DatCom Blog

DatCom has been serving the Tyler area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

5 Security Analogies to Help You Better Understand Hacking

5 Security Analogies to Help You Better Understand Hacking

How often do you read a blog article about network security only to be blown away by all of the overly complicated and confusing jargon of the industry? We know that it’s not necessarily your specialty, but it’s still important that you understand how network security works for your organization. While the complicated details should be left to IT professionals, we can help you better understand the general idea of security by comparing it to a locked door.

0 Comments
Continue reading

Would Your Users be Tricked by Social Engineering?

Would Your Users be Tricked by Social Engineering?

The term social engineering may not seem nearly as intimidating as other cybersecurity terms like ransomware or denial of service. Don’t be deceived! Some of the biggest threats to your company’s data and network security use social engineering to manipulate targets into taking a specific action - like disclosing personal information that can be stolen and exploited.

0 Comments
Continue reading

Tip of the Week: Ways to Be Active and Proactive With Your Network Security

Tip of the Week: Ways to Be Active and Proactive With Your Network Security

Security troubles have many causes, but the only way to protect your business from any of them is to implement a comprehensive enterprise-level security solution. There are two other ways that you can work to protect your business, implementing software patches, and avoiding social engineering attempts.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Network Security Business Computing User Tips Microsoft Google Hackers Hosted Solutions Tech Term Software Malware Backup Internet Business Data Backup Innovation Data Hardware Mobile Devices Email Smartphones VoIP Android Data Recovery Small Business Smartphone Communications Workplace Tips Business Continuity Ransomware Cloud Computing Router Communication Managed IT Services Computer Disaster Recovery IT Services Alert Network Outsourced IT Cybercrime Artificial Intelligence Productivity Windows 10 Law Enforcement Cybersecurity Browser Windows 10 Chrome How To Money Collaboration Windows Server IT Support Miscellaneous Applications Internet of Things Computers Password Business Management Office 365 Efficiency Facebook BDR Passwords Word Managed IT Services Telephone Systems Wi-Fi Information Gadgets Spam Saving Money Virtualization Social Media Mobile Device Holiday Productivity Mobility Phishing Office Social Engineering Data Security Avoiding Downtime Operating System Voice over Internet Protocol Work/Life Balance Connectivity Keyboard Vulnerability Government App Managed Service Two-factor Authentication Microsoft Office Save Money BYOD Settings Data Protection Mobile Device Management Flexibility Apps Quick Tips Sports Health Content Management Data Breach Google Drive Google Docs Spam Blocking Private Cloud Comparison Blockchain End of Support Website Servers Bandwidth Data Management Identity Theft IT Plan Paperless Office Legal Encryption Office Tips Infrastructure Public Cloud Human Resources Botnet Scam Networking Telephony Unsupported Software HaaS Machine Learning Windows 7 VPN Remote Monitoring Upgrade Business Intelligence Virtual Assistant Entertainment Fraud Access Control Data Storage Update Telephone System CES OneNote Remote Computing Automation Software as a Service Bring Your Own Device Redundancy Employer-Employee Relationship IT Management Managed IT Administrator Excel Worker Commute Workforce Digital Signature Hiring/Firing Travel Google Apps Advertising Battery Trending NIST Hacker Tools Scalability Amazon Web Services Nanotechnology Internet Exlporer Camera Music Computer Care Physical Security Recycling Managing Stress Shortcuts Computer Fan Sync Automobile Remote Work Practices Apple Augmented Reality Black Market Smart Office Microchip Firewall Tip of the week Net Neutrality PDF Risk Management Knowledge Data loss Search Workers Education Cryptocurrency Downtime Content Online Shopping Smart Tech Addiction Wearable Technology Netflix eWaste Marketing Social Patch Management The Internet of Things Hosted Computing iPhone Techology Remote Worker Training webinar Search Engine Windows 10s Windows Server 2008 Document Management FCC Politics Network Congestion Screen Mirroring How to HBO Computing Infrastructure Specifications Safe Mode Current Events Root Cause Analysis Audiobook Evernote Internet exploMicrosoft Cache Warranty USB Samsung Criminal Wireless HVAC Vendor FENG Video Games Credit Cards Inventory Wiring Conferencing Hybrid Cloud Bing Big Data Best Practice Title II IT Consultant Cast Recovery Password Manager Users Value Outlook History Staff Electronic Medical Records Instant Messaging Wireless Charging Wireless Internet Printer Enterprise Content Management Display IBM Skype Devices Unified Threat Management Experience Charger Emails Software Tips IT Support Information Technology YouTube Help Desk Solid State Drive Flash Online Accountants MSP HIPAA Leadership Business Mangement Mouse Frequently Asked Questions Virtual Reality Millennials Meetings Cortana Wire Multi-Factor Security Password Management Security Cameras Supercomputer Start Menu Amazon Authentication Thought Leadership Mobile Computing Cleaning Company Culture Audit Hacking Telecommuting File Sharing Budget WiFi Gmail Hosted Solution SaaS Compliance Smart Technology CrashOverride Twitter IT solutions Emergency Rootkit Business Owner Regulation Employer Employee Relationship Smartwatch Two Factor Authentication Printers Content Filtering Assessment Safety Computer Accessories Managed Service Provider Vendor Management Television Save Time Bluetooth Troubleshooting Transportation Books Public Computer Shadow IT Loyalty Benefits Webinar Wireless Technology Worker