DatCom Blog

DatCom has been serving the Tyler area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Most Devastating Hacks of 2018… So Far

The Most Devastating Hacks of 2018… So Far

Network security is a crucial consideration for every contemporary business owner, as there are just too many threats that originate from an Internet connection to be overlooked. One only has to look at what businesses of all sizes have dealt with, even within this calendar year, to gain an appreciation for how crucial it is that every business owner consider their cybersecurity.

0 Comments
Continue reading

Hackers Target Major Sporting Events

Hackers Target Major Sporting Events

There are literally billions of sports fans in the world, and the popularity of these events brings in big money; and big money typically attracts hackers. Using all types of methods, there has been a history of hacking in almost every sport. Today, we take a look at some of the most famous hacks that have shaken up the sports world.

0 Comments
Continue reading

UTM is a Strong Solution to Ward Off Hackers

UTM is a Strong Solution to Ward Off Hackers

When your employees think about hackers and network security, do they picture some cloaked or hooded figure in a dark room typing away at a keyboard? Do they see a recluse living in their mother’s basement? Popular culture has given many users a false sense of reality regarding hacking attacks and the culture surrounding them, and it can come at the detriment of your business.

0 Comments
Continue reading

Cybersecurity Requires Flexibility to Changes

Cybersecurity Requires Flexibility to Changes

Security is always changing due to the volatility of online threats and vulnerabilities. Things have changed so much over the past decade that solutions that worked back then are so outdated that they put your business at risk today. This brings into question what you should expect in the years to come. What are some of the threats that your business can expect to face in the future?

0 Comments
Continue reading

Three Give-Aways that Your Security Approach Needs a Change

Three Give-Aways that Your Security Approach Needs a Change

It only makes sense that you would want only the best security for your organization. It’s natural to want to eliminate risk entirely. However, this simply is not a realistic viewpoint to take where your security is concerned, and it can even contribute to greater security issues as a company holds out for the best solution.

0 Comments
Continue reading

The IoT Can Be Very Useful, but Also Risky

The IoT Can Be Very Useful, but Also Risky

You might be surprised to hear how the scope of the Internet of Things has increased over the past few years. These connected devices are all over the place. In order to ensure that your business isn’t affected in a negative way by these IoT devices, you’ll need to consider the many risks and how you will respond to them.

0 Comments
Continue reading

Do You Use 2FA? If So, You’re in the Minority

Do You Use 2FA? If So, You’re in the Minority

Two-factor authentication, also known as 2FA, is a very beneficial addition to consider for your cybersecurity. However, a research study unearthed a few surprising takeaways that indicate that 2FA may not be adopted as much as one might expect it to be.

0 Comments
Continue reading

How Remote Monitoring and Management Can Help Your Business

How Remote Monitoring and Management Can Help Your Business

As a small business, your assets are limited more than you’d like them to be. You have a budget that yearns for more flexibility, and there are only so many hours in the day to accomplish all of your goals. Thankfully, in an era that’s more connected than any that came before, modern technology provides solutions to businesses that need to get a little more value out of their budgets. One of these solutions is called remote monitoring and management.

0 Comments
Continue reading

Your Business Should Be in the Headlines for the Right Reasons, Not for a Cyber Attack

Your Business Should Be in the Headlines for the Right Reasons, Not for a Cyber Attack

Today’s headlines are peppered with stories of major companies and institutions falling victim to a cyberattack. As a business owner, what’s your response to these gut-wrenching stories? If you write them off as fear mongering and believe that these attacks can never happen to your SMB, well, you’re wrong. They can and it’s up to you to prevent such a disaster.

0 Comments
Continue reading

Exploits From the NSA are Now on the Black Market

Exploits From the NSA are Now on the Black Market

If you panic in the event of a hacking attack, imagine how the National Security Agency (NSA) feels knowing that some of its exploits are for sale on the black market. While there isn’t any proof that the NSA has been breached, there’s evidence to suspect that their exploits are available for purchase on the black market. This means that a willing hacker could get their hands on government-grade hacking tools--a dangerous concept.

0 Comments
Continue reading

Study: 95% of All Cyber Attacks are Financially Motivated

Study: 95% of All Cyber Attacks are Financially Motivated

Businesses need to take security into account and make it a priority. In fact, security is so important that Verizon has compiled a report of the various types of attacks and data breaches that occurred in the past year. This is Verizon’s Data Breach Investigations Report, or DBIR, and it offers insights into how you can protect your business and secure your assets.

0 Comments
Continue reading

Threat Spotlight: How to Stop Brute Force Attacks

Threat Spotlight: How to Stop Brute Force Attacks

Hackers of all shapes and sizes use brute force attacks to gain access into accounts and infrastructures, but do you know how they work and what your business can do to protect against them? Failing to understand brute force attacks could put sensitive information in the crosshairs of hackers, and leave it vulnerable to ongoing attacks.

