Technical Blog
Charity of the Year: Lymphoma Action
This year, Datcom have chosen to raise money for Lymphoma Action and help support people affected by this cancer. The Datcom team have been busy thinking up fresh ideas and this year we’re going big!
Read more
This year, Datcom have chosen to raise money for Lymphoma Action and help support people affected by this cancer. The Datcom team have been busy thinking up fresh ideas and this year we’re going big!
Read moreWhy Managed IT Services are good for your business
The East Midlands is packed with amazing and successful businesses – all of which are different and unique in the way they conduct themselves and achieve their goals. One thing that many of these businesses do have in common is that they choose to use Managed IT Services.
Read more
The East Midlands is packed with amazing and successful businesses – all of which are different and unique in the way they conduct themselves and achieve their goals. One thing that many of these businesses do have in common is that they choose to use Managed IT Services.
Read moreWhat are the security risks of cloud computing?
There are lots of benefits to cloud computing, but there are some security factors to think about. Here’s our quick guide.
Read more
There are lots of benefits to cloud computing, but there are some security factors to think about. Here’s our quick guide.
Read moreWhat is Cloud Computing?
The term ‘cloud computing’ has been around for a long time now, but if you’re not sure what it means, or why you need it, you’re not alone.
Read more
The term ‘cloud computing’ has been around for a long time now, but if you’re not sure what it means, or why you need it, you’re not alone.
Read moreHow to keep your IT equipment cool in the heat wave
With UK temperatures reaching record breaking temperatures this week, it’s crucial that you keep your IT infrastructure cool, so that your business can operate as normal.
Read more
With UK temperatures reaching record breaking temperatures this week, it’s crucial that you keep your IT infrastructure cool, so that your business can operate as normal.
Read moreFacebook scams, don’t be fooled
With around 2.9 billion monthly users, Facebook is one of the most popular social media sites. So it’s no surprise that this large audience is a target for scams and fraudulent activity. There are some common tricks that cyber criminals like to use. Take a look and see if you have come across any.
Read more
With around 2.9 billion monthly users, Facebook is one of the most popular social media sites. So it’s no surprise that this large audience is a target for scams and fraudulent activity. There are some common tricks that cyber criminals like to use. Take a look and see if you have come across any.
Read moreShow you’re serious about security with Cyber Essentials
Cyber Essentials (CE) and Cyber Essentials Plus (CE+) are accreditations that demonstrate your organisation’s commitment to safe digital practices. Here’s why we think they’re important and how you can get started.
Read more
Cyber Essentials (CE) and Cyber Essentials Plus (CE+) are accreditations that demonstrate your organisation’s commitment to safe digital practices. Here’s why we think they’re important and how you can get started.
Read moreWindows 11: Everything you need to know
The latest major release from Microsoft hosts some powerful and attractive new features. Find out more about Windows 11 here before you upgrade.
Read more
The latest major release from Microsoft hosts some powerful and attractive new features. Find out more about Windows 11 here before you upgrade.
Read moreLog4Shell Vulnerability
A vulnerability has been discovered in a piece of software called "Log4j". This software, developed by Apache, is in millions of other applications to process logging information. Some high-profile use cases are the video game Minecraft, Apple iCloud, Amazon, Twitter, Tesla, the list goes on.
Read more
A vulnerability has been discovered in a piece of software called "Log4j". This software, developed by Apache, is in millions of other applications to process logging information. Some high-profile use cases are the video game Minecraft, Apple iCloud, Amazon, Twitter, Tesla, the list goes on.
Read moreRansomware and what you can do about it
You’ve probably heard of it, and you know it’s not good news. Here’s what you need to know about ransomware and what you can do about it.
Read more
You’ve probably heard of it, and you know it’s not good news. Here’s what you need to know about ransomware and what you can do about it.
Read moreRouter vs Firewall
Many businesses nowadays require users to access resources remotely. That could mean a remote-access VPN for users in the field, a website hosted on a server within the network, or a remote desktop solution for people working from home. All of these systems are a potential target for attackers. Upgrading your standard issue ISP router will greatly improve your security.
Read more
Many businesses nowadays require users to access resources remotely. That could mean a remote-access VPN for users in the field, a website hosted on a server within the network, or a remote desktop solution for people working from home. All of these systems are a potential target for attackers. Upgrading your standard issue ISP router will greatly improve your security.
Read moreWhy you should ditch paper and switch to Microsoft Forms
Are you still using paper forms to collect data – from customer satisfaction surveys to employee feedback? It’s time to make the switch to digital.
Read more
Are you still using paper forms to collect data – from customer satisfaction surveys to employee feedback? It’s time to make the switch to digital.
Read moreWorking from home – are you there for the long term?
With a lot of us now working from home for the majority of the week, it’s a good time to have a think about what equipment we have around us and if it’s fit for long-term use. Here are our top 10 things to consider.
Read more
With a lot of us now working from home for the majority of the week, it’s a good time to have a think about what equipment we have around us and if it’s fit for long-term use. Here are our top 10 things to consider.
Read moreGetting the most out of your Teams Telephony
Whether you’re talking to colleagues two floors up, or 200 miles away, Teams is a great collaboration tool. Even the free version can help people communicate and collaborate – either within, or across, organisations. So why should you add Teams Telephony to your package?
Read more
Whether you’re talking to colleagues two floors up, or 200 miles away, Teams is a great collaboration tool. Even the free version can help people communicate and collaborate – either within, or across, organisations. So why should you add Teams Telephony to your package?
Read moreWhat is the most secure MFA method?
MFA stands for Multi-factor Authentication. It means users have to provide two or more verification factors to access a resource, such as an application, online account, or VPN. If you have MFA on all your business and personal online accounts, then you are already more secure than 85% of businesses. Let’s compare the various MFA methods available and see how we can make your account even more secure.
Read more
MFA stands for Multi-factor Authentication. It means users have to provide two or more verification factors to access a resource, such as an application, online account, or VPN. If you have MFA on all your business and personal online accounts, then you are already more secure than 85% of businesses. Let’s compare the various MFA methods available and see how we can make your account even more secure.
Read moreIn Out, In Out, Shake It All About!
Will you return to the office? Would you prefer to stay working from home? Or are you looking to offer your staff a mix of both?
Read more
Will you return to the office? Would you prefer to stay working from home? Or are you looking to offer your staff a mix of both?
Read moreThe Spam Test
Scammers have become increasingly competent over the years which has made spotting malicious emails more difficult. Whilst It is still the case that the grammar and general sentence structure tend to be poor, this has reduced as foreign attackers have got more proficient and translation tools have improved.
Read more
Scammers have become increasingly competent over the years which has made spotting malicious emails more difficult. Whilst It is still the case that the grammar and general sentence structure tend to be poor, this has reduced as foreign attackers have got more proficient and translation tools have improved.
Read moreThe Importance of Updates
Keeping your IT infrastructure updated is critical to maintaining a secure network and protecting your data.
Read more
Keeping your IT infrastructure updated is critical to maintaining a secure network and protecting your data.
Read moreGetting the most from Microsoft 365
Are you getting the most from your Microsoft 365 subscription? Are you using Power Apps or Power Automate to help make efficiency and cultural improvements in your business? Here is an example at Datcom of how we used Power Apps to improve team members communication and to prompt team working.
Read more
Are you getting the most from your Microsoft 365 subscription? Are you using Power Apps or Power Automate to help make efficiency and cultural improvements in your business? Here is an example at Datcom of how we used Power Apps to improve team members communication and to prompt team working.
Read more