DatCom Blog

DatCom has been serving the Tyler area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Microsoft Launches Office 365 Advanced Threat Protection

Microsoft Launches Office 365 Advanced Threat Protection

Microsoft has been at the forefront of security through their numerous operating systems for decades. As the security of computing systems and communication gets more important, and with threats to that security growing exponentially, the world’s leading software company has made it a point to introduce a new security platform to help people in many walks of life keep their endeavors secure. Today we’ll look at the new security & compliance services that are bundled with the Microsoft 365 cloud platform.

0 Comments
Continue reading

A Brief Dive into Digital Signatures

A Brief Dive into Digital Signatures

Think for a minute the power a signature has. Signatures have started and ended wars, they have committed whole nations of people to rule of law, and they are attached to birth and death. For the individual, the signature is one of the most powerful possessions. You can use it to acquire money, property, and transportation. You use it to enter agreements and to end agreements. With so much importance squarely focused on the signature, it seems curious how people today are now signing documents digitally; but, with the security behind this solution, people won’t have to be on hand to sign with theirs.

0 Comments
Continue reading

Tip of the Week: Seven Extensions to Add to Chrome

Tip of the Week: Seven Extensions to Add to Chrome

Google Chrome is the most popular web browser in the world, and for good reason. The browser has many useful features, largely due to the user’s ability to install ‘extensions’--applications that add to the browser’s functionality or the user’s experience. Once an extension is added to the browser’s toolbar, it is ready for the user to use whenever they need.

0 Comments
Continue reading

Security Terms That Every User Needs To Know

Security Terms That Every User Needs To Know

Chances are that you’ve seen quite a lot of stories on the Internet, or in the news, about the many security threats out there. Some of these, including ransomware, exploits, and reluctance to update software, might fly over your head if they’re not part of your everyday business vocabulary. Knowing what these terms mean is of the utmost importance in today’s workplace. We’re here to help you understand what some of these security terms mean for your organization.

0 Comments
Continue reading

Companies that Neglect Updating Web Browsers 2x as Likely to Suffer Data Breach, Study Finds

Companies that Neglect Updating Web Browsers 2x as Likely to Suffer Data Breach, Study Finds

Business has become such a competitive endeavor that those who deprive themselves of the latest and greatest technology solutions could be at a serious disadvantage--namely in terms of productivity and security. A new study shows that there is a direct relationship between businesses that run older versions of operating systems and web browsers, and businesses that fall victim to data breaches.

0 Comments
Continue reading

Don’t Worry, Your Samsung Phone “Winking” at You is Just a Cool Feature

Don’t Worry, Your Samsung Phone “Winking” at You is Just a Cool Feature

If you’re a Samsung smartphone user, have you ever seen a little eyeball symbol appear at the top of the screen? You might notice that it will show up for a minute, and then disappear again. Since this kind of activity usually makes users question what’s going on with their device, let’s get down to the bottom of this weird occurrence.

0 Comments
Continue reading

What Your Software Has in Common With the Food in Your Fridge? An (EOL) End of Life Date

What Your Software Has in Common With the Food in Your Fridge? An (EOL) End of Life Date

It’s a well-known fact that nothing in this world lasts forever (other than Twinkies), and this pertains to your technology more than perhaps anything else. The same solutions that you’ve been working with for years will also need regular updates and improvements in order to stay relevant to your organization.

0 Comments
Continue reading

Outdated Software Puts Voters Personal Information at Risk

Outdated Software Puts Voters Personal Information at Risk

As the U.S. election rapidly approaches, many citizens are strongly concerned with who they’ll vote for. Unfortunately, not enough of these same citizens are nearly as concerned with what they’ll vote on, as the electronic voting machines utilized in many polling places are notoriously insecure to breaches.

0 Comments
Continue reading

Newly Discovered Vulnerability Gives Reason to Worry for Every Windows User

Newly Discovered Vulnerability Gives Reason to Worry for Every Windows User

A vulnerability has been discovered that affects all versions of Microsoft’s Windows operating system, including the long-unsupported Windows XP, going all the way back to Windows 95. The vulnerability, called BadTunnel, allows attackers to directly bypass system defenses and initiate a man-in-the-middle attack. The vulnerability isn’t limited to just Windows, either; it also affects Internet Explorer, Edge, and other Microsoft software.

0 Comments
Continue reading

3 Talk-to-Text Apps that Get the Job Done

3 Talk-to-Text Apps that Get the Job Done

Mobile platforms have given way to entirely new ways to develop and make use of apps. More business professionals than ever before are relying on their smartphones to get work done while out of the office, but the functionality of the on-screen keyboard interface has some of them stumped on how to stay productive. It’s for this reason that developers have created applications designed to listen to users’ voices, and record them in text format.

0 Comments
Continue reading

The Vast Majority of Business Owners that Try Cloud Services Don’t Look Back

The Vast Majority of Business Owners that Try Cloud Services Don’t Look Back

Your business’s productivity suite, be it Google Apps for Work or Microsoft Office 365, is a critical component for your success. These services, when implemented in the cloud, can be major game-changers, and it’s thanks to the convenience of mobile data and application access that have led to such vigor in the development of the cloud.

