The Datamax Thinking Blog

Educating, collaborating, and sparking ideas for maximizing the technology that matters.


Continuity Of Voice In Disaster (COVID-19): Prepared to Work Remotely?

While the impact of the virus is yet to be determined, the COVID-19 outbreak serves as one poignant example of the need for agility, flexibility and cohesion in the way organizations communicate (via voice or data) and conduct business.

What happens when working remotely ceases to be a luxury … and starts to become a necessity?

With the series of events unfolding surrounding the Coronavirus, employers are making operational adjustments to comply with a quickly-evolving public narrative — one that may soon include a work-from-home strategy.  Given these circumstances, how do businesses maintain effective communication with customers? With their team? How do they preserve standard business operations if employees aren't at the office? 

Topics: Network Management Business Continuity VoIP Phone Systems Unified Communications Coronavirus Remote Workforce Planning

Ransomware Storm Rages On for Small to Medium-Sized Businesses

To maintain both their livelihood and their credibility, SMBs must be aware of, and must be prepared for, this persistent, potentially disastrous cybersecurity threat.

Anyone who thought the Ransomware storm that hovered over businesses for years had passed, should take a look at the radar. The forecast calls for more severe weather.

Topics: Network Management Network Security Cybersecurity Ransomware

Tax Season is Here: Have You Audited For Social Engineered Attacks?

This is not a sophisticated scam. However, it is an effective and profitable one and it happens to an increasing number of companies across America each year around tax time.

Tax season is here. Are you safe? That seems like an odd question to ask; nevertheless, with the increasing sophistication of cybercriminals it must be considered and answered.

Topics: Network Management Technology Support Network Security Social Engineering

3 Best Practices for Filling the Healthcare IT Security Gap

Nearly a third of all respondents (32%) said that they had never received cybersecurity training from their workplace but should have.

Healthcare today has its share of gaps: Gaps in healthcare access, gaps in the treatment of chronic diseases, and gaps in communication between patient and provider.

But what about the existing gaps in a medical facility's IT security plan?

Topics: Network Management Network Security Healthcare Tips and Tools MFP Security

Straight to the (Out) Source: 5 Questions to Ask a Potential Managed IT Partner

Considering a Managed IT agreement? Go straight to the partner you're looking to outsource to and ask them these five questions. These inquiries will reveal both their capabilities and what your expectations should be moving forward.

We are a nation of outsourcers. From groceries to household chores to business game plans, we hesitate little in handing it over to someone who specializes in x, y, or z.

Topics: Network Management Network Security

5 Stats that Prove the Communication Revolution has Reached the Workforce

It's an old, universal truth: effective communication is key to team and organizational success. Without adapting to more intuitive, better integrated communication and collaboration tools, organizations will continue to hit the same communication barriers again and again. 

There’s this joke about millennials. Give a millennial a smartphone and he’ll live for a day… any longer than that and he’ll become a mindless, soulless, social media zombie.

Yes, it’s an all-too-common dig — a boomer scoffing at the 20-something across the room with his face buried in his phone. But all jokes aside, the next generation of communication systems and devices is transforming the way we work. With millennials now making up the largest generation in the U.S. labor force, the definitions of both “workplace” and “workday” are becoming steadily more hazy.

Topics: Network Management VoIP Phone Systems Unified Communications

Click It & Risk It: Guard Against Social Engineered Attacks with Proactive Cybersecurity Training

Beyond the infrastructure in place, what about employee education? What is your company doing to educate its team for recognizing and avoiding these sly, malicious tactics?

Human error. It’s an inevitable part of life and conducting business every day.

We’re only human, after all.

But such human error can be especially damaging in today’s cybersecurity climate. According to Verizon’s 2018 Data Breach Investigations Report, phishing or other forms of social engineering cause 93% of all data breaches. This means that employee negligence is generating a majority of cyber attacks. It's possibly only a matter of time before one of your employees is hoodwinked by human-manipulating tactics.

Topics: Network Management IT Consulting Network Security Technology Training

What's Your SMB's Document & Network Strategy Heading into Spring Training?

As your SMB heads into Spring Training, and you analyze your current technology roster - from document workflow to network infrastructure - what are some fundamental moves you can make to better your 2019 season forecast? 

The first glimpse of spring has arrived.

As my beloved Texas Rangers report to Surprise, Ariz. for Spring Training this week, it’s a time when baseball enthusiasts’ minds drift from the bone-chilling winter months and begin romanticized forecasts for their favorite team and the sunny April days ahead.

Topics: Document Management Network Management Document Workflow IT Consulting Productivity Tips and Tools

5 Technology Trends that Will Help Your Organization Soar Ahead in 2019

Those who embrace change in the way they conduct business every day, across an evolving digital landscape - from automating tasks to taking a firm stance on data and network security – will produce measurable business value and soar ahead of the flock. 

Former General Electric CEO Jack Welch once said, “change before you have to.”

Innovative leaders understand well the idea of change as the rule rather than the exception. In mid-flight, they do not hesitate to travel beyond the flock of the industry companions around them, even if it means flying solo.

Technology plays an intimate role in the potential innovation of businesses, particularly in seeking a competitive edge and a notable advantage in productivity. Those who embrace change in the way they conduct business every day, across an evolving digital landscape - from automating tasks to taking a firm stance on data and network security – will produce measurable business value and soar ahead of the flock. Assuming, of course, they do so strategically and with a partner that understands and thoughtfully considers their core business objectives.

Topics: Document Management Network Management Office Equipment Content Management Production Print Network Security Cloud Technology Managed Services Provider

4 Business Continuity Essentials to Keep Your Technology from Treading on Thin Ice

One can only tip-toe over network and infrastructure insecurities for so long before the surface beneath you cracks.

For ice fishing enthusiasts embracing their favorite winter pastime, the warning from officials is abundantly clear: don’t tread on thin ice! In fact, Minnesota’s Department of Natural Resources recommends ice at least 4 inches thick for foot travel.

A measurement any less than 4 inches could result in disaster.

The technology footpath that you tread across every day bears inherent risk. The cybersecurity climate is volatile, forcing organizations to be consistently mindful of the environment surrounding them. The solid technology foundation you create determines how confidently your organization can navigate with necessary tools to conduct business efficiently day to day.

Topics: Network Management Managed Services IT Consulting Network Security Security Business Continuity Managed Services Provider