DatCom Blog

DatCom has been serving the Tyler area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cryptomining Becoming a Big Issue for Businesses

Cryptomining Becoming a Big Issue for Businesses

Cryptojacking is one of the upcoming threats that your business should have on its radar in the upcoming years. This process involves a malicious entity installed cryptomining malware on a device without the user’s permission. What this provides the hacker with is a steady stream of income at the expense of the victim’s device. What can you do to keep your business’ devices from falling prey to this?

0 Comments
Continue reading

The Most Devastating Hacks of 2018… So Far

The Most Devastating Hacks of 2018… So Far

Network security is a crucial consideration for every contemporary business owner, as there are just too many threats that originate from an Internet connection to be overlooked. One only has to look at what businesses of all sizes have dealt with, even within this calendar year, to gain an appreciation for how crucial it is that every business owner consider their cybersecurity.

0 Comments
Continue reading

Cryptomining is Inspiring Cybercrime

Cryptomining is Inspiring Cybercrime

Blockchain technology is mainly known for its use with cryptocurrencies. Even though the values of cryptocurrencies have leveled off after the incredible growth it has sustained over the past few months, users are still attempting to use cryptocurrencies to make a little bit of extra cash on the side. Of course, if there is money involved, you can bet that there will also be criminals and shady activity surrounding it.

0 Comments
Continue reading

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

0 Comments
Continue reading

Your Router Can Host Some Pretty Nasty Malware

Your Router Can Host Some Pretty Nasty Malware

Hundreds of millions of people use wireless Internet connections every day, and as a result, hackers are taking that as a challenge. They are now starting to develop malware that targets people through their routers. Recently, security researchers at Kaspersky Lab have discovered the malware named Slingshot. The code is designed to spy on PCs through a multi-layer attack that targets MikroTik routers. Today we take a look at Slingshot, and other router-based malware and what you can do about it.

0 Comments
Continue reading

How to Spot Three Forms of Phishing Attacks

How to Spot Three Forms of Phishing Attacks

One of the crazy things about hackers is that they will do whatever it takes to ensure that they steal as much information and sensitive data as possible. One of the more innovative ways that hackers spread threats is through spam. Unwanted messages have grown from simple annoyances, to the spread of unwanted software and malware, all the way to sophisticated attacks on targeted individuals known as phishing attacks. Do you have ways to secure your business?

0 Comments
Continue reading

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Do you know what a botnet is and how it works? It’s basically a network of infected computers that can be used to perform Distributed Denial of Service attacks, overloading target networks and forcing them to endure downtime. They can also be used to distribute malware and other threats. What’s worse than this, you ask? Hackers can purchase botnets on the black market to use against their targets, but a new type of botnet strain is changing the way this works.

0 Comments
Continue reading

5 Security Threats that Spell Doom for Any Organization

5 Security Threats that Spell Doom for Any Organization

Fact: your business will always be susceptible to various security threats in at least some capacity. It’s up to you to counter these threats before falling victim to them. To help you with this, we’ll go over the top five threats that you need to be prepared for.

0 Comments
Continue reading

These Police Officers Called for Backup... and it was Infected with Ransomware

These Police Officers Called for Backup... and it was Infected with Ransomware

The police exist to serve, protect, and enforce the law, but who can we turn to if even the cops are made victim of a cyberattack? This is the question the residents of Cockrell, Texas have to answer, as their police department fell victim to a ransomware attack known as the Osiris Ransomware.

0 Comments
Continue reading

For This Ransomware, “Yes or No” Really Means “Yes or Yes”

For This Ransomware, “Yes or No” Really Means “Yes or Yes”

The ransomware Petya (previously thought to have been eradicated) has unfortunately resurfaced, and it’s brought a friend to the party. Petya was delivered via an email containing an invitation to apply for a job, including the virus in an executable file that was disguised as a PDF job resume. When a hepless user clicked the file, Petya would get to work.

0 Comments
Continue reading

Threat Spotlight: How to Stop Brute Force Attacks

Threat Spotlight: How to Stop Brute Force Attacks

Hackers of all shapes and sizes use brute force attacks to gain access into accounts and infrastructures, but do you know how they work and what your business can do to protect against them? Failing to understand brute force attacks could put sensitive information in the crosshairs of hackers, and leave it vulnerable to ongoing attacks.