0 Comments
Continue reading

A Checklist of 40 Microsoft Software Titles Reaching End of Life/Extended Support in July 2016

A Checklist of 40 Microsoft Software Titles Reaching End of Life/Extended Support in July 2016

What kind of Microsoft products does your business use on a regular basis? If you can’t answer this question, you could be in trouble when it comes time to update your crucial applications and operating systems. This is a necessary part of working with technology; if your software can’t be considered secure, you need to upgrade to a more recent, better-functioning tool, or find yourself in a dangerous situation.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Hosted Solutions Network Security User Tips Google Hackers Microsoft Internet Software Productivity Tech Term Malware Business Email Innovation Workplace Tips Backup Mobile Devices Hardware Smartphones Data Communications Data Backup VoIP Cloud Computing Android Small Business Smartphone Data Recovery IT Services Business Continuity Efficiency Disaster Recovery Communication Ransomware Managed IT Services Windows 10 Router Cybersecurity Computer Windows 10 Alert Outsourced IT Internet of Things Cybercrime Windows IT Support Network Server Browser Business Management Artificial Intelligence Law Enforcement Chrome Money Collaboration Miscellaneous Gadgets Applications Mobile Device How To Office 365 Computers Password Word BDR Quick Tips Productivity Facebook Wi-Fi Passwords Telephone Systems Managed IT Services Spam Virtualization Information Holiday Saving Money Social Media Voice over Internet Protocol Mobility Data Security Two-factor Authentication Health Social Engineering Avoiding Downtime Data Protection Private Cloud Office Vulnerability Work/Life Balance Keyboard Operating System Settings Microsoft Office Mobile Device Management App BYOD Paperless Office Save Money Government Flexibility Connectivity Apps Encryption Managed Service Phishing Virtual Assistant Spam Blocking Automation Upgrade VPN Data Breach IT Plan Business Intelligence Fraud Access Control Telephone System Botnet Update Telephony Bandwidth Unsupported Software Data Management Software as a Service Windows 7 CES Legal Sports End of Support Scam Networking HaaS Augmented Reality Public Cloud Data Storage Remote Monitoring Content Management Office Tips Cryptocurrency Entertainment Meetings Google Docs Servers OneNote Net Neutrality Redundancy Employer-Employee Relationship IT Management Comparison Blockchain Identity Theft Website Remote Computing Infrastructure Bring Your Own Device Managed IT Google Drive Human Resources Machine Learning Credit Cards Inventory Digital Signage Knowledge Data loss Hiring/Firing Criminal Wireless Internet Worker Commute Printer Tip of the week Scalability Enterprise Content Management Display Downtime Password Manager Devices Battery Unified Threat Management Netflix Music Title II Computer Care The Internet of Things Wireless Charging Black Market MSP Business Technology webinar Staff YouTube Automobile Help Desk Firewall Search Google Search Advertising Network Congestion Screen Mirroring Risk Management Wire Mouse Windows 10s Windows Server 2008 Password Management Content Security Cameras Internet Exlporer Root Cause Analysis Business Mangement Thought Leadership Education Mobile Computing HBO Wearable Technology Online Accountants Apple FENG Patch Management Cortana File Sharing Conferencing Millennials Training Company Culture Amazon Authentication How to Proactive IT IT Consultant Cast Politics Multi-Factor Security Document Management Administrator NIST Audiobook Hacker WiFi Gmail Current Events Computing Infrastructure Camera Outlook USB Telecommuting Samsung Managing Stress Shortcuts iPhone Techology Skype Travel Google Apps Marketing Emails Software Tips Workforce Digital Signature Video Games Solid State Drive Flash Big Data Amazon Web Services Nanotechnology Recovery ISP Leadership Trending Best Practice Smart Office Save Time Microchip Practices Instant Messaging Smartwatch Internet exploMicrosoft Electronic Medical Records Recycling History Addiction Frequently Asked Questions Remote Work Value Social Start Menu Workers IBM IT Support Remote Worker Wireless Experience Charger PDF Audit Online Shopping Smart Tech Cryptomining Users Hybrid Cloud HIPAA Search Engine Hosted Computing Safe Mode Employee eWaste Cache Virtual Reality Warranty Excel HVAC Vendor Tools Supercomputer Wiring Physical Security FCC Cleaning Computer Fan Sync Evernote Database Information Technology Budget Specifications Hacking Bing Hosted Solution SaaS Smart Technology Emergency Rootkit Employer Employee Relationship Business Owner Two Factor Authentication Content Filtering Assessment Compliance Computer Accessories Twitter Vendor Management Television Regulation Bluetooth Safety Printers Troubleshooting Managed Service Provider Transportation Biometric Security Webinar Books Public Computer Shadow IT Loyalty CrashOverride Benefits IT solutions Worker Wireless Technology