DatCom Blog

DatCom has been serving the Tyler area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Computer Forensics, Defined

Tech Term: Computer Forensics, Defined

Pop culture gives us an impression of what cyber investigations look like. Official-looking people, in impeccable suits, typing away at terminals and analyzing the data scrolling past them on their heads-up displays. In reality, computer forensics (as they are actually called) are a little less dramatic, and much more serious. For today’s tech term, we’ll dig into the field of computer forensics.

0 Comments
Continue reading

Essential Cybersecurity Tips From The FBI

Essential Cybersecurity Tips From The FBI

In 2016 former President of the United States Barack Obama passed the Cybersecurity National Action Plan that implemented near-term action and developed a longer-term strategy of bringing awareness and protections to public computing systems connected to the Internet. The strategy is to make an immediate effort to empower citizens to protect their own privacy, while also maintaining public safety and national and economic security, as many of the most critical systems this nation utilizes are networked on the web.

0 Comments
Continue reading

These Police Officers Called for Backup... and it was Infected with Ransomware

These Police Officers Called for Backup... and it was Infected with Ransomware

The police exist to serve, protect, and enforce the law, but who can we turn to if even the cops are made victim of a cyberattack? This is the question the residents of Cockrell, Texas have to answer, as their police department fell victim to a ransomware attack known as the Osiris Ransomware.

0 Comments
Continue reading

Alert: New ATM Scam Can Steal 32,000 Card Numbers Per Machine

Alert: New ATM Scam Can Steal 32,000 Card Numbers Per Machine

Banks and companies that manage automated teller machines, better known as ATMs, have been warned against another method thieves have been utilizing to commit identity theft--by no less than the Secret Service.

0 Comments
Continue reading

According to FBI Director, Privacy is a Misnomer

According to FBI Director, Privacy is a Misnomer

There’s an ongoing debate concerning whether the United States Constitution gives the American government the right to access data held on electronic devices by its citizens. In case they didn’t make themselves heard clearly enough, the director of the FBI, James Comey, has released a statement at Symantec’s Annual Government Symposium. You might not like his answer.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Network Security Microsoft Google User Tips Hackers Hosted Solutions Tech Term Internet Business Software Malware Backup Hardware Data Backup Data Innovation Mobile Devices Email Smartphones Workplace Tips Small Business Smartphone Data Recovery Communications VoIP Business Continuity Android Ransomware Communication Router IT Services Computer Cloud Computing Managed IT Services Disaster Recovery Cybersecurity Browser Network Chrome Artificial Intelligence Windows 10 Alert Outsourced IT Productivity Law Enforcement Cybercrime Windows 10 How To Miscellaneous Business Management Efficiency Applications Server IT Support Office 365 Money Collaboration Computers Password Internet of Things Windows Managed IT Services Wi-Fi Productivity Facebook Word Passwords Virtualization Mobile Device Holiday Gadgets BDR Spam Telephone Systems Saving Money Social Media Information Data Protection Avoiding Downtime Quick Tips Connectivity Phishing Managed Service Work/Life Balance Data Security Office Microsoft Office BYOD Save Money Operating System Flexibility Apps Vulnerability Social Engineering Government App Voice over Internet Protocol Mobility Settings Mobile Device Management Two-factor Authentication Keyboard Data Management Remote Monitoring Automation Legal CES Health Machine Learning Google Drive HaaS Virtual Assistant Spam Blocking Content Management Entertainment IT Plan Google Docs Private Cloud End of Support Telephone System Bring Your Own Device Botnet Comparison Blockchain Telephony Identity Theft Office Tips Software as a Service Unsupported Software Website Public Cloud Remote Computing Encryption Sports Infrastructure Data Breach Windows 7 Human Resources Managed IT VPN Data Storage Upgrade Bandwidth Business Intelligence OneNote Fraud Access Control Servers Redundancy Paperless Office Employer-Employee Relationship IT Management Update Scam Networking Millennials Cache Warranty Cortana Safe Mode Big Data Excel Electronic Medical Records Tools How to Amazon Authentication HVAC Vendor Value Physical Security Document Management Multi-Factor Security Wiring Computer Fan Sync Audiobook Telecommuting Bing Experience Charger Computing Infrastructure WiFi Advertising Gmail IBM Video Games Workforce Digital Signature Wireless Internet Printer HIPAA Knowledge Data loss Travel Internet Exlporer Google Apps Tip of the week Downtime Recovery Apple Amazon Web Services Nanotechnology Enterprise Content Management Display Netflix Best Practice Trending Devices Unified Threat Management The Internet of Things Instant Messaging Remote Work Practices YouTube Help Desk Cleaning webinar History Recycling MSP Supercomputer Net Neutrality PDF Wire Mouse Budget Network Congestion Screen Mirroring IT Support Workers Windows 10s Windows Server 2008 Thought Leadership Mobile Computing Hiring/Firing Root Cause Analysis iPhone Online Shopping Techology Smart Tech Password Management Security Cameras HBO Marketing FENG Hosted Computing Company Culture Music Computer Care Conferencing Virtual Reality eWaste File Sharing FCC Administrator IT Consultant Cast Internet exploMicrosoft Specifications Wireless Camera Risk Management Evernote NIST Hacker Firewall Outlook Hacking Skype Credit Cards Inventory Managing Stress Shortcuts Wearable Technology Emails Software Tips Worker Commute Users Hybrid Cloud Criminal Augmented Reality Solid State Drive Flash Scalability Title II Smart Office Microchip Training Leadership Battery Password Manager Patch Management Automobile Staff Addiction Politics Meetings Black Market Wireless Charging Cryptocurrency Frequently Asked Questions Current Events Start Menu Search Social USB Samsung Information Technology Remote Worker Audit Content Online Accountants Search Engine Education Business Mangement Bluetooth Television CrashOverride Troubleshooting IT solutions Transportation Books Public Computer Loyalty Save Time Benefits Worker Shadow IT Hosted Solution SaaS Safety Smart Technology Rootkit Compliance Emergency Twitter Employer Employee Relationship Managed Service Provider Wireless Technology Two Factor Authentication Regulation Printers Computer Accessories Smartwatch Content Filtering Assessment Webinar Business Owner Vendor Management