Technical Blog

Charity of the Year: Lymphoma Action

This year, Datcom have chosen to raise money for Lymphoma Action and help support people affected by this cancer. The Datcom team have been busy thinking up fresh ideas and this year we’re going big!

Read more

Why Managed IT Services are good for your business

The East Midlands is packed with amazing and successful businesses – all of which are different and unique in the way they conduct themselves and achieve their goals. One thing that many of these businesses do have in common is that they choose to use Managed IT Services.

Read more

What are the security risks of cloud computing?

There are lots of benefits to cloud computing, but there are some security factors to think about. Here’s our quick guide.

Read more

What is Cloud Computing?

The term ‘cloud computing’ has been around for a long time now, but if you’re not sure what it means, or why you need it, you’re not alone.

Read more

How to keep your IT equipment cool in the heat wave

With UK temperatures reaching record breaking temperatures this week, it’s crucial that you keep your IT infrastructure cool, so that your business can operate as normal.

Read more

Facebook scams, don’t be fooled

With around 2.9 billion monthly users, Facebook is one of the most popular social media sites. So it’s no surprise that this large audience is a target for scams and fraudulent activity. There are some common tricks that cyber criminals like to use. Take a look and see if you have come across any.

Read more

Show you’re serious about security with Cyber Essentials

Cyber Essentials (CE) and Cyber Essentials Plus (CE+) are accreditations that demonstrate your organisation’s commitment to safe digital practices. Here’s why we think they’re important and how you can get started.

Read more

Windows 11: Everything you need to know

The latest major release from Microsoft hosts some powerful and attractive new features. Find out more about Windows 11 here before you upgrade.

Read more

Log4Shell Vulnerability

A vulnerability has been discovered in a piece of software called "Log4j". This software, developed by Apache, is in millions of other applications to process logging information. Some high-profile use cases are the video game Minecraft, Apple iCloud, Amazon, Twitter, Tesla, the list goes on.

Read more

Ransomware and what you can do about it

You’ve probably heard of it, and you know it’s not good news. Here’s what you need to know about ransomware and what you can do about it.

Read more

Router vs Firewall

Many businesses nowadays require users to access resources remotely. That could mean a remote-access VPN for users in the field, a website hosted on a server within the network, or a remote desktop solution for people working from home. All of these systems are a potential target for attackers. Upgrading your standard issue ISP router will greatly improve your security.

Read more

Why you should ditch paper and switch to Microsoft Forms

Are you still using paper forms to collect data – from customer satisfaction surveys to employee feedback? It’s time to make the switch to digital.

Read more

Working from home – are you there for the long term?

With a lot of us now working from home for the majority of the week, it’s a good time to have a think about what equipment we have around us and if it’s fit for long-term use. Here are our top 10 things to consider.

Read more

Getting the most out of your Teams Telephony

Whether you’re talking to colleagues two floors up, or 200 miles away, Teams is a great collaboration tool. Even the free version can help people communicate and collaborate – either within, or across, organisations. So why should you add Teams Telephony to your package?

Read more

What is the most secure MFA method?

MFA stands for Multi-factor Authentication. It means users have to provide two or more verification factors to access a resource, such as an application, online account, or VPN. If you have MFA on all your business and personal online accounts, then you are already more secure than 85% of businesses. Let’s compare the various MFA methods available and see how we can make your account even more secure.

Read more

In Out, In Out, Shake It All About!

Will you return to the office? Would you prefer to stay working from home? Or are you looking to offer your staff a mix of both?

Read more

The Spam Test

Scammers have become increasingly competent over the years which has made spotting malicious emails more difficult. Whilst It is still the case that the grammar and general sentence structure tend to be poor, this has reduced as foreign attackers have got more proficient and translation tools have improved.

Read more

The Importance of Updates

Keeping your IT infrastructure updated is critical to maintaining a secure network and protecting your data.

Read more

Getting the most from Microsoft 365

Are you getting the most from your Microsoft 365 subscription? Are you using Power Apps or Power Automate to help make efficiency and cultural improvements in your business? Here is an example at Datcom of how we used Power Apps to improve team members communication and to prompt team working.

Read more


Get in touch

Call us on 0333 000 3210 or Email us