The Datamax Thinking Blog

Educating, collaborating, and sparking ideas for maximizing the technology that matters.


Section 179 and Bonus Depreciation: 2023 Tax Incentives on Office Equipment Acquisition

Section 179 Deduction of the IRS Tax Code is an immediate expense deduction that business owners can take for purchases of depreciable business equipment. 

Continuing to invest in new technology equipment to maximize efficiency is a valuable endeavor for organizations looking for a competitive edge. It's even better when you can maximize tax deductions as well.

Section 179 and Bonus Depreciation are two components of the 2017 TCJA (Tax Cuts and Jobs Act) that present potential tax savings for your organization if you're in the market for copiers, printers, or other related technology hardware or software. To maximize the current incentive, qualifying equipment must be financed or purchased before January 1, 2024. Also of note: Beginning Jan. 1 of this year, bonus depreciation has begun to phase out over the next four years.

Topics: Office Equipment IT Consulting Color Printing LeaseCare Technology Procurement

Section 179 & Bonus Depreciation: Act Fast on Potential 2022 Tax Incentives for Office Technology Acquisition

Almost all types of “business equipment” new or used that your company buys or finances will qualify for the Section 179 Deduction and/or Bonus Depreciation.

Need a little additional "incentive" to close out your year with the acquisition of office technology? Section 179 and Bonus Depreciation are two components of the 2017 TCJA (Tax Cuts and Jobs Act) that present potential tax savings for your organization if you're in the market for copiers, printers, or other related technology hardware or software.

But you'll need to act fast.  To maximize the current incentive, qualifying equipment must be financed or purchased before January 1, 2023.

Topics: Office Equipment IT Consulting Color Printing LeaseCare Technology Procurement

Essential Layers of Cybersecurity Part 1: What is Multifactor Authentication?

Multifactor authentication simply applies another "layer" to prove that you are who you say you are.

There was a time when password best practices were everything. You remember the drill, right?
 
  • Must use a mix of letters, numbers, and characters,
  • Change your password every 30 days,
  • Use a minimum of eight characters,
  • then 12 characters,
  • enforce a higher password history to prevent reuse
  • etc., etc.
Topics: Network Management IT Consulting Network Security Managed Services Provider Social Engineering Ransomware

You've Been Schooled: 5 Types of Phishing Email Attacks You Should Be Educated On

Prepare your team for the next phishing threat by "schooling" them on these 5 types of attacks. 

As most outdoors enthusiasts can tell you, there's a reason it's called fishing, and not catching.

Despite all your preparation and skill, that coveted fish can be hard to catch. The same goes for phishing, a cybercriminal tactic that involves email messages crafted to capture a person or an organization's sensitive data. More and more, these sophisticated attacks are hard to catch.

Topics: Network Management Managed Services IT Consulting Network Security Cybersecurity

Begin Carving Out Your 2022 IT Security Plan With These 6 Questions

Good IT security practices require more than just a bundle of technology tossed at a potential problem.

Author and Poet Rumi once wrote: “I’ve said before that every craftsman searches for what’s not there to practice his craft.”

Topics: Network Management Managed Services IT Consulting Technology Training Managed Services Provider MFP Security

How Businesses Can Securely Work From Home

When supporting a remote workforce, understand that security controls shift. Therefore, firewalls, DNS, and IDS/IPS could be ineffective when employees head home.

As the novel coronavirus (COVID-19) continues to spread, many businesses are assessing how they can prioritize their employee safety and still maintain regular business operations.

Topics: Network Management Managed Services IT Consulting Network Security Business Continuity Managed Services Provider Cybersecurity Coronavirus Remote Workforce Planning

Tidy Up Business Processes, Transform Daily Workflow

Underneath all the manual processes, workarounds and network-related deficiencies lies an infrastructure in disarray – not unlike a closet crammed full of clothes collecting dust.

Home organization guru Marie Kondo has created enormous buzz with her Netflix series “Tidying Up with Marie Kondo.” 

Kondo’s unique methodology for decluttering clients’ living spaces, as quirky as it may seem, is fairly simple: Clients take all their personal belongings, put them in a pile, hold each one up, and ask themselves – “does it spark joy?” If not, it’s time to discard.

Topics: Document Workflow IT Consulting

Click It & Risk It: Guard Against Social Engineered Attacks with Proactive Cybersecurity Training

Beyond the infrastructure in place, what about employee education? What is your company doing to educate its team for recognizing and avoiding these sly, malicious tactics?

Human error. It’s an inevitable part of life and conducting business every day.

We’re only human, after all.

But such human error can be especially damaging in today’s cybersecurity climate. According to Verizon’s 2018 Data Breach Investigations Report, phishing or other forms of social engineering cause 93% of all data breaches. This means that employee negligence is generating a majority of cyber attacks. It's possibly only a matter of time before one of your employees is hoodwinked by human-manipulating tactics.

Topics: Network Management IT Consulting Network Security Technology Training

What's Your SMB's Document & Network Strategy Heading into Spring Training?

As your SMB heads into Spring Training, and you analyze your current technology roster - from document workflow to network infrastructure - what are some fundamental moves you can make to better your 2019 season forecast? 

The first glimpse of spring has arrived.

As my beloved Texas Rangers report to Surprise, Ariz. for Spring Training this week, it’s a time when baseball enthusiasts’ minds drift from the bone-chilling winter months and begin romanticized forecasts for their favorite team and the sunny April days ahead.

Topics: Document Management Network Management Document Workflow IT Consulting Productivity Tips and Tools

4 Business Continuity Essentials to Keep Your Technology from Treading on Thin Ice

One can only tip-toe over network and infrastructure insecurities for so long before the surface beneath you cracks.

For ice fishing enthusiasts embracing their favorite winter pastime, the warning from officials is abundantly clear: don’t tread on thin ice! In fact, Minnesota’s Department of Natural Resources recommends ice at least 4 inches thick for foot travel.

A measurement any less than 4 inches could result in disaster.

The technology footpath that you tread across every day bears inherent risk. The cybersecurity climate is volatile, forcing organizations to be consistently mindful of the environment surrounding them. The solid technology foundation you create determines how confidently your organization can navigate with necessary tools to conduct business efficiently day to day.

Topics: Network Management Managed Services IT Consulting Network Security Security Business Continuity Managed Services Provider