The Datamax Thinking Blog

Educating, collaborating, and sparking ideas for maximizing the technology that matters.


Network Security Tactics that Cut the Strings of Socially Engineered Puppeteering

Social engineering is really no different than any old-school scam from the past, other than modern technology is the setting (for the modern attack). 

Infamous hacker turned computer security consultant Kevin Mitnick, featured in the Werner Herzog documentary “Lo and Behold, Reveries of the Connected World,” very much embodies the dark art of the Social Engineered Attack.

Mitnick is perhaps best known for breaking into the networks of IBM, Nokia and Motorola (in the case of Motorola, he stole their source code simply by talking an employee there into emailing it to him). He also claims to have compromised computers solely by using passwords and codes that he gained by social engineering.

In other words, the one-time cyber criminal’s most dangerous weapon was his gift of gab, manipulating his victims just as a puppeteer would his marionette.

Topics: Security Technology Support IT Consulting Network Security Cybersecurity

Strengthening Your IT Roots: 10 Ransomware Prevention Tips

Build strong roots from within your organization: Continue to empower employees to be proactive about cybersecurity risks and encourage them to report questionable content or activity.

An old Malay proverb states that “A tree with strong roots laughs at storms.”

Today’s workforce continues to grow remotely, with Businesswire estimating that remote workers will account for 72 percent of the US Workforce by 2020.  With more bring-your-own-devices out  in the field, endpoints continue to multiply and extend further beyond a traditional office, just like  branches on a tree.

Topics: Security Network Management IT Consulting Business Continuity Network Security Cybersecurity

Technology Forecast: Office Climate Change Imminent, but Probability of Printing Remains High

In the report, 36 percent of enterprises surveyed say they are printing MORE OFTEN than they were 12 months ago, while only 14 percent are printing less often. Similarly, 40 percent are scanning more often and 35 percent are copying more often.

By 2020, Cisco’s Internet Business Solutions Group predicts that 50 billion physical IoT devices will be connected to the Internet, consuming, generating, and communicating data. The office is no exception.

Crucial documents reside on our desks and file cabinets, but also in cloud servers and mobile devices. With such wide and easy access to the information we need, it’s tempting to think that printing may soon become a function of the past.

As ESPN analyst Lee Corso famously says on College Football Game Day, “Not so fast, my friend!”

Topics: Scanning Printing Printer Management Multifunction Copier Office Equipment Document Security Print Management Canon USA Managed Print Services

GDPR Compliance: How Does Your Data Security Technology 'Stack' Up?

Even if your organization is based in the U.S., it could have a significant impact on you and your business. Every organization that processes or controls any data pertaining to EU citizens must be in compliance with the new regulation.

We share private information online today, almost subconsciously.

Downloading Apps. Online transactions. Signing up for that “free whitepaper,” filing out a survey or even hitting the “like” button on Facebook.  Consumer data today is premium fuel for businesses all over the world.

Topics: Technology Security Privacy Network Management Technology Support Business Continuity

The Elephant in the (Waiting) Room: Why Your Healthcare Facility Needs a Security Risk Analysis Now

Whether they are complying with HIPAA or attesting to the Merit-based Incentive Payment System (MIPS) under MACRA for positive incentives, healthcare professionals cannot avoid (and certainly cannot AFFORD to avoid) the Security Risk Analysis.

For many health organizations, the elephant in the waiting room is still seated there, anxiously anticipating when it might be acknowledged or tended to.

That elephant is the Security Risk Analysis (SRA). Originally mandated by HIPAA and subsequently further enforced by government programs such as Meaningful Use and now the Medicare Access and CHIP Reauthorization Act (MACRA), the SRA is a vital component to both healthcare facilities’ ultimate livelihood and the confidential information of their clients.

Topics: Security Healthcare Solutions HIPAA Cybersecurity

Document Workflow: 3 Ways to Blaze a Better Paper Trail

How navigable is your paper trail right now? How well is it aligned with your overall business objectives? It may be time to identify both current inefficiencies and explore cost-effective, fully secure practices moving forward.

Have you ever followed your own paper trail? Where does it lead you?

Regardless of the size of your organization – a small work group up to a large enterprise - it has a unique paper trail based on your existing technology and individual departmental practices. Your routine document workflow, files and paper moving from desk to desk both manually and digitally, dictate the route of your trail. Your path can often be cluttered by manual, paper based processing, damaged by inadequate security measures or completely overgrown from simple negligence.

Topics: Document Management Document Workflow Document Security

Go Vertical, Grow Vertical: Become Relevant and Plant Seeds of True Potential

A successful Vertical Marketing plan requires education, in-depth collaboration and a discovery period of investigating the day-to-day workflow of a specific organization.

In business, sales representatives plant seeds all the time through their interactions with prospects and clients. But how committed they are to acquainting themselves with and nurturing these relations once planted, often determines ultimate long-term growth.

Consider Vertical Marketing the ultimate exercise in studying and tending to individual seeds, learning each nuance and developing growth consistently based on relevant client needs. It’s much more than canned brochures or pre-determined sales pitches. It’s a duel effort of zeroing in on a specific market’s shared challenges and objectives, and finding relative solutions that produce long-term results.

Topics: Productivity Tips and Tools Partnering Creating Raving Fans Datamax Culture

Managed Print Services: A Road Map for Your Printing Environment

When it comes to managing a printing environment, many organizations find themselves without even a road map. Most companies don't realize how many documents are wasted daily – money literally thrown away. 

It comes up regularly on long car rides with my wife – what did we ever do pre-smartphone GPS? My answer: There was always, of course, the trusted Rand McNally map, along with the refined technique of folding it back adequately enough to fit back into your glove box. The Rand McNally, for me, is a sentimental relic from family vacations past.

Topics: Document Security Print Management Managed Print Services

Tracking Your Steps: Five Questions for Your Document Workflow Processes

Document automation and workflow solutions help organizations share information not only more efficiently, but with the confidence of enhanced security and the ease of quicker access.

With the emergence of wearable technology, we are quickly becoming a society of health trackers.

Apps, watches and other tracking devices play a growing role in our everyday life, as this technology counts our daily steps, sleeping hours and much, much more.  These wearables keep us keenly mindful of our daily movement during waking hours and our overall health, with more and more data available to track and share. 

Topics: Security Automation Document Workflow Document Security

Document Management Agility: Five Workflow Scenarios to Consider

The central objective of utilizing EDM is to make your overall business processes more efficient, and specifically to accelerate and properly secure the way you move documents across your office. 

In the months before they toe the starting line, many runners and endurance athletes mistakenly obsess over one attribute through their training plan - speed. However, to maintain top efficiency in their movements and to keep these movements sharp as possible, agility - a combination of speed, control and coordination – is a critical part of everyday training.

Agility is also the key, big picture component to proficient document workflow. It's not just how fast you operate - it's how coordinated and efficient those efforts are.

Topics: Productivity Tips and Tools Document Management Document Workflow