DatCom Blog

DatCom has been serving the Tyler area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Understanding the New NIST Guidelines for Password Security

Understanding the New NIST Guidelines for Password Security

The National Institute for Standards and Technology (NIST) has released Special Publication 800-63B, titled Digital Identity Guidelines. The document outlines major changes to the ways password security should be approached and leaves a lot of what network administrators and software developers have implemented recently to be wrong Today, we’ll take a look at the publication, and try to make sense of the sudden change of course.

0 Comments
Continue reading

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

0 Comments
Continue reading

These Innovative Technologies are Helping eBay Move Beyond Passwords

These Innovative Technologies are Helping eBay Move Beyond Passwords

Technology continues to grow more advanced, and with it comes major pain points that need to be resolved. Today’s modern businesses will need to adapt by implementing new solutions for both themselves and their customers or clients. In this fashion, eBay has begun to implement an assortment of new features to assist with the customer experience.

0 Comments
Continue reading

Warning: It’s Now a Crime to Share Your Netflix Password

Warning: It’s Now a Crime to Share Your Netflix Password

“What’re you in for?” a prison inmate asks. “I shared my Netflix password with my sister,” you say. This conversation might be absurd, but according to a recent ruling in accordance with the Computer Fraud and Abuse Act, it’s one that could actually happen. Now, sharing your Netflix password to let someone catch up on their favorite TV show can be considered a federal offense.

0 Comments
Continue reading

Mark Zuckerberg’s Recent Password Blunder is an All-Too-Common Problem

Mark Zuckerberg’s Recent Password Blunder is an All-Too-Common Problem

In a recent hack attack, Twitter had 33 million user login credentials stolen. This is unfortunate, but not surprising; an incident like this routinely makes the headlines. Although, what is surprising is what this hack reveals about people’s poor password security habits.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Network Security Hosted Solutions User Tips Google Microsoft Hackers Internet Productivity Software Malware Tech Term Workplace Tips Business Email Innovation Mobile Devices Backup Data Data Backup Smartphones Communications Hardware VoIP Android Data Recovery Small Business Smartphone IT Services Efficiency Business Continuity Cloud Computing Ransomware Cybersecurity Router Computer Communication Managed IT Services Windows 10 Disaster Recovery Artificial Intelligence Network Server Business Management Browser Internet of Things Chrome IT Support Alert Outsourced IT Law Enforcement Cybercrime Windows Windows 10 Miscellaneous How To Applications Mobile Device Office 365 Gadgets Money Collaboration Computers Password Quick Tips Productivity Facebook Information Passwords Virtualization Word Holiday Operating System BDR Spam Saving Money Social Media Managed IT Services Wi-Fi Telephone Systems Mobile Device Management Work/Life Balance Health Keyboard Paperless Office Encryption Office Microsoft Office Private Cloud Phishing Connectivity BYOD Voice over Internet Protocol Save Money Managed Service Data Security Flexibility Apps Two-factor Authentication Government App Mobility Data Protection Vulnerability Social Engineering Avoiding Downtime Settings OneNote Net Neutrality Redundancy Employer-Employee Relationship IT Management HaaS Comparison Blockchain Cryptocurrency Identity Theft Scam Networking Website Servers Entertainment Infrastructure Remote Monitoring Google Drive Human Resources End of Support Spam Blocking Upgrade Machine Learning VPN Virtual Assistant Office Tips Remote Computing Public Cloud IT Plan Business Intelligence Fraud Access Control Managed IT Bring Your Own Device Botnet Update Telephone System Telephony Unsupported Software CES Windows 7 Data Breach Software as a Service Sports Data Management Data Storage Content Management Bandwidth Augmented Reality Automation Meetings Google Docs Legal ISP Start Menu Audiobook Workers Politics Smart Office Microchip Computing Infrastructure PDF Audit Video Games Online Shopping Smart Tech Current Events Addiction Advertising USB Samsung Smartwatch Hosted Computing Remote Worker Internet Exlporer Recovery eWaste Social Excel Best Practice Save Time Apple Cryptomining Tools Instant Messaging Search Engine Physical Security History FCC Big Data Computer Fan Sync Evernote Electronic Medical Records Cache Warranty IT Support Specifications Value Safe Mode Employee Credit Cards Inventory IBM Wiring Knowledge Data loss Criminal Experience Charger HVAC Vendor Tip of the week iPhone Database Techology Downtime Password Manager HIPAA Marketing Bing Netflix Virtual Reality Title II Digital Signage The Internet of Things Wireless Charging Wireless Internet Printer webinar Staff Hacking Supercomputer Devices Unified Threat Management Internet exploMicrosoft Network Congestion Screen Mirroring Cleaning Enterprise Content Management Display Windows 10s Windows Server 2008 MSP Business Technology Root Cause Analysis Business Mangement Budget YouTube Help Desk Wireless HBO Worker Commute Online Accountants Google Search FENG Scalability Cortana Hiring/Firing Wire Users Mouse Hybrid Cloud Conferencing Battery Millennials Automobile Amazon Authentication Thought Leadership Mobile Computing IT Consultant Cast Black Market Multi-Factor Security Music Computer Care Password Management Security Cameras Telecommuting File Sharing Search WiFi Gmail Company Culture Outlook Proactive IT Skype Content Travel Google Apps Risk Management Administrator Information Technology Emails Software Tips Education Workforce Digital Signature Firewall Amazon Web Services Nanotechnology Camera Leadership Trending Wearable Technology NIST Hacker Solid State Drive Flash Remote Work Practices Patch Management How to Recycling Training Managing Stress Shortcuts Frequently Asked Questions Document Management Regulation Computer Accessories Webinar Content Filtering Assessment Printers Vendor Management CrashOverride Bluetooth IT solutions Television Troubleshooting Transportation Shadow IT Books Public Computer Safety Loyalty Benefits Wireless Technology Managed Service Provider Worker Hosted Solution SaaS Smart Technology Emergency Rootkit Business Owner Compliance Biometric Security Employer Employee Relationship Two Factor Authentication Twitter