The Datamax Thinking Blog

Educating, collaborating, and sparking ideas for maximizing the technology that matters.


5 Technology Trends that Will Help Your Organization Soar Ahead in 2019

Those who embrace change in the way they conduct business every day, across an evolving digital landscape - from automating tasks to taking a firm stance on data and network security – will produce measurable business value and soar ahead of the flock. 

Former General Electric CEO Jack Welch once said, “change before you have to.”

Innovative leaders understand well the idea of change as the rule rather than the exception. In mid-flight, they do not hesitate to travel beyond the flock of the industry companions around them, even if it means flying solo.

Technology plays an intimate role in the potential innovation of businesses, particularly in seeking a competitive edge and a notable advantage in productivity. Those who embrace change in the way they conduct business every day, across an evolving digital landscape - from automating tasks to taking a firm stance on data and network security – will produce measurable business value and soar ahead of the flock. Assuming, of course, they do so strategically and with a partner that understands and thoughtfully considers their core business objectives.

Topics: Document Management Network Management Office Equipment Content Management Production Print Network Security Cloud Technology Managed Services Provider

Overcoming Technology Challenges through Collaboration: Top Blog Posts of 2018

The dedicated team of scribes here feel that through collaboration, we can strategically identify technology challenges and properly disseminate our carefully crafted ideas on overcoming them. 

Perhaps without coincidence, our top read blog for 2018 was on the topic of “effective collaboration.”

Collaboration:  It’s a key word in defining how the Datamax Thinking Blog operates. We remain committed in our pursuit of  “educating, collaborating, and sparking ideas for maximizing the technology that matters” - be it office equipment, document workflow, network security and many business technology initiatives in between.

The dedicated team of scribes here feel that through collaboration, we can strategically identify technology challenges and properly disseminate our carefully crafted ideas on overcoming them. 

Topics: Document Management Office Equipment Document Workflow Creating Raving Fans Network Security Productivity Tips and Tools Education Tips and Tools Net Promoter Score

4 Business Continuity Essentials to Keep Your Technology from Treading on Thin Ice

One can only tip-toe over network and infrastructure insecurities for so long before the surface beneath you cracks.

For ice fishing enthusiasts embracing their favorite winter pastime, the warning from officials is abundantly clear: don’t tread on thin ice! In fact, Minnesota’s Department of Natural Resources recommends ice at least 4 inches thick for foot travel.

A measurement any less than 4 inches could result in disaster.

The technology footpath that you tread across every day bears inherent risk. The cybersecurity climate is volatile, forcing organizations to be consistently mindful of the environment surrounding them. The solid technology foundation you create determines how confidently your organization can navigate with necessary tools to conduct business efficiently day to day.

Topics: Network Management Managed Services IT Consulting Network Security Security Business Continuity Managed Services Provider

Navigating the Compliance, Risk and Cybersecurity Landscape

With a legitimate framework in place, and the proper education continually enforced, employees can universally identify both risk levels and types and, more importantly… understand exactly what these findings mean. 

Finding themselves in an environment entangled with cyber threats and potential data breaches, the map to compliance that healthcare organizations unfold often leads to a risk analysis.

But these organizations should know that the journey does not stop there.

Topics: Network Security Security Healthcare Tips and Tools

Old School Swindling: How Social Engineering Uses Vintage Tactics to Slip Past Your Network's Defense

Social Engineering is really no different than any old school scam from the past, other than modern technology is the setting (for the modern attack)." - Justin Huffaker, Vice President of Strategic Technology, Datamax Inc.

Most recall the Martin Scorsese film “Catch Me if You Can,” which follows New York teen Frank Abagnale (played by Leonardo DiCaprio) posing as a Pan American World Airways pilot, a Georgia doctor and a Louisiana parish prosecutor to successfully execute million-dollar cons.

Abagnale’s ploys, while sophisticated, relied heavily on the ingrained, trusting nature of humans to carry out his elaborate schemes: Much like Social Engineering in 2018, some 60 years after Abagnale’s antics.

Topics: Network Management Managed Services IT Consulting Network Security Security Technology Training

Prevent Undetected Attack : 10 Safety Tips that Guard Against Ransomware

Ransomware, namely the WannaCry and NotPetya viruses, filled newsfeeds last year as the most prolific cyber security attacks in history. How prolific? The two Ransomware attacks combined to infect 200,000 machines in 100 countries, and NotPetya caused an estimated $1.2 billion in damages.

The most common shark attack against humans is known as the “hit-and-run” attack. Typically occurring in the surf zone amid murky waters, the swimmer or surfer seldom even sees its attacker.

The same could certainly be said for Ransomware in 2017.

Topics: Network Management Managed Services Network Security Security Data Back-Up

Five Network Security Questions to Consider as You Seek Peace of Mind

A Network Risk Assessment can dispel security concerns and propel your team to the ultimate goal for your organization and its network infrastructure – peace of mind.

For me, there’s perhaps no better mind-clearing, stress-relieving pastime then a jaunt along the trails at a nearby state park. The sun poking its way through the towering pine trees, coupled with the low-volume sounds of the early morning surrounding me, provides me peace of mind to empower a productive week ahead.

Isn’t peace of mind – in our homes and our workplace what we all ultimately crave? Given today’s volatile cyber security climate, fear and uncertainty of everything from downtime to network intrusion can disrupt an organization’s collective contentment.

Topics: Network Management Managed Services IT Consulting Technology Support Network Security Security

Feeling the Heat? Regulate Your IT Climate with Managed Network Services

A Managed Network Services program fine tunes and establishes control over all the moving components of your network.

Your business's network – much like, say, your home’s air conditioning unit - steadily hums along, quietly unnoticed, with what seems like relative ease. But day-to-day maintenance and unexpected downtime can make any IT administrator feel the heat in a hurry.

Topics: Network Management Managed Services Network Security

Why Qualified IT Support Is Becoming Harder (and More Expensive) to Find

As companies of every size rely on IT to operate, it’s becoming more difficult to find and hire the IT expertise you need. Is there an alternative?

When it comes to IT, many small and medium businesses struggle to find the right balance of reliability, responsiveness, and cost – not to mention technical expertise. In most cases, IT support is usually one of four ways:

  • Your niece, nephew, or first born, who is “really technical” and oversees the details for you
  • A company a business friend of yours uses that you call when your computers start freezing
  • A dedicated, in-house IT department that you keep on your payroll and “does it all”
  • A proactively, managed provider who provides a blend of remote monitoring, preventative maintenance, and help desk support when you need it

Understanding the difference between these types of support is critical to protecting your business. Hackers are everywhere, they want your information, and they are just waiting to take advantage of your small business’s network vulnerabilities.

Topics: Network Management Partnering Managed Services IT Consulting Technology Support Technology Pain Network Security

Must Read Blogs of 2017: Get the Most Out of Your Copier

It's no wonder that organizations are more active than ever in pursuing solutions to streamline traditional methods of managing documents. 

Every year, I learn more about copiers, document management, workflow, and, increasingly, managed IT topics than I did they year before.

I do my best to pass on what I learn to you.

Here are the 10 most popular posts in 2017. How to get the best service. Tips for HIPAA compliance. Scanning tips. How to track printing to keep costs down.

Read on for insights into those topics – and more – to get yourself ready for 2018!

Topics: Document Management Office Equipment Document Workflow Print Management Managed Services Technology Support Scanning Did You Know? Network Security Security Productivity Tips and Tools Data Back-Up