0 Comments
Continue reading

Alert: New Malware Can Download 200 Malicious Apps in a Few Short Hours

Alert: New Malware Can Download 200 Malicious Apps in a Few Short Hours

You don’t often hear about mobile operating systems being vulnerable to security threats (desktop vulnerabilities usually hog the spotlight), but when you do, they’re usually major problems that you need to be aware of. One such threat is called “Hummer,” a trojan that has installed unwanted apps and malware to more than a million phones all over the world.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Hosted Solutions Network Security Google User Tips Hackers Microsoft Software Productivity Malware Internet Tech Term Innovation Workplace Tips Backup Mobile Devices Hardware Business Email Smartphones Data Data Backup Communications Android VoIP Small Business Smartphone Data Recovery Business Continuity IT Services Efficiency Cloud Computing Network Router Computer Cybersecurity Communication Disaster Recovery Managed IT Services Ransomware Windows 10 Server Artificial Intelligence Browser Business Management Law Enforcement Internet of Things IT Support Alert Chrome Windows 10 Outsourced IT Cybercrime Windows Miscellaneous How To Gadgets Applications Mobile Device Office 365 Computers Password Money Collaboration Passwords Managed IT Services Wi-Fi Telephone Systems Operating System Information Phishing Virtualization Word Holiday Saving Money Social Media BDR Quick Tips Productivity Spam Facebook Social Engineering Avoiding Downtime Settings Office Private Cloud Mobile Device Management Work/Life Balance Keyboard Encryption Paperless Office Microsoft Office Save Money Government App Connectivity BYOD Voice over Internet Protocol Data Security Managed Service Flexibility Apps Two-factor Authentication Data Protection Mobility Vulnerability Health Data Management Data Storage Content Management Legal Bandwidth Augmented Reality Meetings Google Docs Net Neutrality OneNote End of Support Blockchain Cryptocurrency Redundancy Employer-Employee Relationship IT Management HaaS Comparison Servers Identity Theft Scam Networking Office Tips Website Public Cloud Entertainment Infrastructure Remote Monitoring Human Resources Google Drive Spam Blocking VPN Upgrade Machine Learning Business Intelligence Virtual Assistant Remote Computing IT Plan Fraud Access Control Managed IT Bring Your Own Device Botnet Update Telephone System Telephony Automation Unsupported Software Windows 7 CES Software as a Service Data Breach Sports Wearable Technology NIST Hacker Solid State Drive Flash Amazon Web Services Nanotechnology Apple Camera Leadership Trending Managing Stress Shortcuts Frequently Asked Questions Document Management Remote Work Practices Patch Management How to Recycling Training Computing Infrastructure PDF ISP Start Menu Audiobook Workers Politics Smart Office Microchip USB Samsung Marketing Smartwatch Audit Video Games Online Shopping Smart Tech Current Events iPhone Techology Addiction Social Excel Best Practice Save Time Hosted Computing Remote Worker Recovery eWaste History FCC Big Data Cryptomining Tools Instant Messaging Internet exploMicrosoft Search Engine Physical Security Specifications Value Wireless Safe Mode Employee Computer Fan Sync Evernote Electronic Medical Records Cache Warranty IT Support Users Hybrid Cloud HVAC Vendor Tip of the week Credit Cards Inventory IBM Wiring Knowledge Data loss Criminal Experience Charger Virtual Reality Title II Database Downtime Password Manager HIPAA Bing Netflix Staff Digital Signage The Internet of Things Wireless Charging Wireless Internet Printer webinar Information Technology Enterprise Content Management Display Windows 10s Windows Server 2008 Hacking Supercomputer Devices Unified Threat Management Network Congestion Screen Mirroring Cleaning HBO Worker Commute Online Accountants MSP Business Technology Root Cause Analysis Business Mangement Budget YouTube Help Desk Millennials Google Search FENG Scalability Cortana Hiring/Firing Wire Mouse Conferencing Battery Computer Care Password Management Security Cameras Automobile Amazon Authentication Thought Leadership Mobile Computing IT Consultant Cast Black Market Multi-Factor Security Music Outlook Telecommuting File Sharing Search WiFi Gmail Advertising Company Culture Workforce Digital Signature Firewall Proactive IT Skype Content Biometric Security Travel Google Apps Risk Management Internet Exlporer Administrator Emails Software Tips Education Two Factor Authentication Twitter Content Filtering Assessment Regulation Computer Accessories Webinar Printers Safety Vendor Management Television CrashOverride Bluetooth IT solutions Troubleshooting Managed Service Provider Transportation Shadow IT Books Public Computer Loyalty Wireless Technology Benefits Worker Hosted Solution SaaS Smart Technology Business Owner Emergency Rootkit Compliance Employer Employee Relationship