The Datamax Thinking Blog

Educating, collaborating, and sparking ideas for maximizing the technology that matters.


Tidy Up Business Processes, Transform Daily Workflow

Underneath all the manual processes, workarounds and network-related deficiencies lies an infrastructure in disarray – not unlike a closet crammed full of clothes collecting dust.

Home organization guru Marie Kondo has created enormous buzz with her Netflix series “Tidying Up with Marie Kondo.” 

Kondo’s unique methodology for decluttering clients’ living spaces, as quirky as it may seem, is fairly simple: Clients take all their personal belongings, put them in a pile, hold each one up, and ask themselves – “does it spark joy?” If not, it’s time to discard.

Topics: Document Workflow IT Consulting

Click It & Risk It: Guard Against Social Engineered Attacks with Proactive Cybersecurity Training

Beyond the infrastructure in place, what about employee education? What is your company doing to educate its team for recognizing and avoiding these sly, malicious tactics?

Human error. It’s an inevitable part of life and conducting business every day.

We’re only human, after all.

But such human error can be especially damaging in today’s cybersecurity climate. According to Verizon’s 2018 Data Breach Investigations Report, phishing or other forms of social engineering cause 93% of all data breaches. This means that employee negligence is generating a majority of cyber attacks. It's possibly only a matter of time before one of your employees is hoodwinked by human-manipulating tactics.

Topics: Network Management IT Consulting Network Security Technology Training

What's Your SMB's Document & Network Strategy Heading into Spring Training?

As your SMB heads into Spring Training, and you analyze your current technology roster - from document workflow to network infrastructure - what are some fundamental moves you can make to better your 2019 season forecast? 

The first glimpse of spring has arrived.

As my beloved Texas Rangers report to Surprise, Ariz. for Spring Training this week, it’s a time when baseball enthusiasts’ minds drift from the bone-chilling winter months and begin romanticized forecasts for their favorite team and the sunny April days ahead.

Topics: Document Management Network Management Document Workflow IT Consulting Productivity Tips and Tools

4 Business Continuity Essentials to Keep Your Technology from Treading on Thin Ice

One can only tip-toe over network and infrastructure insecurities for so long before the surface beneath you cracks.

For ice fishing enthusiasts embracing their favorite winter pastime, the warning from officials is abundantly clear: don’t tread on thin ice! In fact, Minnesota’s Department of Natural Resources recommends ice at least 4 inches thick for foot travel.

A measurement any less than 4 inches could result in disaster.

The technology footpath that you tread across every day bears inherent risk. The cybersecurity climate is volatile, forcing organizations to be consistently mindful of the environment surrounding them. The solid technology foundation you create determines how confidently your organization can navigate with necessary tools to conduct business efficiently day to day.

Topics: Network Management Managed Services IT Consulting Network Security Security Business Continuity Managed Services Provider

Small Businesses Can Think Big With Cloud-based Technology

Is your SMB ready to think bigger about the technology you deploy? Are the practical advantages that come with cloud-based solutions a right fit for your organization? 

Author Tim Ferris says “Life’s too short to think small.”

Many ambitious, hungry start-up entrepreneurs begin with nothing other than a huge dream.

Naysayers may accuse them of having their head “in the clouds” when it comes to their business vision, with their seemingly unrealistic, impractical ideas and expectations.

Either way, business owners having their heads in cloud technology is both practical and advantageous. Given the right technology partner, utilizing cloud-based tools can boost productivity and demand minimal management effort on their part.  

Topics: Network Management IT Consulting Productivity Tips and Tools Cloud Technology Data Back-Up

4C Educators Should Seek a 4C Business Technology Partner

While the 4Cs in education help empower students to be think-tanks of tomorrow, the 4Cs of business technology should and can liberate your on-campus technology team to apply these classroom initiatives.

As educators further pursue the ideal 21st century learning environment, one won’t dig far without uncovering the 4Cs.

The 4Cs – critical thinking, creativity, collaboration and communication - have been adopted and implemented into the curriculum of school districts and professional development programs for years. Established by the National Education Association and the Partnership for 21st Century Skills, these four components are a guide post for choosing specific tools, software and curriculum for the modern day, technologically advanced environment of today’s youth.

Your business technology partner should play a key role in helping bring those 4Cs to light. 

Topics: Office Equipment Partnering IT Consulting Production Print Technology Pain Business Continuity Technology Training Managed Services Provider Education Tips and Tools

Old School Swindling: How Social Engineering Uses Vintage Tactics to Slip Past Your Network's Defense

Social Engineering is really no different than any old school scam from the past, other than modern technology is the setting (for the modern attack)." - Justin Huffaker, Vice President of Strategic Technology, Datamax Inc.

Most recall the Martin Scorsese film “Catch Me if You Can,” which follows New York teen Frank Abagnale (played by Leonardo DiCaprio) posing as a Pan American World Airways pilot, a Georgia doctor and a Louisiana parish prosecutor to successfully execute million-dollar cons.

Abagnale’s ploys, while sophisticated, relied heavily on the ingrained, trusting nature of humans to carry out his elaborate schemes: Much like Social Engineering in 2018, some 60 years after Abagnale’s antics.

Topics: Network Management Managed Services IT Consulting Network Security Security Technology Training

Five Network Security Questions to Consider as You Seek Peace of Mind

A Network Risk Assessment can dispel security concerns and propel your team to the ultimate goal for your organization and its network infrastructure – peace of mind.

For me, there’s perhaps no better mind-clearing, stress-relieving pastime then a jaunt along the trails at a nearby state park. The sun poking its way through the towering pine trees, coupled with the low-volume sounds of the early morning surrounding me, provides me peace of mind to empower a productive week ahead.

Isn’t peace of mind – in our homes and our workplace what we all ultimately crave? Given today’s volatile cyber security climate, fear and uncertainty of everything from downtime to network intrusion can disrupt an organization’s collective contentment.

Topics: Network Management Managed Services IT Consulting Technology Support Network Security Security

Why Qualified IT Support Is Becoming Harder (and More Expensive) to Find

As companies of every size rely on IT to operate, it’s becoming more difficult to find and hire the IT expertise you need. Is there an alternative?

When it comes to IT, many small and medium businesses struggle to find the right balance of reliability, responsiveness, and cost – not to mention technical expertise. In most cases, IT support is usually one of four ways:

  • Your niece, nephew, or first born, who is “really technical” and oversees the details for you
  • A company a business friend of yours uses that you call when your computers start freezing
  • A dedicated, in-house IT department that you keep on your payroll and “does it all”
  • A proactively, managed provider who provides a blend of remote monitoring, preventative maintenance, and help desk support when you need it

Understanding the difference between these types of support is critical to protecting your business. Hackers are everywhere, they want your information, and they are just waiting to take advantage of your small business’s network vulnerabilities.

Topics: Network Management Partnering Managed Services IT Consulting Technology Support Technology Pain Network Security

6 Cybersecurity Tips That Will Help Keep Your Data Secure

Employees are a big weakness in any information security plan. These 6 tips will make your security stronger.

The biggest security hole in any business isn't the network or your computer assets or the various programs you operate on.

The biggest security threat to any business is the people that work there.

Because people do stupid things. And when they do stupid things with company information (like leaving a laptop in the backseat of a car with customer information), your company is at risk of a data breach.

That's why when it comes to cybersecurity, paying attention only to the IT side of things isn't good enough (though that's essential, of course).

You need to train your users.

Here are a few tips to help you get started on training employees on information security.

Topics: Network Management Managed Services IT Consulting Technology Pain Network Security Security Cloud Technology Business Continuity Data Back-Up