In last week’s edition of the DatCom Business Briefing, we explained how the tech skills gap is one of the greatest cybersecurity threats. If a business lacks people who understand the technology they use, it makes your business more susceptible to malware attacks and data breaches. This week, we will discuss the high costs of technology complexity in operating a... Read More
- Written by Tom Baum
- Published: 31 May 2019

Chances are, you’ve heard of “phishing” – a cybercriminal’s scam that steals data, access credentials, and other sensitive information by fooling a user into thinking they are providing this information to someone who is supposed to have access to it. However, there are a few different kinds of phishing, based on how it is carried
- Written by Tom Baum
- Published: 29 May 2019

Whether they are expected or not, there will always be situations when your business incurs some damage or loss due to natural disasters, downtime, or other issues. You might find that a little preparation could have kept some of the disaster at bay, and it could honestly save you a ton in terms of lost
Posted in Blog
Tagged Business computing, it support, Remote Monitoring
- Written by Tom Baum
- Published: 27 May 2019

Business can be tricky, especially if you’re good at it. It’s important to know when to be comfortable with your position without starting to feel complacent. If you fall into this trap, you’ll be running the risk of hindering your organization’s growth, potentially blocking any future successes.
- Written by Tom Baum
- Published: 24 May 2019

Compared to an enterprise corporation, a small-to-medium-sized business is going to have far fewer resources, especially in terms of its IT. Having said this, an SMB isn’t necessarily without a few quality options. Let’s review the needs that any business needs to have filled, and how they can do so with the right solutions.
- Written by Tom Baum
- Published: 22 May 2019

Windows 10 is a great operating system, but it changes up the formula a bit in regard to default applications for certain types of files. Anyone who has been using a computer for any amount of time has their preferred applications for watching videos or listening to music. We’ll show you how to set your
- Written by Tom Baum
- Published: 20 May 2019

One thing that all offices gradually accumulate over time is a surplus of cables. Each device you have is compatible with a specific cable, but identifying them all can be challenging. In today’s blog article, we’ll outline some of the common cable types and what you might need them for.
- Written by Tom Baum
- Published: 17 May 2019

The Internet is a vast and amazing place. Some have even argued that it is one of people’s best-ever inventions. Some would push it further by actively attempting to outline what rights an Internet user has. Advocacy groups have been popping up, and while it has had a marked effect on public policy in more
- Written by Tom Baum
- Published: 15 May 2019

One of the biggest buzzwords in business these days is BYOD – Bring Your Own Device – and for good reason. There are plenty of operational benefits that an organization can enjoy by adopting a BYOD policy; but, BYOD isn’t an inherently perfect solution, which means that businesses that leverage it need to do so
- Written by Tom Baum
- Published: 13 May 2019

The cloud is one of the most valuable tools available to modern businesses, but the extent to which organizations utilize it will vary depending on their specific needs. For example, some organizations might be fine with the limited control offered by the public cloud, but others might need more dynamic features and control over their
- Written by Tom Baum
- Published: 10 May 2019

Virtual reality, or VR, is a technology that not many people understand how to make the most of. Most people’s experiences with VR is something that is achieved through a third-party application, be it a smartphone or a full-fledged headset. Most of those who experience VR do so without a first-person perspective, with only 16