In last week’s edition of the DatCom Business Briefing, we explained how the tech skills gap is one of the greatest cybersecurity threats. If a business lacks people who understand the technology they use, it makes your business more susceptible to malware attacks and data breaches. This week, we will discuss the high costs of technology complexity in operating a... Read More
- Written by DatCom Admin
- Published: 23 Jan 2023

Unfortunately, the number of cyberattacks is consistently growing and many of those attacks target business end users. This means that any account that requires a password for access could conceivably be compromised should attackers gain access to its credentials. At DatCom, LLC, we promote the use of multi-factor authentication (also known as two-factor authentication or
- Written by Tom Baum
- Published: 25 May 2020

When it comes to a business’ cybersecurity, there is no magic bullet to solve every problem. No miracle cure, no panacea, no Staples “that was easy” button. Instead, you need to deploy various means of protecting your operations. Let’s discuss how your business’ security needs to be shaped in three different environments: your physical infrastructure,
Posted in Blog, Security
Tagged Best practices, Network Security, Small Business
- Written by Tom Baum
- Published: 11 May 2020

While remote work has gained an understandable boost in popularity, many business owners and technology specialists may still be concerned about how secure the Wi-Fi connections that workers are using in the home are. To waylay those fears, you need to be sure that your employees are using their networks as securely as they can.
- Written by Tom Baum
- Published: 17 Apr 2020

The COVID-19 pandemic has most of the world at home. It has completely disrupted everyday life and has businesses scrapping their normal strategies for work-at-home policies that will at least allow them to maintain some productivity. These strategies, while highly effective, carry with them additional risk. Today, we take a look at some of the
- Written by Tom Baum
- Published: 10 Feb 2020

When someone starts talking about social engineering, people often get confused. They think we’re talking about cloning. While having two of something you love may not be terrible, the social engineering we routinely cite is much, much worse. Social engineering is the act of using social interactions to get people to make cybersecurity mistakes. Today,
- Written by Tom Baum
- Published: 27 Jan 2020

Over the last few years, there has been a meteoric rise in cybercrime, with nothing to indicate that rates will decrease anytime soon. Why would they? Bad actors and cybercriminals can make a pretty penny by attacking businesses, and they are only becoming more equipped and experienced in doing so.
- Written by Tom Baum
- Published: 15 Jan 2020

Data security isn’t a matter to be taken lightly, as too many businesses have found out the hard way. Unfortunately, there are far too many simple ways to correct common security issues – enough that it’s foolish not to do so. We’ll review a few ways to fix security issues, after discussing one of, if
Posted in Blog, Business, Security
Tagged Best practices, Maintenance, Security
- Written by Tom Baum
- Published: 14 Jan 2020

The password isn’t nearly as secure as it used to be. Hackers have begun to take advantage of extremely powerful solutions designed to brute force their way into accounts by using software to rapidly guessing thousands of passwords per second, making it extraordinarily difficult to prepare yourself for them. What’s the best way to guarantee
Posted in Blog, Security
Tagged Multi-factor Authentication, Security, Two-factor Authentication
- Written by Tom Baum
- Published: 24 Jun 2016

You may feel like you’re familiarized with everything your smartphone can do; yet, there are still some little-known things about smartphones that may surprise you. Take for example these four smartphone facts from List25.
- Written by Tom Baum
- Published: 23 May 2016

We often talk about how important it is that your business use the most recent and up-to-date versions of your software solutions, but it’s not often that we get to say that people using Internet Explorer 11 have the right idea. As it turns out, nearly a quarter of all Windows PCs are still using
Posted in Blog, Security
Tagged End of Support, Internet Explorer, Internet Explorer Microsoft