DatCom Blog

DatCom has been serving the Tyler area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What is Encryption, Anyways?

What is Encryption, Anyways?

You hear about encryption being used all the time, almost to the point of it being synonymous with security, but what does it really mean to have encryption on your business’ data and devices? We’ll walk you through how encryption can help you in your day-to-day struggle to secure the integrity of your organization’s communication and infrastructure.

0 Comments
Continue reading

Don’t Be Fooled When Scammers Threaten to Spill a Dirty Little Secret

Don’t Be Fooled When Scammers Threaten to Spill a Dirty Little Secret

What would you do if a stranger claimed to have compromising webcam footage of you and threatened to share it with your contacts? A new, very convincing email scam is making some users very nervous.

0 Comments
Continue reading

Using a QR Code to Log In

Using a QR Code to Log In

Passwords are still an incredibly valuable part of security, but it’s becoming quite difficult to maximize network security through passwords alone. Even if you somehow manage to sell the idea of network security to your staff, whether or not they follow through is another thing entirely. It’s critical that you make it as easy as possible for your employees to stay secure, and that’s where scannable QR codes come in.

0 Comments
Continue reading

Encryption Helps Keep your Smartphone Secure

Encryption Helps Keep your Smartphone Secure

These days everyone has a smartphone; and, they can do some pretty incredible things. One place that the average smartphone may seem to be a little loose is in the arena of data security. Today’s smartphones do, in fact, come with encryption by default, so there is some semblance of device security on every device. What does this mean? We’ll break it down.

0 Comments
Continue reading

Preventing Identity Theft Should be a Priority, But Do You Know How to Handle It?

Preventing Identity Theft Should be a Priority, But Do You Know How to Handle It?

The more people use technology, the more they have to deal with the negative aspects of doing so. One of the most prevalent problems users experience today is cybercrime that leads to identity theft. What can you do to prevent this from happening to you?

0 Comments
Continue reading

Tip of the Week: ‘Secure’ Browsing Doesn’t Mean ‘Private’

Tip of the Week: ‘Secure’ Browsing Doesn’t Mean ‘Private’

Internet browsers, by in large, provide enough security for the average user to come out unscathed. Nowadays, people deal with many more threats than they once did, but by in large, users stay secure when using today’s most popular browsers. Privacy, however, is a whole different matter.

0 Comments
Continue reading

Do You Use 2FA? If So, You’re in the Minority

Do You Use 2FA? If So, You’re in the Minority

Two-factor authentication, also known as 2FA, is a very beneficial addition to consider for your cybersecurity. However, a research study unearthed a few surprising takeaways that indicate that 2FA may not be adopted as much as one might expect it to be.

0 Comments
Continue reading

Would Your Users be Tricked by Social Engineering?

Would Your Users be Tricked by Social Engineering?

The term social engineering may not seem nearly as intimidating as other cybersecurity terms like ransomware or denial of service. Don’t be deceived! Some of the biggest threats to your company’s data and network security use social engineering to manipulate targets into taking a specific action - like disclosing personal information that can be stolen and exploited.

0 Comments
Continue reading

Boosting Your Security Only Takes Another Layer of Authentication

Boosting Your Security Only Takes Another Layer of Authentication

Data breaches are so common nowadays that you’re lucky not to see one in the breaking news section of any news outlet. How is your business preparing for the inevitable data breach of intellectual properly and sensitive information? You need to start considering preventative measures, like two-factor authentication, to keep your data secure.

0 Comments
Continue reading

Google Is Increasing Security For High-Risk Users

Google Is Increasing Security For High-Risk Users

Wouldn’t it be great if you could take advantage of a built-in security feature that could lock down your Google services in the event of a potential data breach? Thanks to attacks on high-profile users, Google is now offering this service to those who are at considerable risk of having their accounts hacked. This type of advanced service, called the Advanced Protection Program, is only available to a select few, but it promises to assist in the challenge of protecting sensitive information.

0 Comments
Continue reading

Tip of the Week: The Holidays Can Be A Time Of Work And Play, Even While Traveling

Tip of the Week: The Holidays Can Be A Time Of Work And Play, Even While Traveling

The holidays are approaching, whether we are ready for them or not. With the holidays comes time off, which means that it’s awfully easy to fall behind post-vacation. Another concern is the amount of identity theft and credit card fraud that comes about during this time of year. We’ll discuss some of the many ways that your organization can take advantage of technology this holiday season without putting yourself in harm’s way.

