DatCom Blog

DatCom has been serving the Tyler area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Most Devastating Hacks of 2018… So Far

The Most Devastating Hacks of 2018… So Far

Network security is a crucial consideration for every contemporary business owner, as there are just too many threats that originate from an Internet connection to be overlooked. One only has to look at what businesses of all sizes have dealt with, even within this calendar year, to gain an appreciation for how crucial it is that every business owner consider their cybersecurity.

0 Comments
Continue reading

Cryptomining is Inspiring Cybercrime

Cryptomining is Inspiring Cybercrime

Blockchain technology is mainly known for its use with cryptocurrencies. Even though the values of cryptocurrencies have leveled off after the incredible growth it has sustained over the past few months, users are still attempting to use cryptocurrencies to make a little bit of extra cash on the side. Of course, if there is money involved, you can bet that there will also be criminals and shady activity surrounding it.

0 Comments
Continue reading

Did You Know Your Router Can be Infected?

Did You Know Your Router Can be Infected?

A new type of malware is targeting routers in what is considered a large enough threat that even the FBI is addressing it. Even worse, a router isn’t necessarily a device that you think would be vulnerable to attack from a hacker. What can you do to keep your business’ Internet access points secure from hacking attacks? Let’s dig in to the details about what the VPNFilter malware does and how you can address it.

0 Comments
Continue reading

Your Router Can Host Some Pretty Nasty Malware

Your Router Can Host Some Pretty Nasty Malware

Hundreds of millions of people use wireless Internet connections every day, and as a result, hackers are taking that as a challenge. They are now starting to develop malware that targets people through their routers. Recently, security researchers at Kaspersky Lab have discovered the malware named Slingshot. The code is designed to spy on PCs through a multi-layer attack that targets MikroTik routers. Today we take a look at Slingshot, and other router-based malware and what you can do about it.

0 Comments
Continue reading

How to Spot Three Forms of Phishing Attacks

How to Spot Three Forms of Phishing Attacks

One of the crazy things about hackers is that they will do whatever it takes to ensure that they steal as much information and sensitive data as possible. One of the more innovative ways that hackers spread threats is through spam. Unwanted messages have grown from simple annoyances, to the spread of unwanted software and malware, all the way to sophisticated attacks on targeted individuals known as phishing attacks. Do you have ways to secure your business?

0 Comments
Continue reading

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Do you know what a botnet is and how it works? It’s basically a network of infected computers that can be used to perform Distributed Denial of Service attacks, overloading target networks and forcing them to endure downtime. They can also be used to distribute malware and other threats. What’s worse than this, you ask? Hackers can purchase botnets on the black market to use against their targets, but a new type of botnet strain is changing the way this works.

0 Comments
Continue reading

5 Security Threats that Spell Doom for Any Organization

5 Security Threats that Spell Doom for Any Organization

Fact: your business will always be susceptible to various security threats in at least some capacity. It’s up to you to counter these threats before falling victim to them. To help you with this, we’ll go over the top five threats that you need to be prepared for.

0 Comments
Continue reading

These Police Officers Called for Backup... and it was Infected with Ransomware

These Police Officers Called for Backup... and it was Infected with Ransomware

The police exist to serve, protect, and enforce the law, but who can we turn to if even the cops are made victim of a cyberattack? This is the question the residents of Cockrell, Texas have to answer, as their police department fell victim to a ransomware attack known as the Osiris Ransomware.

0 Comments
Continue reading

For This Ransomware, “Yes or No” Really Means “Yes or Yes”

For This Ransomware, “Yes or No” Really Means “Yes or Yes”

The ransomware Petya (previously thought to have been eradicated) has unfortunately resurfaced, and it’s brought a friend to the party. Petya was delivered via an email containing an invitation to apply for a job, including the virus in an executable file that was disguised as a PDF job resume. When a hepless user clicked the file, Petya would get to work.

0 Comments
Continue reading

Threat Spotlight: How to Stop Brute Force Attacks

Threat Spotlight: How to Stop Brute Force Attacks

Hackers of all shapes and sizes use brute force attacks to gain access into accounts and infrastructures, but do you know how they work and what your business can do to protect against them? Failing to understand brute force attacks could put sensitive information in the crosshairs of hackers, and leave it vulnerable to ongoing attacks.

