The Datamax Thinking Blog

Educating, collaborating, and sparking ideas for maximizing the technology that matters.


Swing Your Sword: 6 Strategies for Crafting a Razor Sharp IT Business Continuity Plan

The ability to act swiftly, act confidently and swing your sword with great technique and without hesitation rests on your pre-crafted, pre-tested game plan.

Mike Leach, arguably the most notable innovator in college football’s Air Raid Attack, developed a popular mantra for his team in 2003: “Swing Your Sword.”

It was after a loss where his defense looked timid, his team confused and unprepared.

Topics: Network Management Technology Support Cloud IT Consulting Business Continuity Network Security Cybersecurity

Recent Lawsuit Builds Even Bigger Case for Cybersecurity Education

Organizations must be accountable for guarding against cybersecurity, they must be fully aware of current risks, and they must be proactive about Cybersecurity education.

As cybersecurity increasingly becomes an agenda item inside the executive boardroom, organizations continue to recognize their own accountability in guarding against cyberattack.

But what about end users? How accountable are they?

It’s an interesting question raised in a recent news article published in KnowBe4’s Security Awareness Training Blog.

Topics: Managed Network Services Network Management Network Security Cybersecurity

5 Technology Initiatives that Will Drive Business Transformation in 2019

Paired with a barrage of potential threats, yet brimming with productive potential, technology plays an intimate role in the routines of today’s business workday. When well harnessed, it can unlock unforeseen competitive advantages.

Henry Ford once said, "I don't read history. That's in the past. I'm thinking of the future."

Ford, of course, was the Michigan-born engineer who developed a petrol-driven quadricycle into a small car; this proved the basis for the famous Model T motor car introduced in 1908. Just as Ford’s ingenuity forever transformed the auto industry, technology has been a driving force in business transformation for years.

As we look at the state of technology as it relates to business in 2019, Ford’s quote has a profound foreshadowing effect.

Topics: Scanning Printing Healthcare Solutions Network Management Cloud HIPAA Network Security Cybersecurity Managed Compliance Services Content Management

Managed Network Services: You Are Now Free to Move About Your Business

Managed Network Services (MNS), more than anything else, offers freedom. Freedom to focus on your business. Freedom to become strategic and forward thinking about technology – how it can actually become performance enhancing.

Small to medium-sized businesses, in rising numbers, have heeded the call to make cybersecurity a top priority for their organization.

After years of preaching/pleading from Managed Service Providers, coupled with thousands (millions?) of blog posts devoted to the topic, most SMBs today recognize that when it comes to data breaches, “it can happen to me.”

Topics: Information Technology Managed Network Services Network Management Microsoft Gold Partner Cybersecurity

7 Trustworthy Steps in Avoiding Ransomware, Phishing Scams

Organizations today need an IT strategy that acts as a belayer, a trusted entity of support to prevent malicious attack. 

Rock climbing is an endeavor built entirely around trust: Trust in your belayer.  Trust in your equipment.  Trust in the terrain surrounding you. And, of course, trust in yourself.

Likewise, your organization’s online security often comes down to a matter of trust. But trust in this manner should never be earned without scrutiny, verification and due diligence.

Topics: Managed Network Services Network Management Network Security Cybersecurity

Healthcare Organizations Need a Roadmap to Navigate Cybersecurity

It cannot be a one-time snapshot, or a one-time risk assessment. It has to be a continuous, ongoing process." -  Navin Balakrishnaraja, National Practice Director, Healthcare IT Services for All Covered (IT Services, Konica Minolta)

All organizations are guilty of just “going through the motions” at times.

A client services specialist leaning too heavily on his company script. The sales representative who meets her quota but fails to concentrate on continued professional development (aka, the learning zone). There are countless scenarios within a work place where crucial tasks are tackled without enthusiasm or a particular level of involvement.

But few, if any, carry the level of risk of a healthcare facility just going through the motions with its cybersecurity plan. The organization must navigate this landscape carefully, and with a trusted map that leads to long-term security and compliance for the unpredictable journey ahead.

Topics: Security Healthcare Solutions HIPAA Network Security Cybersecurity

Network Security Tactics that Cut the Strings of Socially Engineered Puppeteering

Social engineering is really no different than any old-school scam from the past, other than modern technology is the setting (for the modern attack). 

Infamous hacker turned computer security consultant Kevin Mitnick, featured in the Werner Herzog documentary “Lo and Behold, Reveries of the Connected World,” very much embodies the dark art of the Social Engineered Attack.

Mitnick is perhaps best known for breaking into the networks of IBM, Nokia and Motorola (in the case of Motorola, he stole their source code simply by talking an employee there into emailing it to him). He also claims to have compromised computers solely by using passwords and codes that he gained by social engineering.

In other words, the one-time cyber criminal’s most dangerous weapon was his gift of gab, manipulating his victims just as a puppeteer would his marionette.

Topics: Security Technology Support IT Consulting Network Security Cybersecurity

Strengthening Your IT Roots: 10 Ransomware Prevention Tips

Build strong roots from within your organization: Continue to empower employees to be proactive about cybersecurity risks and encourage them to report questionable content or activity.

An old Malay proverb states that “A tree with strong roots laughs at storms.”

Today’s workforce continues to grow remotely, with Businesswire estimating that remote workers will account for 72 percent of the US Workforce by 2020.  With more bring-your-own-devices out  in the field, endpoints continue to multiply and extend further beyond a traditional office, just like  branches on a tree.

Topics: Security Network Management IT Consulting Business Continuity Network Security Cybersecurity

The Elephant in the (Waiting) Room: Why Your Healthcare Facility Needs a Security Risk Analysis Now

Whether they are complying with HIPAA or attesting to the Merit-based Incentive Payment System (MIPS) under MACRA for positive incentives, healthcare professionals cannot avoid (and certainly cannot AFFORD to avoid) the Security Risk Analysis.

For many health organizations, the elephant in the waiting room is still seated there, anxiously anticipating when it might be acknowledged or tended to.

That elephant is the Security Risk Analysis (SRA). Originally mandated by HIPAA and subsequently further enforced by government programs such as Meaningful Use and now the Medicare Access and CHIP Reauthorization Act (MACRA), the SRA is a vital component to both healthcare facilities’ ultimate livelihood and the confidential information of their clients.

Topics: Security Healthcare Solutions HIPAA Cybersecurity

7 Things Every SMB Must Know About Cybersecurity

Do you think your business' size will protect you from cybercriminals. It won't.

Simple fact: cybercriminals are coming for you.

That's anyone reading this – individuals, 2-person businesses, Fortune 1000, or the mom and pop store on the corner.

All businesses have customer and other data that can be hacked. Criminals want that data.

Most SMBs attempt to secure themselves. However, they don't have the money or access to expertise that larger companies do. Their defenses aren't as strong as larger companies.

It's a lot easier to pick the lock on a doorknob (just to be 100% clear, this is you SMBs) than on a maximum security safe. Who do you think cybercriminals are going to target? 

Here are seven things every SMB must know about cybersecurity.

Topics: Information Technology Managed Network Services Security Digital Security Network Management Cybersecurity