The Datamax Thinking Blog

Educating, collaborating, and sparking ideas for maximizing the technology that matters.


Among Online Criminal Activities, Ransomware Remains the Biggest Offender

According to the report, 1 in 5 SMBs report that they’ve fallen victim to a ransomware attack. 85 percent of MSPs report attacks against SMBs in the last two years

Cyberspace is overflowing with malicious activity. But among online criminal acts affecting businesses today, Ransomware remains the biggest offender.

Datto's "Global State of the Channel Ransomware Report" sheds light on the current state of this notorious online threat, pulling together perspectives from Managed Service Providers (MSPs), their partners, and their clients from around the world. It also eyes the perspectives from both the IT channel and the SMB clients it serves.

The bottom line? Ransomware is still the #1 villain.

Topics: Network Management Network Security Ransomware

3 Best Practices for Filling the Healthcare IT Security Gap

Nearly a third of all healthcare employee respondents (32%) said that they had never received cybersecurity training from their workplace ... but should have.

Healthcare today has its share of gaps: Gaps in healthcare access, gaps in the treatment of chronic diseases, and gaps in communication between patient and provider.

But what about the existing gaps in a medical facility's IT security plan?

Topics: Healthcare Solutions Network Management Network Security

Tax Season is Here: Have You Audited for Social Engineered Attacks?

This is not a sophisticated scam. However, it is an effective and profitable one and it happens to an increasing number of companies across America each year around tax time.

Tax season is here. Are you safe? That seems like an odd question to ask; nevertheless, with the increasing sophistication of cybercriminals it must be considered and answered.

Topics: Network Management Technology Support Network Security Social Engineering

Swing Your Sword: 6 Strategies for Crafting a Razor Sharp IT Business Continuity Plan

The ability to act swiftly, act confidently and swing your sword with great technique and without hesitation rests on your pre-crafted, pre-tested game plan.

Mike Leach, arguably the most notable innovator in college football’s Air Raid Attack, developed a popular mantra for his team in 2003: “Swing Your Sword.”

It was after a loss where his defense looked timid, his team confused and unprepared.

Topics: Network Management Technology Support Cloud IT Consulting Business Continuity Network Security Cybersecurity

5 Checkpoints that Any Managed IT Services Partner Should Clear

Before proceeding with a Managed IT partner, it's important to set up checkpoints that ultimately secure your return on technology investment.

In the process of securing a competitive business advantage, organizations are moving fast toward the growing trend of outsourcing.

It stands to reason. Finding a trusted team in any particular business function – be it finance, technology or other – gives companies the opportunity to reduce costs, focus more on core business goals and planning, and also benefit from the specific expertise of these professional service organizations.

Topics: Information Technology Managed Network Services Network Management

5 Stats that Prove the Communication Revolution has Reached the Workforce

It's an old, universal truth: effective communication is key to team and organizational success. Without adapting to more intuitive, better integrated communication and collaboration tools, organizations will continue to hit the same communication barriers again and again. 

There’s this joke about millennials. Give a millennial a smartphone and he’ll live for a day… any longer than that and he’ll become a mindless, soulless, social media zombie.

Yes, it’s an all-too-common dig — a boomer scoffing at the 20-something across the room with his face buried in his phone. But all jokes aside, the next generation of communication systems and devices is transforming the way we work. With millennials now making up the largest generation in the U.S. labor force, the definitions of both “workplace” and “workday” are becoming steadily more hazy.

Topics: Network Management Unified Communications VoIP Phone System

Is Your IT Security Strategy 'All-Inclusive?'

Businesses often throw money and technology at the problem: firewalls, content filters, encrypted data and email, antivirus and anti-malware tools. But a more all-inclusive approach covers much more ground than just hardware. 

The nerves are shot. The internal screams of frustration finally slipped out across the salesroom floor. You need a vacation. And visiting an all-inclusive resort provides the ultimate peace of mind.

Topics: Network Management Network Security

Get Employees On Board with Copier Fleet or IT Onboarding Process

In working with your partner, how successful is implementation of new technology? Is there a Change Management Methodology that gets every employee on board safely? Or just a train wreck? 

Woodrow Wilson once famously said, “if you want to make enemies, try to change something.”

Funny, but for IT managers or business owners implementing an MFP fleet or IT-related onboarding process, perhaps a little too close for comfort.

Topics: Business Problems Productivity Tips and Tools Network Management Partnering Print Management

Recent Lawsuit Builds Even Bigger Case for Cybersecurity Education

Organizations must be accountable for guarding against cybersecurity, they must be fully aware of current risks, and they must be proactive about Cybersecurity education.

As cybersecurity increasingly becomes an agenda item inside the executive boardroom, organizations continue to recognize their own accountability in guarding against cyberattack.

But what about end users? How accountable are they?

It’s an interesting question raised in a recent news article published in KnowBe4’s Security Awareness Training Blog.

Topics: Managed Network Services Network Management Network Security Cybersecurity

5 Technology Initiatives that Will Drive Business Transformation in 2019

Paired with a barrage of potential threats, yet brimming with productive potential, technology plays an intimate role in the routines of today’s business workday. When well harnessed, it can unlock unforeseen competitive advantages.

Henry Ford once said, "I don't read history. That's in the past. I'm thinking of the future."

Ford, of course, was the Michigan-born engineer who developed a petrol-driven quadricycle into a small car; this proved the basis for the famous Model T motor car introduced in 1908. Just as Ford’s ingenuity forever transformed the auto industry, technology has been a driving force in business transformation for years.

As we look at the state of technology as it relates to business in 2019, Ford’s quote has a profound foreshadowing effect.

Topics: Scanning Printing Healthcare Solutions Network Management Cloud HIPAA Network Security Cybersecurity Managed Compliance Services Content Management