The Datamax Thinking Blog

Educating, collaborating, and sparking ideas for maximizing the technology that matters.


Old School Swindling: How Social Engineering Uses Vintage Tactics to Slip Past Your Network's Defense

Social Engineering is really no different than any old school scam from the past, other than modern technology is the setting (for the modern attack)." - Justin Huffaker, Vice President of Strategic Technology, Datamax Inc.

Most recall the Martin Scorsese film “Catch Me if You Can,” which follows New York teen Frank Abagnale (played by Leonardo DiCaprio) posing as a Pan American World Airways pilot, a Georgia doctor and a Louisiana parish prosecutor to successfully execute million-dollar cons.

Abagnale’s ploys, while sophisticated, relied heavily on the ingrained, trusting nature of humans to carry out his elaborate schemes: Much like Social Engineering in 2018, some 60 years after Abagnale’s antics.

Topics: Network Management Managed Services IT Consulting Network Security Security Technology Training

Prevent Undetected Attack : 10 Safety Tips that Guard Against Ransomware

Ransomware, namely the WannaCry and NotPetya viruses, filled newsfeeds last year as the most prolific cyber security attacks in history. How prolific? The two Ransomware attacks combined to infect 200,000 machines in 100 countries, and NotPetya caused an estimated $1.2 billion in damages.

The most common shark attack against humans is known as the “hit-and-run” attack. Typically occurring in the surf zone amid murky waters, the swimmer or surfer seldom even sees its attacker.

The same could certainly be said for Ransomware in 2017.

Topics: Network Management Managed Services Network Security Security Data Back-Up

Diagnosing Your Data: Is Your Tech Stack Compliant with GDPR?

This legislation is a game changer for how applicable organizations process, retain and store customer data. 

On May 25, the European Union’s General Data Protection Regulation (GDPR) was officially enforced, representing a watershed moment for consumer data protection and privacy moving forward.

This legislation, designed to better unify and protect data privacy for European Union citizens, applies to those within EU-member countries, so US-based companies may not think that this overseas legislation is relevant to their everyday business.  These companies should think again: The GDPR could be very relevant to you and the way you currently collect and store data.

Topics: Network Management Managed Services Security Data Back-Up Managed Services Provider

Five Network Security Questions to Consider as You Seek Peace of Mind

A Network Risk Assessment can dispel security concerns and propel your team to the ultimate goal for your organization and its network infrastructure – peace of mind.

For me, there’s perhaps no better mind-clearing, stress-relieving pastime then a jaunt along the trails at a nearby state park. The sun poking its way through the towering pine trees, coupled with the low-volume sounds of the early morning surrounding me, provides me peace of mind to empower a productive week ahead.

Isn’t peace of mind – in our homes and our workplace what we all ultimately crave? Given today’s volatile cyber security climate, fear and uncertainty of everything from downtime to network intrusion can disrupt an organization’s collective contentment.

Topics: Network Management Managed Services IT Consulting Technology Support Network Security Security

Feeling the Heat? Regulate Your IT Climate with Managed Network Services

A Managed Network Services program fine tunes and establishes control over all the moving components of your network.

Your business's network – much like, say, your home’s air conditioning unit - steadily hums along, quietly unnoticed, with what seems like relative ease. But day-to-day maintenance and unexpected downtime can make any IT administrator feel the heat in a hurry.

Topics: Network Management Managed Services Network Security

Why Qualified IT Support Is Becoming Harder (and More Expensive) to Find

As companies of every size rely on IT to operate, it’s becoming more difficult to find and hire the IT expertise you need. Is there an alternative?

When it comes to IT, many small and medium businesses struggle to find the right balance of reliability, responsiveness, and cost – not to mention technical expertise. In most cases, IT support is usually one of four ways:

  • Your niece, nephew, or first born, who is “really technical” and oversees the details for you
  • A company a business friend of yours uses that you call when your computers start freezing
  • A dedicated, in-house IT department that you keep on your payroll and “does it all”
  • A proactively, managed provider who provides a blend of remote monitoring, preventative maintenance, and help desk support when you need it

Understanding the difference between these types of support is critical to protecting your business. Hackers are everywhere, they want your information, and they are just waiting to take advantage of your small business’s network vulnerabilities.

Topics: Network Management Partnering Managed Services IT Consulting Technology Support Technology Pain Network Security

6 Cybersecurity Tips That Will Help Keep Your Data Secure

Employees are a big weakness in any information security plan. These 6 tips will make your security stronger.

The biggest security hole in any business isn't the network or your computer assets or the various programs you operate on.

The biggest security threat to any business is the people that work there.

Because people do stupid things. And when they do stupid things with company information (like leaving a laptop in the backseat of a car with customer information), your company is at risk of a data breach.

That's why when it comes to cybersecurity, paying attention only to the IT side of things isn't good enough (though that's essential, of course).

You need to train your users.

Here are a few tips to help you get started on training employees on information security.

Topics: Network Management Managed Services IT Consulting Technology Pain Network Security Security Cloud Technology Business Continuity Data Back-Up

Information Security and Why You Need a Cybersecurity Risk Assessment

You want to be HIPAA-compliant? You need to perform a risk assessment.

It shouldn't be a surprise to know that security research shows that the healthcare industry is a prime target for hackers and assorted cybercriminals.

From insurance companies to small doctors offices to research facilities to hospitals, all have a treasure-trove of personal information that criminals are itching to get their hands on.

Not involved in the healthcare industry? If you're reading this and are in manufacturing, financial services, government, or transportation; those round out the top five targets.

“Only” a small business and think you're safe?

Topics: Network Management Managed Services IT Consulting Network Security Security Healthcare Tips and Tools Data Back-Up MFP Security

Data Backup Protects Your Small Business From Ransomware Attacks

Data backup is (or should be) a part of every businesses IT strategy. Add in the fact, that data backup is a final line of defense against ransomware, and you're crazy if you don't have an online backup strategy.

Cyber attacks on small businesses is BIG BUSINESS for cybercriminals. That’s because they know that you may not have the money (or the muscle) to secure your small business’s network. Even worse is the fact that there is little or no recourse for the small business owner who falls prey to a ransomware attack. Many simply pony up the money just to get their critical information back.

Topics: Network Management Managed Services IT Consulting Network Security Security Data Back-Up

Don't Take a Recess From Business Continuity — Protect Your Law Firm

If a firm with 25 employees who bill at $200 per hour lose one hour of uptime, that’s $60,000 a month on lost opportunity. — Attorney at Law Magazine

As attorneys, you’re committed to providing your clients with the best legal advice and service possible. In order to do so, you recognize that in the world of law, time stops for no one. Court dates are appointed, not chosen. Contracts have deadlines. Client meetings are a must. Any type of power outage, therefore, is a huge threat to law firms. As a lawyer you have a finite amount of time to build your case, gather materials, research, etc. Should an outage strike your firm as a result of a natural (or most likely man made) disaster during your last few days before court, for example, it could be detrimental to the outcome of a case.

Topics: Network Management Network Security Cloud Technology Legal Tips and Tools Business Continuity Data Back-Up