The Datamax Thinking Blog

Educating, collaborating, and sparking ideas for maximizing the technology that matters.


Justin L. Huffaker

Justin L. Huffaker

Justin L. Huffaker serves as the Vice President, Strategic Technology for Datamax Inc. Since joining Datamax, he has overseen several successful growth-oriented initiatives. These include starting a document management consulting practice, creating a document conversion group, developing a managed print services offering, and building a managed network services business.

Recent Posts by Justin L. Huffaker:

Swing Your Sword: 6 Strategies for Crafting a Razor Sharp IT Business Continuity Plan

The ability to act swiftly, act confidently and swing your sword with great technique and without hesitation rests on your pre-crafted, pre-tested game plan.

Mike Leach, arguably the most notable innovator in college football’s Air Raid Attack, developed a popular mantra for his team in 2003: “Swing Your Sword.”

It was after a loss where his defense looked timid, his team confused and unprepared.

Topics: Network Management Technology Support Cloud IT Consulting Business Continuity Network Security Cybersecurity

Is Your IT Security Strategy 'All-Inclusive?'

Businesses often throw money and technology at the problem: firewalls, content filters, encrypted data and email, antivirus and anti-malware tools. But a more all-inclusive approach covers much more ground than just hardware. 

The nerves are shot. The internal screams of frustration finally slipped out across the salesroom floor. You need a vacation. And visiting an all-inclusive resort provides the ultimate peace of mind.

Topics: Network Management Network Security

Recent Lawsuit Builds Even Bigger Case for Cybersecurity Education

Organizations must be accountable for guarding against cybersecurity, they must be fully aware of current risks, and they must be proactive about Cybersecurity education.

As cybersecurity increasingly becomes an agenda item inside the executive boardroom, organizations continue to recognize their own accountability in guarding against cyberattack.

But what about end users? How accountable are they?

It’s an interesting question raised in a recent news article published in KnowBe4’s Security Awareness Training Blog.

Topics: Managed Network Services Network Management Network Security Cybersecurity

Network Security Tactics that Cut the Strings of Socially Engineered Puppeteering

Social engineering is really no different than any old-school scam from the past, other than modern technology is the setting (for the modern attack). 

Infamous hacker turned computer security consultant Kevin Mitnick, featured in the Werner Herzog documentary “Lo and Behold, Reveries of the Connected World,” very much embodies the dark art of the Social Engineered Attack.

Mitnick is perhaps best known for breaking into the networks of IBM, Nokia and Motorola (in the case of Motorola, he stole their source code simply by talking an employee there into emailing it to him). He also claims to have compromised computers solely by using passwords and codes that he gained by social engineering.

In other words, the one-time cyber criminal’s most dangerous weapon was his gift of gab, manipulating his victims just as a puppeteer would his marionette.

Topics: Security Technology Support IT Consulting Network Security Cybersecurity

The Technology Advocate – Helping You Find Sound IT Direction and Formulate Smart IT Decisions

The Technology Advocate provides client-focused advise grounded in the business case and tailored to address the unique needs of each organization.

Are you making good decisions about investments in your technology infrastructure? What business goals are you trying to accomplish? For many companies, the answer to both questions is a resounding "um..."

Organizations of all sizes use technology to conduct business functions ranging from simple communication to complex "big data" data analysis. Sometimes the adoption of technology is well conceived and cost effective, however all too often the acquisition and deployment of new

Topics: Managed Network Services Network Management Partnering IT Consulting

Keeping Score: Evaluating the Technology Infrastructure Within Your Company

Establishing quantifiable, standardized benchmarks which are then scored will allow senior business executives to begin assessing, and managing, their technology infrastructure as a whole.

Working with small and medium-sized businesses and helping manage their technology is as challenging as it is rewarding. Although every business is different, there are aspects common to all. For example, the business of an architect is different than a CPA, yet each must communicate, each must meet payroll, and each must be able to manage finances.

Topics: Managed Network Services Network Management IT Consulting Technology Pain