In last week’s edition of the DatCom Business Briefing, we explained how the tech skills gap is one of the greatest cybersecurity threats. If a business lacks people who understand the technology they use, it makes your business more susceptible to malware attacks and data breaches. This week, we will discuss the high costs of technology complexity in operating a... Read More
- Written by Tom Baum
- Published: 31 Mar 2017

In today’s business world, having a reliable way to access your data is key to your company’s success. Everything you do depends on the data you have at your disposal–so what would you do if that data was no longer available to you?
- Written by Tom Baum
- Published: 27 Mar 2017

When it comes to solving crime few are as well renowned as Sherlock Holmes. However, now Watson is stepping forward to strike back against cyber criminals–but not Dr. Watson, Holmes’ faithful companion. Instead, we’re referring to Watson, IBM’s renowned supercomputer.
- Written by Tom Baum
- Published: 24 Mar 2017

There are right ways and wrong ways to do many things, and managing IT is no exception. Many businesses, especially small ones, are left susceptible to issues and vulnerabilities in their network. What’s worse, these are often networks that are supported by an IT “expert.”
- Written by Tom Baum
- Published: 22 Mar 2017

The next time you look at your device’s available Wi-Fi connections when in public, take a look at what some of the local connection names are. Chances are that you’ll see some names that match a nearby organization or family. Others might still be using the default SSID, like Linksys/Netgear-something-or-other. Others might get a little
- Written by Tom Baum
- Published: 20 Mar 2017

The police exist to serve, protect, and enforce the law, but who can we turn to if even the cops are made victim of a cyberattack? This is the question the residents of Cockrell, Texas have to answer, as their police department fell victim to a ransomware attack known as the Osiris Ransomware.
- Written by Tom Baum
- Published: 17 Mar 2017

Efficient utility software deployment has been a priority for businesses for much of the past three decades, but today’s software developers are beginning to more frequently offer their titles as a service, giving end users the ability to utilize powerful software solutions from anywhere, for what is often a reasonable monthly payment. The dissemination of
- Written by Tom Baum
- Published: 15 Mar 2017

Can’t find your mobile device? If you’ve taken precautions and enabled solutions designed to track the whereabouts of your device, then you’ve got no reason to panic. Of course, hindsight is 20/20, so you’ll want to make sure you activate a phone-finding solution now (while you’ve got your device in your sights).
- Written by Tom Baum
- Published: 13 Mar 2017

By now you’ve heard of self-driving cars insofar that you understand that there are engineers from all over the United States and abroad working with AI to develop systems that can create safer traffic conditions and cut down on emissions with efficiency. But what you may not know is that there are many drivers concerned
- Written by Tom Baum
- Published: 10 Mar 2017

Data breaches are common problems for businesses of all shapes and sizes. In fact, they often have huge repercussions that aren’t initially seen in the heat of the moment. How can you make sure that a data breach won’t negatively impact your business, even well after you’ve fixed the initial problem?
- Written by Tom Baum
- Published: 08 Mar 2017

Fans of Google Chrome are familiar with using Incognito mode to cover their tracks and keep their Internet browsing private. Although, one downside of Incognito mode is that it disables your browser’s extensions by default. If this has been an annoyance for you, then you’ll be pleased to learn that switching on your extensions for