0 Comments
Continue reading

Tip of the Week: Make Facebook More Private By Enabling the Follow Feature

Tip of the Week: Make Facebook More Private By Enabling the Follow Feature

While it’s a security best practice to keep strangers off of your Facebook account, you might feel that it’s understandable to accept an unknown request for the sake of networking or otherwise. This isn’t the ideal way to approach Facebook, but you do have a unique opportunity to allow users to view your profile and follow your public posts, without the need to accept a friend request.

0 Comments
Continue reading

Don’t Worry, Your Samsung Phone “Winking” at You is Just a Cool Feature

Don’t Worry, Your Samsung Phone “Winking” at You is Just a Cool Feature

If you’re a Samsung smartphone user, have you ever seen a little eyeball symbol appear at the top of the screen? You might notice that it will show up for a minute, and then disappear again. Since this kind of activity usually makes users question what’s going on with their device, let’s get down to the bottom of this weird occurrence.

0 Comments
Continue reading

Alert: New ATM Scam Can Steal 32,000 Card Numbers Per Machine

Alert: New ATM Scam Can Steal 32,000 Card Numbers Per Machine

Banks and companies that manage automated teller machines, better known as ATMs, have been warned against another method thieves have been utilizing to commit identity theft--by no less than the Secret Service.

0 Comments
Continue reading

According to FBI Director, Privacy is a Misnomer

According to FBI Director, Privacy is a Misnomer

There’s an ongoing debate concerning whether the United States Constitution gives the American government the right to access data held on electronic devices by its citizens. In case they didn’t make themselves heard clearly enough, the director of the FBI, James Comey, has released a statement at Symantec’s Annual Government Symposium. You might not like his answer.

0 Comments
Continue reading

According to Hackers, Windows 10 Security Passes the Test

According to Hackers, Windows 10 Security Passes the Test

Windows is perhaps the most common workplace computing tool, and hackers have been trying for decades to uncover holes in its security. In some cases, like with unsupported operating systems, they’ve succeeded. However, Microsoft’s latest addition to their OS family, Windows 10, seems to have exceptionally potent built-in security measures, many of which have the hackers at the Black Hat conference scratching their heads and scrambling to find threats to talk about.

0 Comments
Continue reading

MasterCard Wants Your Selfie, But it’s Not for What You Think it’s For

MasterCard Wants Your Selfie, But it’s Not for What You Think it’s For

Payment via mobile devices is still a relatively new concept. With newer smartphones, it’s now easier than ever to pay your bills or send money on a whim. However, this also brings up an important topic; what’s the best way to handle mobile payments, and how can those who accept and process these payments ensure maximum security?

0 Comments
Continue reading

For NATO, Cyberspace is Today’s Frontlines

For NATO, Cyberspace is Today’s Frontlines

It’s clear that security professionals have waged war with hackers since the Internet’s inception, but NATO has reaffirmed that cybersecurity is not just a localized problem; it’s a nation-state-wide issue, and one that needs to be addressed. Just like land, air, and sea, cyberspace is now an operational domain, a place that can be considered a battlefield.

0 Comments
Continue reading

Couple Jailed for Scamming More Than a Couple Dollars From the IRS

Couple Jailed for Scamming More Than a Couple Dollars From the IRS

It all goes to show: don’t mess with the IRS. The prison system has two new residents, after Anthony Alika, 42, and his wife Sonia, 27, were sentenced for filing fraudulent tax returns through the often-exploited “Get Transcript” site maintained by the Internal Revenue Service. In addition to their incarceration, the Alikas will each be responsible to pay restitution to the IRS.

