The Datamax Thinking Blog

Educating, collaborating, and sparking ideas for maximizing the technology that matters.


Do You Have an Open Door Policy With Your Copier?

Is the information on your devices open to anyone who happens to walk inside your office? If so, it can certainly backfire on your organization, and blow the door open for leaking sensitive information.

An open door policy at your organization may be a great initiative for encouraging openness and transparency in the company. But it can also backfire if misused by employees.

Do you have a similar open door policy on your copier? Is the information on your devices open to anyone who happens to walk inside your office? If so, it can certainly backfire on your organization, and blow the door open for leaking sensitive information. It might be time for a change in policy. 

Topics: Office Equipment Print Management Security

Practical Business IT Security Tips for Your Entire Team

To remain secure against increasingly-sophisticated attacks, organizations need to take a more practical approach: One that involves heightened employee awareness and full executive stewardship of a collaborative, company-wide security initiative.

IT Security: It can often still be considered an “IT issue.”

But it’s more than that. Just as revenue and performance are routinely reviewed, assessed and collaborated on, security should be a talking point inside the executive boardroom and an initiative that involves all employees. It’s not just an IT issue. It’s a business issue that involves your entire organization.

Topics: Network Security Security Technology Training

5 New Cloud Device Management Features to Help SMBs Carve Better Workflows

Recently-announced features from uniFLOW Online demonstrate 5 key advantages for organizations looking to improve productivity and enhance security in their print environment. 

Athletes will go to extensive (even preposterous) lengths to capture and preserve that competitive edge.

Former Giants Pitcher Steve Kline once wore the same ball cap all season without washing it. His reasoning? The dirt kept him grounded “and reminded me where I came from.” Famous big-wave surfer Laird Hamilton, whose day starts at 5 a.m., consumes three strategically-planned breakfasts every morning to optimize both energy and recovery.

Topics: Document Workflow Print Management Scanning Security Cloud Technology Canon

4 Business Continuity Essentials to Keep Your Technology from Treading on Thin Ice

One can only tip-toe over network and infrastructure insecurities for so long before the surface beneath you cracks.

For ice fishing enthusiasts embracing their favorite winter pastime, the warning from officials is abundantly clear: don’t tread on thin ice! In fact, Minnesota’s Department of Natural Resources recommends ice at least 4 inches thick for foot travel.

A measurement any less than 4 inches could result in disaster.

The technology footpath that you tread across every day bears inherent risk. The cybersecurity climate is volatile, forcing organizations to be consistently mindful of the environment surrounding them. The solid technology foundation you create determines how confidently your organization can navigate with necessary tools to conduct business efficiently day to day.

Topics: Network Management Managed Services IT Consulting Network Security Security Business Continuity Managed Services Provider

DIY Print Production: Why We're 'All-In on In-House'

Whether you’re producing fast-turnaround, lower-length jobs or massive, one-time runs, more organizations are discovering the distinct advantage of going "All-In on In-House" production. 

In finding an effective process for getting your own high quality printed materials out the door, it’s hard to bet against the house. Particularly, your own.

Topics: Office Equipment Production Print Security Productivity Tips and Tools

Navigating the Compliance, Risk and Cybersecurity Landscape

With a legitimate framework in place, and the proper education continually enforced, employees can universally identify both risk levels and types and, more importantly… understand exactly what these findings mean. 

Finding themselves in an environment entangled with cyber threats and potential data breaches, the map to compliance that healthcare organizations unfold often leads to a risk analysis.

But these organizations should know that the journey does not stop there.

Topics: Network Security Security Healthcare Tips and Tools

Old School Swindling: How Social Engineering Uses Vintage Tactics to Slip Past Your Network's Defense

Social Engineering is really no different than any old school scam from the past, other than modern technology is the setting (for the modern attack)." - Justin Huffaker, Vice President of Strategic Technology, Datamax Inc.

Most recall the Martin Scorsese film “Catch Me if You Can,” which follows New York teen Frank Abagnale (played by Leonardo DiCaprio) posing as a Pan American World Airways pilot, a Georgia doctor and a Louisiana parish prosecutor to successfully execute million-dollar cons.

Abagnale’s ploys, while sophisticated, relied heavily on the ingrained, trusting nature of humans to carry out his elaborate schemes: Much like Social Engineering in 2018, some 60 years after Abagnale’s antics.

Topics: Network Management Managed Services IT Consulting Network Security Security Technology Training

Prevent Undetected Attack : 10 Safety Tips that Guard Against Ransomware

Ransomware, namely the WannaCry and NotPetya viruses, filled newsfeeds last year as the most prolific cyber security attacks in history. How prolific? The two Ransomware attacks combined to infect 200,000 machines in 100 countries, and NotPetya caused an estimated $1.2 billion in damages.

The most common shark attack against humans is known as the “hit-and-run” attack. Typically occurring in the surf zone amid murky waters, the swimmer or surfer seldom even sees its attacker.

The same could certainly be said for Ransomware in 2017.

Topics: Network Management Managed Services Network Security Security Data Back-Up

Diagnosing Your Data: Is Your Tech Stack Compliant with GDPR?

This legislation is a game changer for how applicable organizations process, retain and store customer data. 

On May 25, the European Union’s General Data Protection Regulation (GDPR) was officially enforced, representing a watershed moment for consumer data protection and privacy moving forward.

This legislation, designed to better unify and protect data privacy for European Union citizens, applies to those within EU-member countries, so US-based companies may not think that this overseas legislation is relevant to their everyday business.  These companies should think again: The GDPR could be very relevant to you and the way you currently collect and store data.

Topics: Network Management Managed Services Security Data Back-Up Managed Services Provider

Five Network Security Questions to Consider as You Seek Peace of Mind

A Network Risk Assessment can dispel security concerns and propel your team to the ultimate goal for your organization and its network infrastructure – peace of mind.

For me, there’s perhaps no better mind-clearing, stress-relieving pastime then a jaunt along the trails at a nearby state park. The sun poking its way through the towering pine trees, coupled with the low-volume sounds of the early morning surrounding me, provides me peace of mind to empower a productive week ahead.

Isn’t peace of mind – in our homes and our workplace what we all ultimately crave? Given today’s volatile cyber security climate, fear and uncertainty of everything from downtime to network intrusion can disrupt an organization’s collective contentment.

Topics: Network Management Managed Services IT Consulting Technology Support Network Security Security