The Datamax Thinking Blog

Educating, collaborating, and sparking ideas for maximizing the technology that matters.


Covering COVID-19: Our 10 Most-Read Blogs of 2020

Over the last 9 months, we’ve worked hard to answer COVID-19-related questions, to provide resources, to deliver the content that mattered most to our customers, in an unprecedented time for businesses everywhere.

We'd love to shake your hand, but an elbow bump will do for now. Either way, we sincerely appreciate you reading in 2020! 

Our year at the Datamax Thinking Blog kicked off with a New Year's-themed article, “6 Resolutions Your Business Technology Partner Must Truly Value in 2020.” It detailed characteristics that businesses should seek in any technology vendor relationship they engage with: Traits like “the ability to respond – and resolve,” “the creativity to dig deeper,” and “the worthiness of your trust.” 

Topics: Partnering Cybersecurity Unified Communications Coronavirus Remote Workforce Planning Work From Home

An Old Copy Machine Could be a Cyber Security Risk for Your Business

Have you thought much about that old, familiar copier in the corner? Its obsolescence might be costing you more than just maintenance headaches.

That old workhorse in the hallway just keeps running.

The decade-plus-old copier is almost part of the workplace family: The staff is familiar with it, and its reliability (even with the uptick in maintenance) makes it harder to justify incurring new costs. Unfortunately, comfort can sometimes breed complacency. 

Topics: Security Office Equipment Print Management Cybersecurity

How Businesses Can Help Employees Securely Work From Home

With the likely increase in remote work, companies will have to prepare in various ways to avoid cybersecurity risks or interruptions to business.

As the coronavirus (COVID-19) continues to spread uncertainty regarding routine business operations, employee safety stands as a top concern for employers ... as does network management and IT security.

Topics: Managed Network Services Network Management IT Consulting Business Continuity Network Security Cybersecurity Coronavirus Remote Workforce Planning Managed Services Provider

Lessons from the Big Bend: Achieve Balance in Your Cybersecurity Approach

The risks associated with traveling the vast cybersecurity landscape unprepared? It’s bound to be overwhelming. Achieving balance is essential. 

Traversing a national park bigger than the state of Rhode Island? It can be awe-inspiring, if not a bit overwhelming.

Rugged yet beautiful landscapes greeted us everywhere we turned, including, notably, Balanced Rock in Big Bend National Park. The trail leading to to the rock formation was filled with scarce,  dusty desert floor surrounded by piles of boulders; the path was difficult to follow if you weren’t paying attention. But the rewards are worth the careful navigation – a huge boulder balanced and suspended overhead by two others, but also, just underneath it, a beautifully framed window into the distant mountains.

Topics: Information Technology Managed Network Services IT Consulting Cybersecurity

Swing Your Sword: 6 Strategies for Crafting a Razor Sharp IT Business Continuity Plan

The ability to act swiftly, act confidently and swing your sword with great technique and without hesitation rests on your pre-crafted, pre-tested game plan.

Mike Leach, arguably the most notable innovator in college football’s Air Raid Attack, developed a popular mantra for his team in 2003: “Swing Your Sword.”

It was after a loss where his defense looked timid, his team confused and unprepared.

Topics: Network Management Technology Support Cloud IT Consulting Business Continuity Network Security Cybersecurity

Recent Lawsuit Builds Even Bigger Case for Cybersecurity Education

Organizations must be accountable for guarding against cybersecurity, they must be fully aware of current risks, and they must be proactive about Cybersecurity education.

As cybersecurity increasingly becomes an agenda item inside the executive boardroom, organizations continue to recognize their own accountability in guarding against cyberattack.

But what about end users? How accountable are they?

It’s an interesting question raised in a recent news article published in KnowBe4’s Security Awareness Training Blog.

Topics: Managed Network Services Network Management Network Security Cybersecurity

5 Technology Initiatives that Will Drive Business Transformation in 2019

Paired with a barrage of potential threats, yet brimming with productive potential, technology plays an intimate role in the routines of today’s business workday. When well harnessed, it can unlock unforeseen competitive advantages.

Henry Ford once said, "I don't read history. That's in the past. I'm thinking of the future."

Ford, of course, was the Michigan-born engineer who developed a petrol-driven quadricycle into a small car; this proved the basis for the famous Model T motor car introduced in 1908. Just as Ford’s ingenuity forever transformed the auto industry, technology has been a driving force in business transformation for years.

As we look at the state of technology as it relates to business in 2019, Ford’s quote has a profound foreshadowing effect.

Topics: Scanning Printing Healthcare Solutions Network Management Cloud HIPAA Network Security Cybersecurity Managed Compliance Services Content Management

Managed Network Services: You Are Now Free to Move About Your Business

Managed Network Services (MNS), more than anything else, offers freedom. Freedom to focus on your business. Freedom to become strategic and forward thinking about technology – how it can actually become performance enhancing.

Small to medium-sized businesses, in rising numbers, have heeded the call to make cybersecurity a top priority for their organization.

After years of preaching/pleading from Managed Service Providers, coupled with thousands (millions?) of blog posts devoted to the topic, most SMBs today recognize that when it comes to data breaches, “it can happen to me.”

Topics: Information Technology Managed Network Services Network Management Microsoft Gold Partner Cybersecurity

7 Trustworthy Steps in Avoiding Ransomware, Phishing Scams

Organizations today need an IT strategy that acts as a belayer, a trusted entity of support to prevent malicious attack. 

Rock climbing is an endeavor built entirely around trust: Trust in your belayer.  Trust in your equipment.  Trust in the terrain surrounding you. And, of course, trust in yourself.

Likewise, your organization’s online security often comes down to a matter of trust. But trust in this manner should never be earned without scrutiny, verification and due diligence.

Topics: Managed Network Services Network Management Network Security Cybersecurity

Healthcare Organizations Need a Roadmap to Navigate Cybersecurity

It cannot be a one-time snapshot, or a one-time risk assessment. It has to be a continuous, ongoing process." -  Navin Balakrishnaraja, National Practice Director, Healthcare IT Services for All Covered (IT Services, Konica Minolta)

All organizations are guilty of just “going through the motions” at times.

A client services specialist leaning too heavily on his company script. The sales representative who meets her quota but fails to concentrate on continued professional development (aka, the learning zone). There are countless scenarios within a work place where crucial tasks are tackled without enthusiasm or a particular level of involvement.

But few, if any, carry the level of risk of a healthcare facility just going through the motions with its cybersecurity plan. The organization must navigate this landscape carefully, and with a trusted map that leads to long-term security and compliance for the unpredictable journey ahead.

Topics: Security Healthcare Solutions HIPAA Network Security Cybersecurity