The Datamax Thinking Blog

Educating, collaborating, and sparking ideas for maximizing the technology that matters.


IT Security Breaches—It's Not Always The Bad Apple

81% of the respondents reported that negligent employees or other insiders have been responsible for at least one unintentional data breach within their organizations over the past two years. - The Human Factor in Data Protection Study¹

While companies will always be fearful of the malicious ‘bad apple’ employee, numerous studies have shown that most internal security breaches are accidental or unintentional; mostly a result of clever phishing tactics. Phishing is a scam featuring a malicious program posing as legitimate – an email seemingly sent by someone in your contacts, but the actual address is unfamiliar. Inadvertently, a well-meaning employee could succumb to such a scam by not realizing that something isn’t right. By properly identifying these causes, companies can not only inform employees of the risks, but can also reduce their exposure to these cyber-attacks. If employers take the time to educate employees on how to identify these threats, small business with limited resources can drastically reduce their own exposure at little to no additional cost.

“We have met the enemy and he is us.” – Walt Kelly

Topics: Network Management IT Consulting Technology Pain Network Security

Service Level Communications—The New Network Management Paradigm

Poor communication?  In the top three?  Really? That's not a misprint ... poor communication.

There are many benefits from embracing this new network management paradigm: improved uptime, enhanced customer service and end user support, more efficient operations, and improved budget management to name a few. These benefits are realistic and attainable, yet many managed service providers struggle to deliver the promised benefits. Given the advantages provided by new technology, what else is required to be successful providing managed network services? Experience in the marketplace has shown that companies will fire technology service providers primarily for one of three reasons:

Topics: Network Management Partnering IT Consulting Technology Support Technology Pain

A Crying Shame — Scams, Cons, And Ripoffs From The Internet

We must be vigilant regarding the Internet Con Artist because eventually we will be confronted with his scams.

“A Crying Shame” is written in large headline type across the cover page of a recent issue of Consumer Reports magazine. The byline states, “Seniors and their families lose $3 billion a year to con artists. What can we do to stop them?” The magazine contains an article focused on senior citizens who, as a group, are frequently targeted by con artists and their scams - often with devastating financial consequences. Several seniors are profiled and they share their stories of being duped in the hope that they can help others and prevent future pain and loss.

Topics: Network Management IT Consulting Technology Pain

The Technology Buffet — The Shortcomings Of Buying Without A Plan

Introducing multiple manufacturers into a technology infrastructure increases support complexity, which means extra costs.

One of the best things about working with companies in the SMB space (small and medium-sized businesses) is that there is never a dull moment. Technical people tend to be problem solvers and the interesting business models, creative growth strategies, aggressive goals, and unique challenges presented by these firms are part of what makes working with them so rewarding.

Topics: Network Management Partnering IT Consulting Technology Pain

How To Find The Right IT Partner

Finding the right partner can be very challenging. Our MSP Partner Checklist can help steer you in the right direction.

IT is an often misunderstood and sometimes scary topic for business owners and executives. You know what you want from your information technology, but have absolutely no idea what is involved to get you there. The responsibility to deliver the desired end results falls on either internal IT staff or through collaboration with a IT Managed Services Provider (MSP). The challenge becomes finding IT talent with the expertise to implement appropriate technology (how are you going to find that if you don't understand

Topics: Network Management Partnering Managed Services IT Consulting

Document Security Goes Mobile

As digital files become more prevalent, there will be an increased need for mobile security strategies and tools.

There have been many advances in the world of document workflow, specifically in regards to the capabilities found in the new breed of Multifunction Printers (MFPs). For years, MFPs have provided businesses the combined ability to print, copy, scan and fax from a centralized device and now, with the integration of powerful document workflow applications and the proliferation of mobile computing, they are enhancing business process like never before.

As a result, the MFP is more than just your average print output device; it has become the hub

Topics: Network Management Office Equipment Document Workflow Print Management Mobile Printing IT Consulting

The Technology Advocate–Helping Companies Make Smart IT Decisions

The Technology Advocate provides technical advise grounded in the business case and tailored to address the unique needs of each client organization.

Are you making good decisions about investments in your technology infrastructure? What business goals are you trying to accomplish? For many companies, the answer to both questions is a resounding "um..."

Organizations of all sizes use technology to conduct business functions ranging from simple communication to complex "big data" data analysis. Sometimes the adoption of technology is well conceived and cost effective, however all too often the acquisition and deployment of new

Topics: Network Management Partnering IT Consulting

Focus on Your Forte

Free yourself to stay on target and get back to business—your business—with Managed Services.

Take a moment and ask yourself two questions...

  1. How much time do you spend keeping up with the day-to-day operational needs of your business? and
  2. How much time is then left for you to actually spend on "the business?"

Chances are, if your company is managing everything alone, you don't spend as much time as you could on the business at hand. Organizations have a multitude of facets that are all continually

Topics: Network Management Document Workflow Print Management Managed Services

Virtues in Virtualization

The latest generation of virtual thinking and virtual technology is transforming business.

The time has come to seriously consider joining the ranks of smart companies that are getting on-board with one of today's hottest IT trends—virtualization.

What exactly is virtualization? Basically, it involves running multiple, independent operating systems—each with their own applications—on a single, physical server. The concept of virtual IT environment is actually decades old. So, why all the buzz now? In today's cost and environmentally conscious business arena, virtualization enables IT departments to

Topics: Network Management Managed Services IT Consulting

The Designated Technology Driver

Technology Management Outsourcing. Consider entrusting Datamax behind the wheel.

Every company has a destination to reach—a specific set of business goals and objectives they need to achieve. And most companies today know that largely, it's their technology that's going to get them there. So, one would assume that since technology is what ultimately drives business and determines its success or failure, most companies would have put a considerable amount of thought into who is driving their technology.

Topics: Network Management Partnering IT Consulting