0 Comments
Continue reading

Alert: New Malware Can Download 200 Malicious Apps in a Few Short Hours

Alert: New Malware Can Download 200 Malicious Apps in a Few Short Hours

You don’t often hear about mobile operating systems being vulnerable to security threats (desktop vulnerabilities usually hog the spotlight), but when you do, they’re usually major problems that you need to be aware of. One such threat is called “Hummer,” a trojan that has installed unwanted apps and malware to more than a million phones all over the world.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Network Security Google Microsoft User Tips Hackers Hosted Solutions Tech Term Internet Business Software Malware Backup Hardware Data Innovation Mobile Devices Data Backup Email Smartphones Data Recovery Workplace Tips Small Business Smartphone Communications Business Continuity Android VoIP Cloud Computing Ransomware Managed IT Services Computer IT Services Router Communication Disaster Recovery Windows 10 Artificial Intelligence Network Productivity Internet of Things Alert Cybersecurity Browser Outsourced IT Chrome Cybercrime Law Enforcement Windows 10 Miscellaneous Applications Server Office 365 How To Money Collaboration Business Management Efficiency Windows Computers Password IT Support Productivity Telephone Systems Spam Facebook Virtualization Passwords Mobile Device Holiday Information Gadgets Word Saving Money Wi-Fi BDR Managed IT Services Social Media Social Engineering Quick Tips Vulnerability Work/Life Balance Microsoft Office BYOD Office Settings Save Money Keyboard Voice over Internet Protocol Mobile Device Management Flexibility Apps Two-factor Authentication Operating System Phishing Connectivity Data Protection Mobility Managed Service Government App Data Security Avoiding Downtime Unsupported Software Automation Telephony Comparison Blockchain HaaS Windows 7 Software as a Service Bandwidth Health Sports Identity Theft Website Encryption Infrastructure Entertainment Data Storage Human Resources Scam Networking Private Cloud VPN Remote Monitoring End of Support OneNote Upgrade Employer-Employee Relationship IT Management Business Intelligence Redundancy Servers Remote Computing Managed IT Office Tips Paperless Office Fraud Access Control Public Cloud Update Google Drive CES Spam Blocking Machine Learning Bring Your Own Device Virtual Assistant IT Plan Content Management Data Management Data Breach Legal Botnet Telephone System Google Docs Conferencing Thought Leadership Mobile Computing Net Neutrality PDF Computing Infrastructure Risk Management FENG Password Management Security Cameras Workers Audiobook Firewall Cast File Sharing Company Culture Online Shopping Smart Tech Video Games Wearable Technology IT Consultant Recovery Patch Management Outlook Administrator Hosted Computing Best Practice Training Advertising eWaste Emails Software Tips Camera FCC History Politics Internet Exlporer Skype NIST Hacker Instant Messaging Leadership Augmented Reality Specifications IT Support Current Events Apple Solid State Drive Flash Managing Stress Shortcuts Evernote USB Samsung Criminal Frequently Asked Questions Smart Office Microchip Credit Cards Inventory Meetings Addiction Title II Virtual Reality Start Menu Cryptocurrency Smartwatch Password Manager Big Data Marketing Remote Worker Staff Electronic Medical Records iPhone Techology Audit Social Wireless Charging Value IBM Excel Search Engine Hacking Experience Charger Physical Security Cache Warranty Online Accountants Worker Commute HIPAA Internet exploMicrosoft Tools Safe Mode Business Mangement Wireless Wiring Millennials Battery Computer Fan Sync HVAC Vendor Cortana Scalability Multi-Factor Security Black Market Supercomputer Tip of the week Bing Amazon Authentication Automobile Cleaning Users Hybrid Cloud Knowledge Data loss Netflix Wireless Internet Printer Telecommuting Budget Downtime WiFi Gmail Search webinar Devices Unified Threat Management Workforce Digital Signature Education Hiring/Firing The Internet of Things Enterprise Content Management Travel Display Google Apps Content MSP Trending Windows 10s Windows Server 2008 YouTube Help Desk Amazon Web Services Nanotechnology Music Computer Care Information Technology Network Congestion Screen Mirroring HBO Wire Mouse Remote Work Practices Document Management Root Cause Analysis Recycling How to Employer Employee Relationship Two Factor Authentication Save Time Compliance Twitter Computer Accessories Content Filtering Assessment Shadow IT Vendor Management Regulation Webinar Printers Bluetooth Television Troubleshooting Transportation Safety Wireless Technology Public Computer IT solutions CrashOverride Books Managed Service Provider Loyalty Benefits Business Owner Worker Hosted Solution SaaS Smart Technology Emergency Rootkit