The Datamax Thinking Blog

Educating, collaborating, and sparking ideas for maximizing the technology that matters.


Secure Your Last Line of Defense With a Strategic Backup Solution

Businesses commit IT hardware and budgeted funds into their defense again cyber attacks. But have they considered their last line of defense …. their backup solution?

As a last line of defense at the battle of Gettysburg, the Union regiment led by Colonel Joshua Lawrence Chamberlain, at Little Round Top, made a desperate, yet strategic move that halted the Confederate assault and helped tilt the outcome of the war.

His men out of ammunition, they turned to bayonets. A single “right wheel forward” maneuver, orchestrated by Chamberlain, not only stopped the seemingly overwhelming Confederate threat, but reinforced the strength of a timely, calculated strategy.

Topics: Network Management Network Security Ransomware

5 Essential Endpoint Security Considerations When Purchasing MFPs

When it comes to security, MFPs should be treated just like any other endpoint on the network.

So, it's time to finally upgrade your copier(s) or MFP(s). How seriously have you considered security?

Although speeds, feeds, and cost of ownership are still relevant elements of pre-sale discovery and dialog, a heads-up sales consultant will also proactively introduce MFP Control and Security to the conversation. They know, when it comes to security, MFPs should be treated just like any other endpoint on the network.

Topics: Office Equipment Network Security Security Canon MFP Security Print Security

Datto Report: Ransomware Remains Major Cyber Menace in 2020

Top-to-bottom business awareness, employee education, multi-layered security protection, and proper business continuity planning continue to be a much needed prescription for avoiding the number one malware threat to SMBs.

As one menace to business livelihood (the COVID-19 pandemic) dominates headlines, another continues to lurk in the shadows as a significant threat to businesses of all sizes — ransomware.

Topics: Network Management Network Security Business Continuity Ransomware

How to Choose the Right Managed IT Service Provider For Your Business

When evaluating potential managed service providers, it’s important to look at both the hard metrics as well as the humanistic qualities of the company you will entrust with your technology landscape.

As security concerns take center stage and IT becomes increasingly complex, small to medium-sized businesses (SMBs) continue to seek the help of a managed IT services provider.

Topics: Network Management Managed Services Network Security Managed Services Provider

They've Gone Phishing: Avoid Getting Reeled in by COVID-19-Related Scams

As businesses navigate the rough seas of the ongoing pandemic, one thing’s for certain: Cybercriminals have gone phishing. Organizations must take the necessary precautions and remain vigilantly aware to avoid getting reeled in to these attacks.

Phishing attacks are nothing new. Neither is the propensity to attack during a time of crisis. Online scams like phishing, malware, and the various forms of social engineering become increasingly more effective when individuals are vulnerable, desperate, or just looking for answers.

Global concern over COVID-19 is the perfect bait.

Topics: Network Management Network Security Cybersecurity Ransomware Coronavirus

How Businesses Can Securely Work From Home

When supporting a remote workforce, understand that security controls shift. Therefore, firewalls, DNS, and IDS/IPS could be ineffective when employees head home.

As the novel coronavirus (COVID-19) continues to spread, many businesses are assessing how they can prioritize their employee safety and still maintain regular business operations.

Topics: Network Management Managed Services IT Consulting Network Security Business Continuity Managed Services Provider Cybersecurity Coronavirus Remote Workforce Planning

Ransomware Storm Rages On for Small to Medium-Sized Businesses

To maintain both their livelihood and their credibility, SMBs must be aware of, and must be prepared for, this persistent, potentially disastrous cybersecurity threat.

Anyone who thought the Ransomware storm that hovered over businesses for years had passed, should take a look at the radar. The forecast calls for more severe weather.

Topics: Network Management Network Security Cybersecurity Ransomware

Tax Season is Here: Have You Audited For Social Engineered Attacks?

This is not a sophisticated scam. However, it is an effective and profitable one and it happens to an increasing number of companies across America each year around tax time.

Tax season is here. Are you safe? That seems like an odd question to ask; nevertheless, with the increasing sophistication of cybercriminals it must be considered and answered.

Topics: Network Management Technology Support Network Security Social Engineering

3 Best Practices for Filling the Healthcare IT Security Gap

Nearly a third of all respondents (32%) said that they had never received cybersecurity training from their workplace but should have.

Healthcare today has its share of gaps: Gaps in healthcare access, gaps in the treatment of chronic diseases, and gaps in communication between patient and provider.

But what about the existing gaps in a medical facility's IT security plan?

Topics: Network Management Network Security Healthcare Tips and Tools MFP Security

Straight to the (Out) Source: 5 Questions to Ask a Potential Managed IT Partner

Considering a Managed IT agreement? Go straight to the partner you're looking to outsource to and ask them these five questions. These inquiries will reveal both their capabilities and what your expectations should be moving forward.

We are a nation of outsourcers. From groceries to household chores to business game plans, we hesitate little in handing it over to someone who specializes in x, y, or z.

Topics: Network Management Network Security