Get Started Today!  217-475-0226

Decatur Computers Inc. Blog

Decatur Computers Inc. has been serving the Decatur area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Scam Claims to Have Compromising Video… of You

Scam Claims to Have Compromising Video… of You

Every business (and every individual, for that matter) needs to be wary of Internet scams and other online tricks. This is because those scammers are wily and have many means of finding a user in a compromising position… or so they claim in a recent scam.

0 Comments
Continue reading

Technology Basics: Blue Screen of Death

Technology Basics: Blue Screen of Death

One of the most notorious error screens out there has to be the Windows’ Blue Screen of Death, the devastating fatal error that occurs when something has gone horribly wrong with your computer. But what actually causes this error, and what can you do to make sure that it doesn’t happen again? Let’s find out.

0 Comments
Continue reading

Your Emails Won’t Be Secure Without these Safeguards

Your Emails Won’t Be Secure Without these Safeguards

Are your employees putting your organization’s security at risk due to poor email practices? This is a question that all business owners need to consider--especially if you deal in sensitive information. We recommend that all businesses utilize a two-pronged approach to email security, including both technology measures to secure communications on the technical side and training to secure on the human side.

0 Comments
Continue reading

New Communications Solutions to Move Your Business Forward

New Communications Solutions to Move Your Business Forward

As a business owner, it’s your responsibility to keep an eye on how your staff communicates. Email and telephone have long been staples in this regard, and these solutions come packed with features like file storage and instant messaging. With more organizations taking their businesses on the go, these businesses are trying to take advantage of applications with the ability to integrate with their real-time messaging apps. Enter: Slack and Microsoft Teams, two solutions that hope to change the way business communications work.

0 Comments
Continue reading

Technology Basics: Digital Twin

Technology Basics: Digital Twin

Simulations are a common thing in many science fiction movies. Perhaps it’s an image on a screen that dictates what could happen as the result of a particular action. Maybe it’s a simulation of a certain event. Either way, the fact remains that something like this--previously relegated only to the realm of sci-fi--has now been brought to the technology industry in the form of a digital twin.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Tech Term Network Security Business Computing IT Support Hackers Android Software Cybersecurity Malware User Tips Data Data Recovery Google Business Management Data Backup Internet Email Smartphone Backup Innovation Ransomware Cloud Small Business Managed IT Services Efficiency Windows 10 Communications Productivity Artificial Intelligence Business Technology Hardware BDR Mobile Device Management Collaboration Phishing IT Services Cybercrime Cost Management Computer IT Management Business Mobile Device Outsourced IT App Access Control Applications Passwords Data Security Patch Management Encryption Gadgets Network Facebook Maintenance Blockchain Hard Drive Managed IT Services Microsoft Office Antivirus Update Saving Money Money Project Management Social Media Search Spam Office 365 Data Breach Word Save Money Vulnerabilities Alert Touchscreen Digital Data Protection Document Management Microsoft Bandwidth Windows Holiday Automation Law Enforcement Apps Start Menu Laptop Websites VPN Browser Scam Server Communication Bitcoin Internet of Things Two-factor Authentication Operating System Social Engineering Data Management Data loss Smartphones SaaS Business Continuity Remote Monitoring Hacking Tech Terms Gmail Disaster Recovery Computer Care Excel Devices Comparison Mobile Technology Nanotechnology Uninterrupted Power Supply Google Drive Device security Tactics Virus Computing Google Calendar Downtime Emails Going Green Backup and Disaster Recovery Unified Threat Management Managed Service Legal Startup Worker Big Data SharePoint Tip of the week Hard Drive Disposal Compliance Managed Service Provider Specifications Augmented Reality Telephony Content Upgrades Website YouTube Error Outlook Samsung Piracy Bluetooth Vendor Mangement Download Google Maps Microsoft Excel Miscellaneous Downloads Computing Infrastructure Cloud Computing Addiction Disaster Distributed Denial of Service Unified Threat Management BYOD email scam Regulations Access Emergency Television Virtual Reality Screen Reader History VoIP Cryptocurrency Settings Google Docs Software License Wireless Headphones Business Mangement Upload Mobile Security Printer VoIp Networking Legislation Machine Learning Freedom of Information Information Unified Communications Cortana Automobile Hosted Solutions Mobile Devices Accountants Running Cable Spyware Vulnerability Mouse WiFi Company Culture IBM Audit Telephone Systems HTML Administration Redundancy Budget Cleaning Solid State Drive Trends Paperless Office Tablet Software as a Service Monitoring Mobility IT Support Business Cards Virtualization Network Management Knowledge News Best Practice Corporate Profile Time Management Travel Printing eWaste Training Cabling Analytics DDoS Wireless Identity Theft Conferencing Consultant Virtual Assistant Employer-Employee Relationship Information Technology Computers Gamification Unsupported Software Multi-factor Authentication Database How to Management Managed IT Apple Password Service Level Agreement Fake News Username Government Robot Equifax Desktop Chromebook Managing Stress Multi-Factor Security Twitter Windows 10 Telephone Regulation Marketing Social Network Office CrashOverride Customer Resource management Users Office Tips

Latest Blog

Every business (and every individual, for that matter) needs to be wary of Internet scams and other online tricks. This is because those scammers are wily and have many means of finding a user in a compromising position… or so they claim in a recent scam.

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at http://www.decaturcomputers.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.