In last week’s edition of the DatCom Business Briefing, we explained how the tech skills gap is one of the greatest cybersecurity threats. If a business lacks people who understand the technology they use, it makes your business more susceptible to malware attacks and data breaches. This week, we will discuss the high costs of technology complexity in operating a... Read More
- Written by Tom Baum
- Published: 30 Nov 2018

It’s no secret that cloud computing has become a major part of what most small businesses’ operations. One aspect of business administration that many businesses keep in-house is their HR department. Today, we’ll take a look at HR and payroll software, and how moving your business’ human resources department to the cloud is a good
Posted in Blog
Tagged Hosted Solutions, Human Resources, Software as a Service
- Written by Tom Baum
- Published: 28 Nov 2018

Google is well-known for being a go-to provider for Internet-related services and solutions. Your business might already be taking advantage of them, but are you using them to the best of your ability? With keyboard shortcuts and other various tips and tricks, you’ll be able to take advantage of them in previously unforeseen ways. Here
- Written by Tom Baum
- Published: 26 Nov 2018

Businesses don’t like to spend money on solutions they don’t need. You’d rather make sure you hit payroll, dish out Christmas bonuses, and have something left over to grow. With this in mind, a business that doesn’t properly back up their data might not get a chance to make payroll, dish out bonuses, or even
- Written by Tom Baum
- Published: 23 Nov 2018

Does your business use any cloud-based applications to go about its daily duties? Chances are that with today’s increasingly online business environment, it’s not out of the question for many organizations to have not just parts of their infrastructure in the cloud, but entirely online infrastructures at that. If you’re still considering the cloud as
Posted in Blog
Tagged Cloud Computing, Hosted Solutions, Software as a Service
- Written by Tom Baum
- Published: 21 Nov 2018

Sometimes, things are written in the wrong place. Fortunately, there are means of moving them if they happened to be written using a computer. These processes are relatively very simple and are so commonly used that the shortcuts are right next to each other on the keyboard. For today’s tip, we’ll review how you can
- Written by Tom Baum
- Published: 19 Nov 2018

While many of us rely on phones to remain productive during the day, too often are we now picking up the phone to a spammer’s snake-oil sale: “Hello, we are reaching out to inform you that there has been an issue with your account” or similar nonsense. While this is enough of an irritant in
- Written by Tom Baum
- Published: 16 Nov 2018

Businesses these days rely on technology in order to function properly, but what happens when this technology doesn’t operate as intended? If your organization doesn’t have a dedicated help desk on-premise, you’re probably suffering from unnecessary downtime and technology troubles with no recourse.
- Written by Tom Baum
- Published: 14 Nov 2018

While running a business can be quite rewarding on a professional level, it can be extremely challenging, with countless obstacles to overcome–particularly in regard to technology and its management. Thankfully, there are ways your business can minimize the pain of managing technology. Here are just a few of them.
- Written by Tom Baum
- Published: 12 Nov 2018

With Google Chrome as its major competition, Bing needs all the help it can get just to claim a market share of the web browsing industry. Despite this, Microsoft’s search engine has encountered problems in the past with some of its top searches, including some that have caused data breaches.
- Written by Tom Baum
- Published: 09 Nov 2018

Data is an asset, there’s no getting around this fact. Therefore, your business needs to consider it important enough to protect with a data backup and disaster recovery solution, as even something unlikely, like a natural disaster or hacking attack, could place your organization in peril. We’re going to take a look at some of