In last week’s edition of the DatCom Business Briefing, we explained how the tech skills gap is one of the greatest cybersecurity threats. If a business lacks people who understand the technology they use, it makes your business more susceptible to malware attacks and data breaches. This week, we will discuss the high costs of technology complexity in operating a... Read More
- Written by Tom Baum
- Published: 23 Jun 2020

Business Disaster: What Threatens Small Businesses the Most?There are many threats to the integrity of a small business, and not all of them are as dramatic as a cyberattack or a hurricane. Every small business needs to do a risk assessment to determine all the threats that exist that could bring harm. External threats are
- Written by Tom Baum
- Published: 16 Jun 2020

Data Protection and Bring Your Own Device to Work BYOD refers to a firm’s policy of allowing employees to use their own personal phones, tablets, and laptops for all their work applications. This is a pretty common policy, and it has many benefits, but it brings along risks. How are you addressing these risks? Here
- Written by Tom Baum
- Published: 09 Jun 2020

Everyday Human Error Can Affect Data ProtectionAre you under the impression that data loss is all about putting up firewalls to protect against evil cyberattacks? Some of the biggest sources of data loss include sloppiness, human error, and just plain forgetfulness.What are some of the unglamorous things that we do everyday that leave us vulnerable?PasswordsOld
- Written by Tom Baum
- Published: 02 Jun 2020

Disaster Recovery Plans: Do You Have One? Disaster recovery and business continuity plans are issues that almost all small businesses fail to think about. More frequently, they decide they haven’t the resources to address such “unthinkables.” If your business was down for 1-2 days or more, what costs would you incur? Lost revenues and lost
- Written by Directive
- Published: 29 May 2020

Google Chrome is adding a cool feature over the next week or so (it may already have been released for you). The next feature is sure to make a big difference for some and will be non-descript for others. Let’s unpack colorful tabs in Google Chrome.
- Written by Tom Baum
- Published: 27 May 2020

With its all-purpose functionality really coming to the forefront in the office, your Internet browser is likely one of your most used computer programs. Considering that so much of your time is spent using the Internet, we thought it would make sense to share a few shortcuts to make it more efficient for you.
Posted in Blog, Tip of the Week
Tagged Browser, Peripheral, Tip of the week
- Written by Tom Baum
- Published: 26 May 2020

Why Small Businesses Shouldn’t Avoid Making Disaster Recovery Plans. Entrepreneurs and small businesses, especially ones that are fairly new, often don’t think about making plans to recover in case of a disaster. However, it is the smallest business that most likely has the fewest resources to fall back on in case of
- Written by Tom Baum
- Published: 25 May 2020

When it comes to a business’ cybersecurity, there is no magic bullet to solve every problem. No miracle cure, no panacea, no Staples “that was easy” button. Instead, you need to deploy various means of protecting your operations. Let’s discuss how your business’ security needs to be shaped in three different environments: your physical infrastructure,
Posted in Blog, Security
Tagged Best practices, Network Security, Small Business
- Written by Tom Baum
- Published: 22 May 2020

With less than half of 2020 behind us, many of us would already like a re-do of this year. With a global emergency impacting the personal and professional lives of so many, businesses are struggling right now. For these organizations to survive, they will need to get the most out of every business investment. When
Posted in Blog, Business
Tagged it support, Managed IT Services, Technology
- Written by Tom Baum
- Published: 20 May 2020

Laptops have proven to be one of the more useful gadgets for businesses and business users. Not only do they hold their own in performance against a desktop, their portability is another consideration that cannot be ignored. However, this portability means that they are at least somewhat reliant on their battery, which begs the question:
Posted in Blog, Tip of the Week
Tagged Best practices, Mobile Devices, Tip of the week