Relevant Technology • Raving Results®

Our Locations  |  800.633.1526800.633.1526  |  Client Login

The Datamax Thinking Blog

Educating, collaborating, and sparking ideas for maximizing the technology that matters.


You've Been Schooled: 5 Types of Phishing Email Attacks You Should Be Educated On

Prepare your team for the next phishing threat by "schooling" them on these 5 types of attacks. 

As most outdoors enthusiasts can tell you, there's a reason it's called fishing, and not catching.

Despite all your preparation and skill, that coveted fish can be hard to catch. The same goes for phishing, a cybercriminal tactic that involves email messages crafted to capture a person or an organization's sensitive data. More and more, these sophisticated attacks are hard to catch.

Topics: Network Management Managed Services IT Consulting Network Security Cybersecurity

Begin Carving Out Your 2022 IT Security Plan With These 6 Questions

Good IT security practices require more than just a bundle of technology tossed at a potential problem.

Author and Poet Rumi once wrote: “I’ve said before that every craftsman searches for what’s not there to practice his craft.”

Topics: Network Management Managed Services IT Consulting Technology Training Managed Services Provider MFP Security

Secure Your Last Line of Defense With a Strategic Backup Solution

Businesses commit IT hardware and budgeted funds into their defense again cyber attacks. But have they considered their last line of defense …. their backup solution?

As a last line of defense at the battle of Gettysburg, the Union regiment led by Colonel Joshua Lawrence Chamberlain, at Little Round Top, made a desperate, yet strategic move that halted the Confederate assault and helped tilt the outcome of the war.

His men out of ammunition, they turned to bayonets. A single “right wheel forward” maneuver, orchestrated by Chamberlain, not only stopped the seemingly overwhelming Confederate threat, but reinforced the strength of a timely, calculated strategy.

Topics: Network Management Network Security Ransomware

Datto Report: Ransomware Remains Major Cyber Menace in 2020

Top-to-bottom business awareness, employee education, multi-layered security protection, and proper business continuity planning continue to be a much needed prescription for avoiding the number one malware threat to SMBs.

As one menace to business livelihood (the COVID-19 pandemic) dominates headlines, another continues to lurk in the shadows as a significant threat to businesses of all sizes — ransomware.

Topics: Network Management Network Security Business Continuity Ransomware

How to Choose the Right Managed IT Service Provider For Your Business

When evaluating potential managed service providers, it’s important to look at both the hard metrics as well as the humanistic qualities of the company you will entrust with your technology landscape.

As security concerns take center stage and IT becomes increasingly complex, small to medium-sized businesses (SMBs) continue to seek the help of a managed IT services provider.

Topics: Network Management Managed Services Network Security Managed Services Provider

COVID-19: 5 Office Technology Resources for the Cloudy Business Climate Ahead

Moving forward, as a business, what resources do you need to successfully traverse the cloudy, undetermined skies surrounding COVID-19?

There’s an old Texas saying … “there is nothing between Amarillo and the North Pole but a barbed wire fence.” Another? “If you don’t like the weather in Texas, just wait a minute.”

Topics: Network Management Unified Communications Coronavirus

They've Gone Phishing: Avoid Getting Reeled in by COVID-19-Related Scams

As businesses navigate the rough seas of the ongoing pandemic, one thing’s for certain: Cybercriminals have gone phishing. Organizations must take the necessary precautions and remain vigilantly aware to avoid getting reeled in to these attacks.

Phishing attacks are nothing new. Neither is the propensity to attack during a time of crisis. Online scams like phishing, malware, and the various forms of social engineering become increasingly more effective when individuals are vulnerable, desperate, or just looking for answers.

Global concern over COVID-19 is the perfect bait.

Topics: Network Management Network Security Cybersecurity Ransomware Coronavirus

A Remote Reality: 5 Cybersecurity Tips Amid the Work From Home Tidal Wave

When huddled with your laptop into the kitchen nook, or spread across the couch, the comfort of your home should never soften your cybersecurity awareness. Don't let the tidal wave come crashing down on you and your business. 

If you’ve joined the Work From Home tidal wave in the last month (16 million of you, according to Slack), your home is now an extension of your office.

Topics: Network Management Unified Communications Cybersecurity Coronavirus Remote Workforce Planning Remote Work Work From Home

How Businesses Can Securely Work From Home

When supporting a remote workforce, understand that security controls shift. Therefore, firewalls, DNS, and IDS/IPS could be ineffective when employees head home.

As the novel coronavirus (COVID-19) continues to spread, many businesses are assessing how they can prioritize their employee safety and still maintain regular business operations.

Topics: Network Management Managed Services IT Consulting Network Security Business Continuity Managed Services Provider Cybersecurity Coronavirus Remote Workforce Planning

10 Remote Work Statistics Your Business Should Know in 2020

How organizations accommodate and — more importantly, manage — this workforce trend moving forward is an important discussion to have with their trusted technology partner.

The topic of a remote workforce has become a hot one this week as news of the coronavirus pandemic continues to evolve.

Topics: Network Management Managed Services Provider VoIP Phone Systems Unified Communications Coronavirus Remote Workforce Planning