The Datamax Thinking Blog

Educating, collaborating, and sparking ideas for maximizing the technology that matters.


3 Ways Healthy Communication (UCaaS) Enhances the Patient Experience

How do healthcare organizations keep up to speed with patient expectations? How do they engage the right channels to connect to both consumers and their staff?

You only have to spend 1 minute in a hospital to understand just how much healthcare staff remains constantly “on the move.”

As nurses scurry from room to room, wing to wing, and doctors serve in multiple locations on any given day (or completely remotely), there are new waves of movement inside healthcare: Mobile clinics are on the rise, telehealth has exploded, and (perhaps most notably), the patient expectation has evolved.

Topics: Information Technology Healthcare Solutions IT Consulting Unified Communications VoIP Phone System

9 Defensive Tactics For Your Cybersecurity Game Plan

While 43% of cyber attacks are aimed at small businesses, only 14% are considered prepared, aware, and capable of defending their networks and data.

In football, a blitz is a tactic used by defenses to disrupt the quarterback by sending a higher than the usual number of players his way. It's called often out of a sense of urgency to proactively change the momentum of the offensive attack. 

Topics: Security Network Management IT Consulting Network Security Cybersecurity Managed IT Services

6 Coaching Tips for Your 2022 IT Security Plan

These six coaching tips will help develop the peace of mind that comes with a solid IT security strategy.

Vince Lombardi once said “hope is not a strategy.”

From his relentless coverage of the fundamentals to implementing his infamous “Packers Sweep,” the legendary football coach relied on preparation, practice, and developing a proper game plan for his team. It worked. He won five NFL championships, including Super Bowls I and II, and compiled a remarkable 89-29-4 regular-season record.

Topics: Network Management IT Consulting Network Security Cybersecurity MFP Security

Section 179: Act Fast on This Technology Acquisition Incentive

Almost all types of “business equipment” new or used that your company buys or finances will qualify for the Section 179 Deduction.

A huge technology procurement incentive still exists for businesses looking for ways to become more efficient and lease or purchase new business equipment.

But the clock is ticking.

Topics: Printing Office Equipment IT Consulting LeaseCare Technology Procurement

How Businesses Can Help Employees Securely Work From Home

With the likely increase in remote work, companies will have to prepare in various ways to avoid cybersecurity risks or interruptions to business.

As the coronavirus (COVID-19) continues to spread uncertainty regarding routine business operations, employee safety stands as a top concern for employers ... as does network management and IT security.

Topics: Managed Network Services Network Management IT Consulting Business Continuity Network Security Cybersecurity Coronavirus Remote Workforce Planning Managed Services Provider

Lessons from the Big Bend: Achieve Balance in Your Cybersecurity Approach

The risks associated with traveling the vast cybersecurity landscape unprepared? It’s bound to be overwhelming. Achieving balance is essential. 

Traversing a national park bigger than the state of Rhode Island? It can be awe-inspiring, if not a bit overwhelming.

Rugged yet beautiful landscapes greeted us everywhere we turned, including, notably, Balanced Rock in Big Bend National Park. The trail leading to to the rock formation was filled with scarce,  dusty desert floor surrounded by piles of boulders; the path was difficult to follow if you weren’t paying attention. But the rewards are worth the careful navigation – a huge boulder balanced and suspended overhead by two others, but also, just underneath it, a beautifully framed window into the distant mountains.

Topics: Information Technology Managed Network Services IT Consulting Cybersecurity

Swing Your Sword: 6 Strategies for Crafting a Razor Sharp IT Business Continuity Plan

The ability to act swiftly, act confidently and swing your sword with great technique and without hesitation rests on your pre-crafted, pre-tested game plan.

Mike Leach, arguably the most notable innovator in college football’s Air Raid Attack, developed a popular mantra for his team in 2003: “Swing Your Sword.”

It was after a loss where his defense looked timid, his team confused and unprepared.

Topics: Network Management Technology Support Cloud IT Consulting Business Continuity Network Security Cybersecurity

SMB Competitive Advantages that Reach the Cloud

The cloud has become an increasingly familiar and very practical tool for businesses of all sizes to embrace, whether that’s for backup storage, endpoint security or any number of cloud-based software solutions. 

When it comes to cloud technology and the future, the possibilities are as wide open as the sky above us.

Topics: Information Technology Network Management Cloud IT Consulting

4 'Cs' of Technology that Carry Over into the Classroom

Does the IT staff at your school have the time to devote to forward-thinking technologies? Do you have a collaborative, meaningful partnership with your provider? 

Franklin D. Roosevelt once said, “We cannot build the future for our youth—but we can build our youth for the future.”

The 4 “Cs” in education have become a fundamental representation for the National Education Association’s vision for 21st Century Education. Critical thinking, Creativity, Collaboration and Communication are all key components from the NEA to helping students of today – and tomorrow – prepare for college, for work, and for life.

Intertwined within these timeless  4 "Cs” assets today, of course, is the development of and proficiency with technology as students forge ahead in today’s digital era. For example, students must be encouraged to use technology to communicate innovatively and effectively. Additionally, technology plays a key role in effective student collaboration inside the classroom and, in some instances, across the globe.

Topics: Technology Office Equipment Production Print Network Management Partnering IT Consulting Creating Raving Fans Education Tips and Tools

Network Security Tactics that Cut the Strings of Socially Engineered Puppeteering

Social engineering is really no different than any old-school scam from the past, other than modern technology is the setting (for the modern attack). 

Infamous hacker turned computer security consultant Kevin Mitnick, featured in the Werner Herzog documentary “Lo and Behold, Reveries of the Connected World,” very much embodies the dark art of the Social Engineered Attack.

Mitnick is perhaps best known for breaking into the networks of IBM, Nokia and Motorola (in the case of Motorola, he stole their source code simply by talking an employee there into emailing it to him). He also claims to have compromised computers solely by using passwords and codes that he gained by social engineering.

In other words, the one-time cyber criminal’s most dangerous weapon was his gift of gab, manipulating his victims just as a puppeteer would his marionette.

Topics: Security Technology Support IT Consulting Network Security Cybersecurity