Category: Blog
Action DataTel Blog
A Hacker’s 3 Favorite Words: Out Of Office

“Hello! I’m on vacation and will be out of the office until [date]. For urgent matters, please contact [coworker’s name and e-mail].”
Unless you’re a cyber-criminal, you’d never think this was anything other than easy, convenient and even expected.
Except…it’s exactly what cyber-criminals love to see.
The one thing meant to keep things organized and moving smoothly (your auto-reply), is a GOLD mine of intel for nefarious criminals looking for an open door to sneak in.
Why Summer Is the Worst Time for IT
5 Critical Cybersecurity Mistakes Business Owners Make
Spring Clean Your IT System
Time to upgrade to Windows 11: A Guide
Score A Touch Down Against Hackers
China is Listening to Cell Phone Calls and Reading Text Messages
2025 Cybersecurity Predictions: What To Expect And How To Prepare
Surviving the Holiday Season- How to Avoid a Tech Meltdown
Are you losing money to outdated technology?

Technology that is a decade older or more, is called a legacy system. They become expensive to maintain, are slower, need constant updates and patches, and are usually incapable of leveraging new features as they’re released. The consequences of this can cause them to struggle to stay competitive with tech-savvy competitors