DatCom Blog

DatCom has been serving the Tyler area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Spot Three Forms of Phishing Attacks

How to Spot Three Forms of Phishing Attacks

One of the crazy things about hackers is that they will do whatever it takes to ensure that they steal as much information and sensitive data as possible. One of the more innovative ways that hackers spread threats is through spam. Unwanted messages have grown from simple annoyances, to the spread of unwanted software and malware, all the way to sophisticated attacks on targeted individuals known as phishing attacks. Do you have ways to secure your business?

0 Comments
Continue reading

Someone’s Trying To Phish You… Do You Play Along?

Someone’s Trying To Phish You… Do You Play Along?

Phishing scams have been popping up for years--their most infamous attack vector has even become a punchline: some long-lost relative stuck in a far-off country suddenly reaches out, offering riches, but only if so-much money is provided first. People from all walks of life have been duped by these scams, and while not all of them are this transparent, most are pretty easy to spot.

0 Comments
Continue reading

Study Finds Social Media Phishing Scams to Be the Most Dangerous

Study Finds Social Media Phishing Scams to Be the Most Dangerous

Ordinary fishing, where you hope for a simple-minded fish to latch onto your hook, relies on using a proper lure. The same can be said for the virtual method of phishing, where a hacker will use a similar type of “lure” to convince the target to bite. These phishing scams are especially useful for hackers who want to take advantage of social media to find new targets. A recent study has shown that this is a surprisingly effective method of phishing.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Hosted Solutions Network Security User Tips Google Hackers Microsoft Internet Software Productivity Tech Term Malware Business Email Innovation Workplace Tips Backup Mobile Devices Hardware Smartphones Data Communications Data Backup VoIP Cloud Computing Android Small Business Smartphone Data Recovery IT Services Business Continuity Efficiency Disaster Recovery Communication Ransomware Managed IT Services Windows 10 Router Cybersecurity Computer Windows 10 Alert Outsourced IT Internet of Things Cybercrime Windows IT Support Network Server Browser Business Management Artificial Intelligence Law Enforcement Chrome Money Collaboration Miscellaneous Gadgets Applications Mobile Device How To Office 365 Computers Password Word BDR Quick Tips Productivity Facebook Wi-Fi Passwords Telephone Systems Managed IT Services Spam Virtualization Information Holiday Saving Money Social Media Voice over Internet Protocol Mobility Data Security Two-factor Authentication Health Social Engineering Avoiding Downtime Data Protection Private Cloud Office Vulnerability Work/Life Balance Keyboard Operating System Settings Microsoft Office Mobile Device Management App BYOD Paperless Office Save Money Government Flexibility Connectivity Apps Encryption Managed Service Phishing Virtual Assistant Spam Blocking Automation Upgrade VPN Data Breach IT Plan Business Intelligence Fraud Access Control Telephone System Botnet Update Telephony Bandwidth Unsupported Software Data Management Software as a Service Windows 7 CES Legal Sports End of Support Scam Networking HaaS Augmented Reality Public Cloud Data Storage Remote Monitoring Content Management Office Tips Cryptocurrency Entertainment Meetings Google Docs Servers OneNote Net Neutrality Redundancy Employer-Employee Relationship IT Management Comparison Blockchain Identity Theft Website Remote Computing Infrastructure Bring Your Own Device Managed IT Google Drive Human Resources Machine Learning Credit Cards Inventory Digital Signage Knowledge Data loss Hiring/Firing Criminal Wireless Internet Worker Commute Printer Tip of the week Scalability Enterprise Content Management Display Downtime Password Manager Devices Battery Unified Threat Management Netflix Music Title II Computer Care The Internet of Things Wireless Charging Black Market MSP Business Technology webinar Staff YouTube Automobile Help Desk Firewall Search Google Search Advertising Network Congestion Screen Mirroring Risk Management Wire Mouse Windows 10s Windows Server 2008 Password Management Content Security Cameras Internet Exlporer Root Cause Analysis Business Mangement Thought Leadership Education Mobile Computing HBO Wearable Technology Online Accountants Apple FENG Patch Management Cortana File Sharing Conferencing Millennials Training Company Culture Amazon Authentication How to Proactive IT IT Consultant Cast Politics Multi-Factor Security Document Management Administrator NIST Audiobook Hacker WiFi Gmail Current Events Computing Infrastructure Camera Outlook USB Telecommuting Samsung Managing Stress Shortcuts iPhone Techology Skype Travel Google Apps Marketing Emails Software Tips Workforce Digital Signature Video Games Solid State Drive Flash Big Data Amazon Web Services Nanotechnology Recovery ISP Leadership Trending Best Practice Smart Office Save Time Microchip Practices Instant Messaging Smartwatch Internet exploMicrosoft Electronic Medical Records Recycling History Addiction Frequently Asked Questions Remote Work Value Social Start Menu Workers IBM IT Support Remote Worker Wireless Experience Charger PDF Audit Online Shopping Smart Tech Cryptomining Users Hybrid Cloud HIPAA Search Engine Hosted Computing Safe Mode Employee eWaste Cache Virtual Reality Warranty Excel HVAC Vendor Tools Supercomputer Wiring Physical Security FCC Cleaning Computer Fan Sync Evernote Database Information Technology Budget Specifications Hacking Bing Hosted Solution SaaS Smart Technology Emergency Rootkit Employer Employee Relationship Business Owner Two Factor Authentication Content Filtering Assessment Compliance Computer Accessories Twitter Vendor Management Television Regulation Bluetooth Safety Printers Troubleshooting Managed Service Provider Transportation Biometric Security Webinar Books Public Computer Shadow IT Loyalty CrashOverride Benefits IT solutions Worker Wireless Technology