The Datamax Thinking Blog

Educating, collaborating, and sparking ideas for maximizing the technology that matters.


5 Essential Endpoint Security Considerations When Purchasing MFPs

When it comes to security, MFPs should be treated just like any other endpoint on the network.

So, it's time to finally upgrade your copier(s) or MFP(s). How seriously have you considered security?

Although speeds, feeds, and cost of ownership are still relevant elements of pre-sale discovery and dialog, a heads-up sales consultant will also proactively introduce MFP Control and Security to the conversation. They know, when it comes to security, MFPs should be treated just like any other endpoint on the network.

Topics: Office Equipment Network Security Security Canon MFP Security Print Security

Unified Firmware Platform: A Steady Stream of Canon Copier Security

Canon’s Unified Firmware Platform (UFP) allows Canon imageRUNNER ADVANCE models to be updated with cutting-edge features, new functionality, and enhanced security measures on an ongoing basis.

Steady moving streams are critical to the quality and supply of drinking water, ensuring a continuous flow of clean water and recharging of underground aquifers.

Topics: Office Equipment Security Canon MFP Security

5 Signs Your Old Copier Could Be Creating Security Vulnerabilities

Many SMBs fail to recognize the copier for what it is today — just another device on the network, as susceptible to cyber attack as an email inbox or web browser.

"If it ain’t broke, don’t fix it."

I see this old, tired adage at play frequently when I visit offices and learn more about their printing environment. Whether it’s due to low volumes, reluctance to incur new costs, or just flat-out comfort factor, many businesses run their decade-plus-old copiers into the ground, much like one would an older vehicle that’s been paid for.

Topics: Office Equipment Print Management Security Cybersecurity MFP Security

Do You Have an Open Door Policy With Your Copier?

Is the information on your devices open to anyone who happens to walk inside your office? If so, it can certainly backfire on your organization, and blow the door open for leaking sensitive information.

An open door policy at your organization may be a great initiative for encouraging openness and transparency in the company. But it can also backfire if misused by employees.

Do you have a similar open door policy on your copier? Is the information on your devices open to anyone who happens to walk inside your office? If so, it can certainly backfire on your organization, and blow the door open for leaking sensitive information. It might be time for a change in policy. 

Topics: Office Equipment Print Management Security

Practical Business IT Security Tips for Your Entire Team

To remain secure against increasingly-sophisticated attacks, organizations need to take a more practical approach: One that involves heightened employee awareness and full executive stewardship of a collaborative, company-wide security initiative.

IT Security: It can often still be considered an “IT issue.”

But it’s more than that. Just as revenue and performance are routinely reviewed, assessed and collaborated on, security should be a talking point inside the executive boardroom and an initiative that involves all employees. It’s not just an IT issue. It’s a business issue that involves your entire organization.

Topics: Network Security Security Technology Training

5 New Cloud Device Management Features to Help SMBs Carve Better Workflows

Recently-announced features from uniFLOW Online demonstrate 5 key advantages for organizations looking to improve productivity and enhance security in their print environment. 

Athletes will go to extensive (even preposterous) lengths to capture and preserve that competitive edge.

Former Giants Pitcher Steve Kline once wore the same ball cap all season without washing it. His reasoning? The dirt kept him grounded “and reminded me where I came from.” Famous big-wave surfer Laird Hamilton, whose day starts at 5 a.m., consumes three strategically-planned breakfasts every morning to optimize both energy and recovery.

Topics: Document Workflow Print Management Scanning Security Cloud Technology Canon

4 Business Continuity Essentials to Keep Your Technology from Treading on Thin Ice

One can only tip-toe over network and infrastructure insecurities for so long before the surface beneath you cracks.

For ice fishing enthusiasts embracing their favorite winter pastime, the warning from officials is abundantly clear: don’t tread on thin ice! In fact, Minnesota’s Department of Natural Resources recommends ice at least 4 inches thick for foot travel.

A measurement any less than 4 inches could result in disaster.

The technology footpath that you tread across every day bears inherent risk. The cybersecurity climate is volatile, forcing organizations to be consistently mindful of the environment surrounding them. The solid technology foundation you create determines how confidently your organization can navigate with necessary tools to conduct business efficiently day to day.

Topics: Network Management Managed Services IT Consulting Network Security Security Business Continuity Managed Services Provider

DIY Print Production: Why We're 'All-In on In-House'

Whether you’re producing fast-turnaround, lower-length jobs or massive, one-time runs, more organizations are discovering the distinct advantage of going "All-In on In-House" production. 

In finding an effective process for getting your own high quality printed materials out the door, it’s hard to bet against the house. Particularly, your own.

Topics: Office Equipment Production Print Security Productivity Tips and Tools

Navigating the Compliance, Risk and Cybersecurity Landscape

With a legitimate framework in place, and the proper education continually enforced, employees can universally identify both risk levels and types and, more importantly… understand exactly what these findings mean. 

Finding themselves in an environment entangled with cyber threats and potential data breaches, the map to compliance that healthcare organizations unfold often leads to a risk analysis.

But these organizations should know that the journey does not stop there.

Topics: Network Security Security Healthcare Tips and Tools

Old School Swindling: How Social Engineering Uses Vintage Tactics to Slip Past Your Network's Defense

Social Engineering is really no different than any old school scam from the past, other than modern technology is the setting (for the modern attack)." - Justin Huffaker, Vice President of Strategic Technology, Datamax Inc.

Most recall the Martin Scorsese film “Catch Me if You Can,” which follows New York teen Frank Abagnale (played by Leonardo DiCaprio) posing as a Pan American World Airways pilot, a Georgia doctor and a Louisiana parish prosecutor to successfully execute million-dollar cons.

Abagnale’s ploys, while sophisticated, relied heavily on the ingrained, trusting nature of humans to carry out his elaborate schemes: Much like Social Engineering in 2018, some 60 years after Abagnale’s antics.

Topics: Network Management Managed Services IT Consulting Network Security Security Technology Training