regulation Computer Accessories Webinar Content Filtering Safety Printers Vendor Management Television CrashOverride Managed Service Provider Bluetooth IT solutions Shadow IT Troubleshooting Transportation Books Public Computer Wireless Technology Loyalty Benefits Worker Hosted Solution SaaS Smart Technology Business Owner Emergency Rootkit Compliance Biometric Security Employer Employee Relationship Two Factor Authentication Twitter