The Datamax Thinking Blog

Educating, collaborating, and sparking ideas for maximizing the technology that matters.


Avoid Facing the Great Divide Between Service Level Expectations and Reality

As the landscape changes, so do business needs. It’s a technology partner’s obligation to maintain an open dialogue, to listen intently, and provide complete transparency on documented expectations and business-building strategies. 

In my time as a Solutions Sales Specialist, I played a lot of  “20 Questions.”

My steady stream of inquiries to clients had a strategic intent. The client's answers provided key nuggets of information for:

  • digging into client current (and future) needs 
  • discovering operational challenges 
  • planting new seeds of opportunity 
  • ensuring expectations were being met at all times

If there was a gap between my client's perception and reality, it was my job to stand in it.

Topics: Office Equipment Partnering Print Management Creating Raving Fans Productivity Tips and Tools Legal Tips and Tools PrintView

Navigating the Compliance, Risk and Cybersecurity Landscape

With a legitimate framework in place, and the proper education continually enforced, employees can universally identify both risk levels and types and, more importantly… understand exactly what these findings mean. 

Finding themselves in an environment entangled with cyber threats and potential data breaches, the map to compliance that healthcare organizations unfold often leads to a risk analysis.

But these organizations should know that the journey does not stop there.

Topics: Network Security Security Healthcare Tips and Tools

4C Educators Should Seek a 4C Business Technology Partner

While the 4Cs in education help empower students to be think-tanks of tomorrow, the 4Cs of business technology should and can liberate your on-campus technology team to apply these classroom initiatives.

As educators further pursue the ideal 21st century learning environment, one won’t dig far without uncovering the 4Cs.

The 4Cs – critical thinking, creativity, collaboration and communication - have been adopted and implemented into the curriculum of school districts and professional development programs for years. Established by the National Education Association and the Partnership for 21st Century Skills, these four components are a guide post for choosing specific tools, software and curriculum for the modern day, technologically advanced environment of today’s youth.

Your business technology partner should play a key role in helping bring those 4Cs to light. 

Topics: Office Equipment Partnering IT Consulting Production Print Technology Pain Business Continuity Technology Training Managed Services Provider Education Tips and Tools

Old School Swindling: How Social Engineering Uses Vintage Tactics to Slip Past Your Network's Defense

Social Engineering is really no different than any old school scam from the past, other than modern technology is the setting (for the modern attack)." - Justin Huffaker, Vice President of Strategic Technology, Datamax Inc.

Most recall the Martin Scorsese film “Catch Me if You Can,” which follows New York teen Frank Abagnale (played by Leonardo DiCaprio) posing as a Pan American World Airways pilot, a Georgia doctor and a Louisiana parish prosecutor to successfully execute million-dollar cons.

Abagnale’s ploys, while sophisticated, relied heavily on the ingrained, trusting nature of humans to carry out his elaborate schemes: Much like Social Engineering in 2018, some 60 years after Abagnale’s antics.

Topics: Network Management Managed Services IT Consulting Network Security Security Technology Training

Prevent Undetected Attack : 10 Safety Tips that Guard Against Ransomware

Ransomware, namely the WannaCry and NotPetya viruses, filled newsfeeds last year as the most prolific cyber security attacks in history. How prolific? The two Ransomware attacks combined to infect 200,000 machines in 100 countries, and NotPetya caused an estimated $1.2 billion in damages.

The most common shark attack against humans is known as the “hit-and-run” attack. Typically occurring in the surf zone amid murky waters, the swimmer or surfer seldom even sees its attacker.

The same could certainly be said for Ransomware in 2017.

Topics: Network Management Managed Services Network Security Security Data Back-Up

The 'Paperless Office' Prophecy: How Printing Remains far from Passè in Today's Workforce

The MFP, in many ways a centerpiece in our workflow place-setting, continues to have an evolving role in how paper and digital files co-exist in the workplace.

The “Paperless Office:” It’s been a corporate prophecy scripted upon blogs much like this for years, as offices of all sizes gather tools and solutions necessary to tackle the digital transformation. Without a doubt, workflow is increasingly digital in nature.

However, according to numbers complied in Canon’s recent “Office Insights 2018” release, paper itself isn’t going anywhere anytime soon – quite the opposite. It seems that the paperless office is a gradual, steady process of automation that enables best printing and workflow practices for the foreseeable future.

Topics: Document Management Office Equipment Document Workflow Print Management Canon PrintView

Diagnosing Your Data: Is Your Tech Stack Compliant with GDPR?

This legislation is a game changer for how applicable organizations process, retain and store customer data. 

On May 25, the European Union’s General Data Protection Regulation (GDPR) was officially enforced, representing a watershed moment for consumer data protection and privacy moving forward.

This legislation, designed to better unify and protect data privacy for European Union citizens, applies to those within EU-member countries, so US-based companies may not think that this overseas legislation is relevant to their everyday business.  These companies should think again: The GDPR could be very relevant to you and the way you currently collect and store data.

Topics: Network Management Managed Services Security Data Back-Up Managed Services Provider

Drowning in Documents? 5 Scenarios that Calm Workflow to a Gentle Current

The central objective of utilizing Document Management is to make your overall business processes more efficient, and specifically to accelerate and properly secure the way you move documents across your office.

Do a simple Google search for "Document Management," and you’ll see the cliché images with limited search time. The piles of paper stacked on the boss’ desk.  Documents swirling across an office. Even business people swimming in paper documents.

It’s true. Many offices are overwhelmed by paper documents. Also, when compared to a Document Management solution,  it is inefficient and costly. Estimates are that 11% of your paper files will be either lost or misplaced. Organizations often find that by digitizing their workflow, their documents begin working for them, rather than the opposite.

But digital conversion is only one component – and hardly the overarching intention – behind utilizing Document Management.

Topics: Document Management Document Workflow Creating Raving Fans

Go Vertical, Grow Vertical: 3 Rungs in the Vertical Market Ladder

Vertical Marketing comes down to truly understanding and anticipating your clients’ every move. By going vertical, your clients can grow vertical and positively impact their bottom line.

Author Anthony T. Hinks is quoted as saying “it’s when you’re going vertical that you leave the other players standing.” The game of basketball, an athlete mid-dunk, may immediately come to mind. But these words very much apply to business.

Topics: Partnering Creating Raving Fans Productivity Tips and Tools Datamax Culture

Five Network Security Questions to Consider as You Seek Peace of Mind

A Network Risk Assessment can dispel security concerns and propel your team to the ultimate goal for your organization and its network infrastructure – peace of mind.

For me, there’s perhaps no better mind-clearing, stress-relieving pastime then a jaunt along the trails at a nearby state park. The sun poking its way through the towering pine trees, coupled with the low-volume sounds of the early morning surrounding me, provides me peace of mind to empower a productive week ahead.

Isn’t peace of mind – in our homes and our workplace what we all ultimately crave? Given today’s volatile cyber security climate, fear and uncertainty of everything from downtime to network intrusion can disrupt an organization’s collective contentment.

Topics: Network Management Managed Services IT Consulting Technology Support Network Security Security