0 Comments
Continue reading

Do You Agree with BYOD? 72 Percent of Businesses Do

Do You Agree with BYOD? 72 Percent of Businesses Do

Mobile devices have grown extraordinarily popular in the workplace. Organizations find them to be of considerable value for staying connected and getting work done while outside the office. This trend has presented a serious risk in the form of network and data security. How can businesses support mobile devices in the workplace, without compromising on the security of the device and the data it holds?

0 Comments
Continue reading

Newly Discovered Vulnerability Gives Reason to Worry for Every Windows User

Newly Discovered Vulnerability Gives Reason to Worry for Every Windows User

A vulnerability has been discovered that affects all versions of Microsoft’s Windows operating system, including the long-unsupported Windows XP, going all the way back to Windows 95. The vulnerability, called BadTunnel, allows attackers to directly bypass system defenses and initiate a man-in-the-middle attack. The vulnerability isn’t limited to just Windows, either; it also affects Internet Explorer, Edge, and other Microsoft software.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Network Security Microsoft User Tips Hackers Google Hosted Solutions Tech Term Software Malware Backup Internet Business Innovation Mobile Devices Data Backup Hardware Data Email Smartphones Data Recovery Small Business Smartphone Communications Business Continuity Android VoIP Workplace Tips Ransomware Communication Computer IT Services Router Managed IT Services Cloud Computing Disaster Recovery Productivity Network Cybersecurity Artificial Intelligence Browser Alert Chrome Windows 10 Outsourced IT Cybercrime Internet of Things Law Enforcement Windows 10 Applications Server IT Support Office 365 Business Management Efficiency Money Collaboration Windows Computers Password How To Miscellaneous Facebook Word Virtualization Passwords Mobile Device Information Holiday Gadgets Spam BDR Saving Money Wi-Fi Managed IT Services Social Media Telephone Systems Productivity Data Security Keyboard Microsoft Office BYOD Office Save Money Flexibility Apps Vulnerability Connectivity Operating System Managed Service Mobility Voice over Internet Protocol Government App Settings Mobile Device Management Two-factor Authentication Avoiding Downtime Social Engineering Data Protection Phishing Quick Tips Work/Life Balance Health Spam Blocking Scam Networking Content Management Entertainment IT Plan Remote Monitoring Google Docs Servers Private Cloud Paperless Office End of Support Comparison Blockchain Botnet Identity Theft Unsupported Software Website Remote Computing Telephony Managed IT Encryption Office Tips Infrastructure Windows 7 Public Cloud Machine Learning Human Resources Bring Your Own Device Virtual Assistant VPN Data Storage Upgrade Business Intelligence Data Breach Fraud Access Control Telephone System OneNote Employer-Employee Relationship IT Management Update Data Management Redundancy Software as a Service Legal Sports Bandwidth Automation CES HaaS Google Drive Workforce Recovery Knowledge Digital Signature Data loss Managing Stress Shortcuts Current Events Travel Best Practice Google Apps Tip of the week Augmented Reality Advertising USB Samsung Smart Office Microchip History Amazon Web Services Netflix Nanotechnology Internet Exlporer Trending Instant Messaging Downtime Big Data IT Support Remote Work webinar Practices Cryptocurrency Apple Smartwatch Recycling The Internet of Things Addiction Net Neutrality Network Congestion PDF Screen Mirroring Social Electronic Medical Records Workers Windows 10s Windows Server 2008 Remote Worker Value Search Engine IBM Online Shopping Virtual Reality Smart Tech HBO Experience Charger Root Cause Analysis Warranty Conferencing Hosted Computing Safe Mode iPhone Techology HIPAA eWaste FENG Cache Marketing FCC IT Consultant Cast HVAC Vendor Hacking Wiring Bing Supercomputer Evernote Worker Commute Outlook Internet exploMicrosoft Cleaning Specifications Wireless Internet Printer Wireless Credit Cards Battery Emails Inventory Software Tips Budget Scalability Criminal Skype Title II Black Market Leadership Enterprise Content Management Display Hiring/Firing Password Manager Automobile Solid State Drive Flash Devices Users Unified Threat Management Hybrid Cloud YouTube Help Desk Wireless Charging Frequently Asked Questions MSP Music Computer Care Search Staff Meetings Wire Mouse Education Content Start Menu Online Accountants Password Management Security Cameras Risk Management Business Mangement Audit Thought Leadership Mobile Computing Information Technology Firewall Company Culture Cortana Document Management Excel File Sharing Wearable Technology Millennials How to Administrator Patch Management Amazon Computing Infrastructure Authentication Physical Security Training Multi-Factor Security Audiobook Tools Telecommuting NIST Hacker Politics WiFi Video Games Gmail Computer Fan Sync Camera Save Time Regulation Vendor Management Television Bluetooth Printers Shadow IT Troubleshooting Transportation Books Public Computer Safety Wireless Technology Loyalty Benefits Managed Service Provider Worker Hosted Solution SaaS Smart Technology Business Owner Emergency Webinar Rootkit Employer Employee Relationship Two Factor Authentication IT solutions Compliance CrashOverride Content Filtering Assessment Computer Accessories Twitter