datumconsulting blog

 

Your cell phone holds some of your most sensitive, personal information. Things like your passwords and account numbers, emails, text messages, photos, and videos. If your phone ends up in the wrong hands, someone could steal your identity,...

If in pre-virus times you were quite happy with the quality of your home Wi-Fi, but you’re not now, you are not alone. Life in lockdown has shifted online for everyone, and all at the same time. Moreover, this online existence is not spre...

VoIP (Voice over Internet Protocol) lets you make and receive phone calls over the internet. In simple terms, it provides phone service over the internet.

VoIP can offer a ton of different features that your current telephone service may...

The newest generation of wireless connectivity has been a major topic of discussion in 2020; WiFi 6 and 5G are being touted in marketing pitches for consumer and enterprise products alike. But what really makes these newest generations sp...

Bluetooth is used in everything from speakers to implanted pacemakers, which means that Bluetooth-related vulnerabilities can affect a dizzying array of devices. In the latest instance, a newly discovered round of 12 Bluetooth bugs pote...

Cybercrime is evolving. Do you remember back when our biggest fear was that our computer would get a virus? Fast forward ten years later, and that’s the least of our concerns. Today, there are trillions of cybercriminals out there that ha...