Relevant Technology • Raving Results®

Our Locations  |  800.633.1526800.633.1526  |  Client Login

The Datamax Thinking Blog

Educating, collaborating, and sparking ideas for maximizing the technology that matters.


You've Been Schooled: 5 Types of Phishing Email Attacks You Should Be Educated On

Prepare your team for the next phishing threat by "schooling" them on these 5 types of attacks. 

As most outdoors enthusiasts can tell you, there's a reason it's called fishing, and not catching.

Despite all your preparation and skill, that coveted fish can be hard to catch. The same goes for phishing, a cybercriminal tactic that involves email messages crafted to capture a person or an organization's sensitive data. More and more, these sophisticated attacks are hard to catch.

Topics: Network Management Managed Services IT Consulting Network Security Cybersecurity

Begin Carving Out Your 2022 IT Security Plan With These 6 Questions

Good IT security practices require more than just a bundle of technology tossed at a potential problem.

Author and Poet Rumi once wrote: “I’ve said before that every craftsman searches for what’s not there to practice his craft.”

Topics: Network Management Managed Services IT Consulting Technology Training Managed Services Provider MFP Security

How Businesses Can Securely Work From Home

When supporting a remote workforce, understand that security controls shift. Therefore, firewalls, DNS, and IDS/IPS could be ineffective when employees head home.

As the novel coronavirus (COVID-19) continues to spread, many businesses are assessing how they can prioritize their employee safety and still maintain regular business operations.

Topics: Network Management Managed Services IT Consulting Network Security Business Continuity Managed Services Provider Cybersecurity Coronavirus Remote Workforce Planning

Tidy Up Business Processes, Transform Daily Workflow

Underneath all the manual processes, workarounds and network-related deficiencies lies an infrastructure in disarray – not unlike a closet crammed full of clothes collecting dust.

Home organization guru Marie Kondo has created enormous buzz with her Netflix series “Tidying Up with Marie Kondo.” 

Kondo’s unique methodology for decluttering clients’ living spaces, as quirky as it may seem, is fairly simple: Clients take all their personal belongings, put them in a pile, hold each one up, and ask themselves – “does it spark joy?” If not, it’s time to discard.

Topics: Document Workflow IT Consulting

Click It & Risk It: Guard Against Social Engineered Attacks with Proactive Cybersecurity Training

Beyond the infrastructure in place, what about employee education? What is your company doing to educate its team for recognizing and avoiding these sly, malicious tactics?

Human error. It’s an inevitable part of life and conducting business every day.

We’re only human, after all.

But such human error can be especially damaging in today’s cybersecurity climate. According to Verizon’s 2018 Data Breach Investigations Report, phishing or other forms of social engineering cause 93% of all data breaches. This means that employee negligence is generating a majority of cyber attacks. It's possibly only a matter of time before one of your employees is hoodwinked by human-manipulating tactics.

Topics: Network Management IT Consulting Network Security Technology Training

What's Your SMB's Document & Network Strategy Heading into Spring Training?

As your SMB heads into Spring Training, and you analyze your current technology roster - from document workflow to network infrastructure - what are some fundamental moves you can make to better your 2019 season forecast? 

The first glimpse of spring has arrived.

As my beloved Texas Rangers report to Surprise, Ariz. for Spring Training this week, it’s a time when baseball enthusiasts’ minds drift from the bone-chilling winter months and begin romanticized forecasts for their favorite team and the sunny April days ahead.

Topics: Document Management Network Management Document Workflow IT Consulting Productivity Tips and Tools

4 Business Continuity Essentials to Keep Your Technology from Treading on Thin Ice

One can only tip-toe over network and infrastructure insecurities for so long before the surface beneath you cracks.

For ice fishing enthusiasts embracing their favorite winter pastime, the warning from officials is abundantly clear: don’t tread on thin ice! In fact, Minnesota’s Department of Natural Resources recommends ice at least 4 inches thick for foot travel.

A measurement any less than 4 inches could result in disaster.

The technology footpath that you tread across every day bears inherent risk. The cybersecurity climate is volatile, forcing organizations to be consistently mindful of the environment surrounding them. The solid technology foundation you create determines how confidently your organization can navigate with necessary tools to conduct business efficiently day to day.

Topics: Network Management Managed Services IT Consulting Network Security Security Business Continuity Managed Services Provider

Small Businesses Can Think Big With Cloud-based Technology

Is your SMB ready to think bigger about the technology you deploy? Are the practical advantages that come with cloud-based solutions a right fit for your organization? 

Author Tim Ferris says “Life’s too short to think small.”

Many ambitious, hungry start-up entrepreneurs begin with nothing other than a huge dream.

Naysayers may accuse them of having their head “in the clouds” when it comes to their business vision, with their seemingly unrealistic, impractical ideas and expectations.

Either way, business owners having their heads in cloud technology is both practical and advantageous. Given the right technology partner, utilizing cloud-based tools can boost productivity and demand minimal management effort on their part.  

Topics: Network Management IT Consulting Productivity Tips and Tools Cloud Technology Data Back-Up

4C Educators Should Seek a 4C Business Technology Partner

While the 4Cs in education help empower students to be think-tanks of tomorrow, the 4Cs of business technology should and can liberate your on-campus technology team to apply these classroom initiatives.

As educators further pursue the ideal 21st century learning environment, one won’t dig far without uncovering the 4Cs.

The 4Cs – critical thinking, creativity, collaboration and communication - have been adopted and implemented into the curriculum of school districts and professional development programs for years. Established by the National Education Association and the Partnership for 21st Century Skills, these four components are a guide post for choosing specific tools, software and curriculum for the modern day, technologically advanced environment of today’s youth.

Your business technology partner should play a key role in helping bring those 4Cs to light. 

Topics: Office Equipment Partnering IT Consulting Production Print Technology Pain Business Continuity Technology Training Managed Services Provider Education Tips and Tools

Old School Swindling: How Social Engineering Uses Vintage Tactics to Slip Past Your Network's Defense

Social Engineering is really no different than any old school scam from the past, other than modern technology is the setting (for the modern attack)." - Justin Huffaker, Vice President of Strategic Technology, Datamax Inc.

Most recall the Martin Scorsese film “Catch Me if You Can,” which follows New York teen Frank Abagnale (played by Leonardo DiCaprio) posing as a Pan American World Airways pilot, a Georgia doctor and a Louisiana parish prosecutor to successfully execute million-dollar cons.

Abagnale’s ploys, while sophisticated, relied heavily on the ingrained, trusting nature of humans to carry out his elaborate schemes: Much like Social Engineering in 2018, some 60 years after Abagnale’s antics.

Topics: Network Management Managed Services IT Consulting Network Security Security Technology Training