The Datamax Thinking Blog

Educating, collaborating, and sparking ideas for maximizing the technology that matters.


The 4 Reasons You Quit Your IT Partner

IT service partners often fail for one (or all) of these reasons: data loss, poor communication / customer service, downtime, and security breach. How's your partner doing?

Not every service partner will meet your expectations.

I know, I know; not a particularly shocking or unexpected revelation. We've all been disappointed in business services, whether it was the company that built your deck or the one that attempted to manage your network.

Sometimes you choose the wrong company. 

Topics: Network Management Managed Services IT Consulting Technology Support Technology Pain Network Security

Keeping Score: Evaluating the Technology Infrastructure Within Your Business

Establishing quantifiable, standardized benchmarks which are then scored will allow senior business executives to begin assessing, and managing, their technology infrastructure as a whole.

Working with small and medium-sized businesses and helping manage their technology is as challenging as it is rewarding. Although every business is different, there are aspects common to all. For example, the business of an architect is different than a CPA, yet each must communicate, each must meet payroll, and each must be able to manage finances.

Topics: Network Management Managed Services IT Consulting Technology Pain

Successful IT – Fire Yourself and Hire Managed Network Services

Managed network services is more challenging than most people think it is. You know that though, don’t you?

Well guess what? You’re fired!

And thank goodness for it! There are a few truisms in life, and I believe one of them is that no matter how easy something may appear on the surface; it’s almost always at least twice as hard to actually do it (and twice as hard is just for starters).

Topics: Network Management Managed Services IT Consulting

IT Security Breaches—It's Not Always The Bad Apple

81% of the respondents reported that negligent employees or other insiders have been responsible for at least one unintentional data breach within their organizations over the past two years. - The Human Factor in Data Protection Study¹

While companies will always be fearful of the malicious ‘bad apple’ employee, numerous studies have shown that most internal security breaches are accidental or unintentional; mostly a result of clever phishing tactics. Phishing is a scam featuring a malicious program posing as legitimate – an email seemingly sent by someone in your contacts, but the actual address is unfamiliar. Inadvertently, a well-meaning employee could succumb to such a scam by not realizing that something isn’t right. By properly identifying these causes, companies can not only inform employees of the risks, but can also reduce their exposure to these cyber-attacks. If employers take the time to educate employees on how to identify these threats, small business with limited resources can drastically reduce their own exposure at little to no additional cost.

“We have met the enemy and he is us.” – Walt Kelly

Topics: Network Management IT Consulting Technology Pain Network Security

Service Level Communications—The New Network Management Paradigm

Poor communication?  In the top three?  Really? That's not a misprint ... poor communication.

There are many benefits from embracing this new network management paradigm: improved uptime, enhanced customer service and end user support, more efficient operations, and improved budget management to name a few. These benefits are realistic and attainable, yet many managed service providers struggle to deliver the promised benefits. Given the advantages provided by new technology, what else is required to be successful providing managed network services? Experience in the marketplace has shown that companies will fire technology service providers primarily for one of three reasons:

Topics: Network Management Partnering IT Consulting Technology Support Technology Pain

A Crying Shame — Scams, Cons, And Ripoffs From The Internet

We must be vigilant regarding the Internet Con Artist because eventually we will be confronted with his scams.

“A Crying Shame” is written in large headline type across the cover page of a recent issue of Consumer Reports magazine. The byline states, “Seniors and their families lose $3 billion a year to con artists. What can we do to stop them?” The magazine contains an article focused on senior citizens who, as a group, are frequently targeted by con artists and their scams - often with devastating financial consequences. Several seniors are profiled and they share their stories of being duped in the hope that they can help others and prevent future pain and loss.

Topics: Network Management IT Consulting Technology Pain

The Technology Buffet — The Shortcomings Of Buying Without A Plan

Introducing multiple manufacturers into a technology infrastructure increases support complexity, which means extra costs.

One of the best things about working with companies in the SMB space (small and medium-sized businesses) is that there is never a dull moment. Technical people tend to be problem solvers and the interesting business models, creative growth strategies, aggressive goals, and unique challenges presented by these firms are part of what makes working with them so rewarding.

Topics: Network Management Partnering IT Consulting Technology Pain

How To Find The Right IT Partner

Finding the right partner can be very challenging. Our MSP Partner Checklist can help steer you in the right direction.

IT is an often misunderstood and sometimes scary topic for business owners and executives. You know what you want from your information technology, but have absolutely no idea what is involved to get you there. The responsibility to deliver the desired end results falls on either internal IT staff or through collaboration with a IT Managed Services Provider (MSP). The challenge becomes finding IT talent with the expertise to implement appropriate technology (how are you going to find that if you don't understand

Topics: Network Management Partnering Managed Services IT Consulting

Document Security Goes Mobile

As digital files become more prevalent, there will be an increased need for mobile security strategies and tools.

There have been many advances in the world of document workflow, specifically in regards to the capabilities found in the new breed of Multifunction Printers (MFPs). For years, MFPs have provided businesses the combined ability to print, copy, scan and fax from a centralized device and now, with the integration of powerful document workflow applications and the proliferation of mobile computing, they are enhancing business process like never before.

As a result, the MFP is more than just your average print output device; it has become the hub

Topics: Network Management Office Equipment Document Workflow Print Management Mobile Printing IT Consulting

The Technology Advocate–Helping Companies Make Smart IT Decisions

The Technology Advocate provides technical advise grounded in the business case and tailored to address the unique needs of each client organization.

Are you making good decisions about investments in your technology infrastructure? What business goals are you trying to accomplish? For many companies, the answer to both questions is a resounding "um..."

Organizations of all sizes use technology to conduct business functions ranging from simple communication to complex "big data" data analysis. Sometimes the adoption of technology is well conceived and cost effective, however all too often the acquisition and deployment of new

Topics: Network Management Partnering IT Consulting