The Datamax Thinking Blog

Educating, collaborating, and sparking ideas for maximizing the technology that matters.


Swing Your Sword: 6 Strategies for Crafting a Razor Sharp IT Business Continuity Plan

The ability to act swiftly, act confidently and swing your sword with great technique and without hesitation rests on your pre-crafted, pre-tested game plan.

Mike Leach, arguably the most notable innovator in college football’s Air Raid Attack, developed a popular mantra for his team in 2003: “Swing Your Sword.”

It was after a loss where his defense looked timid, his team confused and unprepared.

Topics: Network Management Technology Support Cloud IT Consulting Business Continuity Network Security Cybersecurity

SMB Competitive Advantages that Reach the Cloud

The cloud has become an increasingly familiar and very practical tool for businesses of all sizes to embrace, whether that’s for backup storage, endpoint security or any number of cloud-based software solutions. 

When it comes to cloud technology and the future, the possibilities are as wide open as the sky above us.

Topics: Information Technology Network Management Cloud IT Consulting

4 'Cs' of Technology that Carry Over into the Classroom

 

Does the IT staff at your school have the time to devote to forward-thinking technologies? Do you have a collaborative, meaningful partnership with your provider? 

Franklin D. Roosevelt once said, “We cannot build the future for our youth—but we can build our youth for the future.”

The 4 “Cs” in education have become a fundamental representation for the National Education Association’s vision for 21st Century Education. Critical thinking, Creativity, Collaboration and Communication are all key components from the NEA to helping students of today – and tomorrow – prepare for college, for work, and for life.

Intertwined within these timeless  4 "Cs” assets today, of course, is the development of and proficiency with technology as students forge ahead in today’s digital era. For example, students must be encouraged to use technology to communicate innovatively and effectively. Additionally, technology plays a key role in effective student collaboration inside the classroom and, in some instances, across the globe.

Topics: Technology Office Equipment Production Print Network Management Partnering IT Consulting Creating Raving Fans Education Tips and Tools

Network Security Tactics that Cut the Strings of Socially Engineered Puppeteering

Social engineering is really no different than any old-school scam from the past, other than modern technology is the setting (for the modern attack). 

Infamous hacker turned computer security consultant Kevin Mitnick, featured in the Werner Herzog documentary “Lo and Behold, Reveries of the Connected World,” very much embodies the dark art of the Social Engineered Attack.

Mitnick is perhaps best known for breaking into the networks of IBM, Nokia and Motorola (in the case of Motorola, he stole their source code simply by talking an employee there into emailing it to him). He also claims to have compromised computers solely by using passwords and codes that he gained by social engineering.

In other words, the one-time cyber criminal’s most dangerous weapon was his gift of gab, manipulating his victims just as a puppeteer would his marionette.

Topics: Security Technology Support IT Consulting Network Security Cybersecurity

Strengthening Your IT Roots: 10 Ransomware Prevention Tips

Build strong roots from within your organization: Continue to empower employees to be proactive about cybersecurity risks and encourage them to report questionable content or activity.

An old Malay proverb states that “A tree with strong roots laughs at storms.”

Today’s workforce continues to grow remotely, with Businesswire estimating that remote workers will account for 72 percent of the US Workforce by 2020.  With more bring-your-own-devices out  in the field, endpoints continue to multiply and extend further beyond a traditional office, just like  branches on a tree.

Topics: Security Network Management IT Consulting Business Continuity Network Security Cybersecurity

Three Tactics to Thwart Office 365 Ransomware Threats

So, consider this bit of recent history ... 29% of IT professionals report their clients have encountered ransomware that specifically targeted Office 365.

I must say, I love history. For humanity's sake, I deeply hope it’s never rewritten.  I’m not entirely sure whether my interest lies in the fun and fascination of discovery, or the fear of repeating failures it documents.  One thing’s for sure, as summed up by Edmund Burke, Those who don't know history are doomed to repeat it.”  

No doubt, a truth proven over and over again.

So here’s a bit of history (2,000 years in the making) every business should consider as it prepares to compete and/or to defend its resources — the focus of this blog.

Topics: Managed Network Services Network Management Document Security IT Consulting Technology Pain Business Continuity Disaster Recovery Network Security

Total Data Protection Will Give You a Secure Business Edge

Every business needs to be secure today. Data backup and disaster recovery are key tools to keep your office safe and in business.

If you’re reading this, you understand that your business or office depends on information technology (IT) to function.

As businesses of every size rely ever more on IT, there are two functions IT performs essential to a business’ ability to function:

  1. a robust, secure data network
  2. continued access to vital business information and documents

No network and no access to information equals no business.

Topics: Managed Network Services Digital Security Network Management IT Consulting Technology Pain Business Continuity Disaster Recovery Microsoft Gold Partner Network Security

Dozens of Business Productivity Tips – Our 11 Best and Most Popular Blogs of 2017

You have a lot of options on the market when you make a technology purchase. The best solution for your business isn't determined solely by the price, the feature set, or how fast the vendor gets it to your doorstep.

Every year, I learn more about copiers, document management, workflow, and, increasingly, managed IT topics.

I do my best to pass on what I learn to you.

Here are the 11 most popular posts in 2017. They cover a range of topics:

Read on for insights into those topics – and more – to get yourself ready for 2018! 

Topics: Scanning Information Technology Technology Multifunction Copier Did you know? Managed Network Services Security Digital Copiers Digital Security Productivity Tips and Tools Healthcare Solutions Office Equipment Legal Solutions Network Management Document Workflow Document Security IT Consulting Business Continuity Disaster Recovery

The 6 Things You Should Never Do When It Comes to Cybersecurity

Security isn’t always top of mind, especially when it comes to your employees. Make sure you and your employees aren’t doing any of these six things.

We’ve all had that “kick yourself” moment after something you had a second thought about tragically comes to fruition. We know it could have been prevented, and it was just plain stupid to not have taken the simple steps needed to prevent the mistake.

We take a lot for granted as humans, especially when it comes to securing our data. In fact, did you know that in your office right now it’s likely that 40% of your employees have their passwords stored on their devices in a Word document? Almost half! Not so secure right? 

Despite all the cyber security threats you hear about in the news, the simple fact is that the people within your business are far more of a threat than any software application that you are using. If you’ve ever had second thoughts about your company’s cybersecurity, take a few minutes to check yourself and make sure that you are NOT doing any of the following:

Topics: Information Technology Did you know? Managed Network Services Digital Security Healthcare Solutions Legal Solutions Network Management IT Consulting Technology Pain Microsoft Gold Partner Network Security

Your IT Provider Should Be Fixing Your Problems, Not Causing Them

If your IT partner isn't doing these four things well, it might be time to look for another partner.

How is your IT service provider doing these days? Are you happy with the job they are doing?

In a perfect world, your network is running smoothly, resting safe and sound from malware attacks, and emails and communications are pinging back and forth like a well-orchestrated symphony.

We all have certain expectations when we sign on for a service, and there is nothing worse than the anxiety you feel when they don’t meet the mark — especially when it comes to IT.

Topics: Information Technology Business Problems Managed Network Services Digital Security Network Management Technology Support IT Consulting Technology Pain