0 Comments
Continue reading

Warning: It’s Now a Crime to Share Your Netflix Password

Warning: It’s Now a Crime to Share Your Netflix Password

“What’re you in for?” a prison inmate asks. “I shared my Netflix password with my sister,” you say. This conversation might be absurd, but according to a recent ruling in accordance with the Computer Fraud and Abuse Act, it’s one that could actually happen. Now, sharing your Netflix password to let someone catch up on their favorite TV show can be considered a federal offense.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Hosted Solutions Network Security Google User Tips Microsoft Hackers Internet Tech Term Software Productivity Malware Workplace Tips Hardware Business Email Innovation Mobile Devices Backup Data Backup Data Smartphones Communications VoIP Android Efficiency Small Business Data Recovery Cloud Computing IT Services Smartphone Business Continuity Ransomware Network Communication Computer Router Managed IT Services Windows 10 Cybersecurity Disaster Recovery Chrome Server IT Support Artificial Intelligence Alert Outsourced IT Cybercrime Windows Internet of Things Law Enforcement Business Management Browser Windows 10 How To Miscellaneous Applications Mobile Device Office 365 Gadgets Money Collaboration Computers Password Quick Tips Productivity Phishing Facebook BDR Word Passwords Virtualization Holiday Telephone Systems Operating System Spam Information Saving Money Social Media Wi-Fi Managed IT Services Work/Life Balance Health Microsoft Office Data Security Private Cloud BYOD Office Save Money Social Engineering Flexibility Apps Encryption Vulnerability Keyboard Mobility Voice over Internet Protocol Government App Paperless Office Connectivity Settings Two-factor Authentication Managed Service Avoiding Downtime Mobile Device Management Data Protection Automation CES HaaS Bring Your Own Device Telephone System Google Drive Entertainment Spam Blocking Content Management Google Docs Data Breach Software as a Service Net Neutrality IT Plan Sports End of Support Comparison Blockchain Remote Computing Botnet Identity Theft Augmented Reality Website Bandwidth Public Cloud Unsupported Software Managed IT Office Tips Infrastructure Telephony Human Resources Cryptocurrency Windows 7 Scam Networking Servers Remote Monitoring VPN Upgrade Business Intelligence Data Storage Meetings Fraud Access Control Update Machine Learning OneNote Data Management Virtual Assistant Employer-Employee Relationship IT Management Legal Redundancy Audiobook Amazon Cleaning Authentication Devices Unified Threat Management Excel Computing Infrastructure Multi-Factor Security Supercomputer Enterprise Content Management Display Budget Telecommuting MSP Business Technology Physical Security WiFi Gmail YouTube Help Desk Video Games Tools Workforce Hiring/Firing Digital Signature Google Search Recovery Travel Google Apps Wire Mouse Computer Fan Best Practice Sync Save Time Advertising Knowledge Data loss Instant Messaging Music Amazon Web Services Computer Care Nanotechnology Thought Leadership Mobile Computing History Tip of the week Internet Exlporer Trending Password Management Security Cameras Downtime Remote Work Practices File Sharing Netflix IT Support Apple Recycling Company Culture Risk Management PDF Proactive IT webinar Firewall Workers Administrator The Internet of Things Hacker Network Congestion Screen Mirroring Wearable Technology Online Shopping Smart Tech Camera Windows 10s Windows Server 2008 Virtual Reality NIST Root Cause Analysis Marketing Training Hosted Computing HBO iPhone Techology Patch Management eWaste Managing Stress Shortcuts Politics FCC ISP Conferencing Smart Office Microchip FENG Hacking Current Events Smartwatch IT Consultant Cast USB Evernote Samsung Addiction Worker Commute Internet exploMicrosoft Specifications Scalability Wireless Credit Cards Inventory Remote Worker Outlook Battery Criminal Social Users Hybrid Cloud Title II Cryptomining Emails Software Tips Black Market Big Data Password Manager Search Engine Skype Automobile Electronic Medical Records Staff Safe Mode Employee Leadership Search Wireless Charging Value Cache Warranty Solid State Drive Flash Content Experience Charger Wiring Frequently Asked Questions Education IBM HVAC Vendor Information Technology HIPAA Online Accountants Database Business Mangement Bing Biometric Security Start Menu Millennials Digital Signage How to Cortana Wireless Internet Printer Audit Document Management Benefits Worker IT solutions CrashOverride Hosted Solution SaaS Smart Technology Rootkit Emergency Employer Employee Relationship Compliance Shadow IT Twitter Two Factor Authentication Computer Accessories Regulation Safety Content Filtering Assessment Wireless Technology Printers Vendor Management Managed Service Provider Bluetooth Television Troubleshooting Business Owner Transportation Webinar Books Public Computer Loyalty