In last week’s edition of the DatCom Business Briefing, we explained how the tech skills gap is one of the greatest cybersecurity threats. If a business lacks people who understand the technology they use, it makes your business more susceptible to malware attacks and data breaches. This week, we will discuss the high costs of technology complexity in operating a... Read More
- Written by Tom Baum
- Published: 27 Sep 2017

Earlier this year, Android released Oreo, version 8.0 of their popular mobile device operating system. Whether you’ve already updated to the latest version of this OS or are still waiting for your update, it has several new or improved features that you’ll want to consider using. Let’s look at five of our (many) favorite additions
- Written by Tom Baum
- Published: 25 Sep 2017

In the wake of the Equifax data breach, which placed the personal information of 143 million users at risk, the issue of data security is at the forefront of social consciousness. Your organization needs to go about its daily business as if it will experience a data breach at any given moment. This involves looking
- Written by Tom Baum
- Published: 22 Sep 2017

Most modern companies rely on computers to at least some extent, particularly if there is some sort of delegation of services involved. Whether it’s an office filled with computers and server units, or simply a retailer with point-of-sale equipment, the companies of today need computers and data in order to function as intended. To protect
- Written by Tom Baum
- Published: 20 Sep 2017

The holidays are approaching, whether we are ready for them or not. With the holidays comes time off, which means that it’s awfully easy to fall behind post-vacation. Another concern is the amount of identity theft and credit card fraud that comes about during this time of year. We’ll discuss some of the many ways
- Written by Tom Baum
- Published: 18 Sep 2017

Do you know what a botnet is and how it works? It’s basically a network of infected computers that can be used to perform Distributed Denial of Service attacks, overloading target networks and forcing them to endure downtime. They can also be used to distribute malware and other threats. What’s worse than this, you ask?
- Written by Tom Baum
- Published: 15 Sep 2017

Have you had to make substantial technology investments in the past year? How much money do you think you will spend this year? If you have a solid technology budget in place, you’ll know how much you expect to spend, but what happens if critical systems fail? Are you prepared to cover the cost of
- Written by Tom Baum
- Published: 13 Sep 2017

Microsoft Office has long been a valuable asset for all types of businesses, but would you be surprised to hear that most organizations don’t take full advantage of it? All of the most recent editions of programs like Microsoft Word, Excel, and PowerPoint are designed with powerful, user-friendly interfaces that allow your business to do
- Written by Tom Baum
- Published: 11 Sep 2017

While computers, laptops, and tablets are incredible tools for productivity, there are many who miss the ability to scrawl out their ideas by hand. However, Microsoft has developed a means for your business to enjoy the benefits of both approaches with Windows Ink.
- Written by Tom Baum
- Published: 08 Sep 2017

In 2016 former President of the United States Barack Obama passed the Cybersecurity National Action Plan that implemented near-term action and developed a longer-term strategy of bringing awareness and protections to public computing systems connected to the Internet. The strategy is to make an immediate effort to empower citizens to protect their own privacy, while
- Written by Tom Baum
- Published: 08 Sep 2017

In case you haven’t heard, the credit bureau, Equifax, has suffered a data breach that may have exposed the records of 143 million Americans.