The Datamax Thinking Blog

Educating, collaborating, and sparking ideas for maximizing the technology that matters.


5 Questions to Ask When Choosing a Managed IT Services Provider

From offering timely onsite and remote support, to the ability to avoid buzzwords and communicate clearly to your end users, you should expect more for your organization.

With overall small to medium-sized business spending on managed services growing at 15% per year (According to Datto’s 2020 State of the MSP Report), it’s no surprise that most Managed Service Providers are growing.

Topics: Network Management Microsoft Gold Partner Network Security

3 COVID-19 Phishing Email Examples To Help Your Business Identify Scams

But what might a COVID-19 phishing email scam look like? We looked in our own inbox, and accessed a valuable cybersecurity resource, to show you things to be looking for.

Two basic qualities that cybercriminals prey on are vulnerability and desperation. With so many on high alert with COVID-19 information and updates, phishing season is in full swing.

Topics: Network Management Network Security Coronavirus

How Businesses Can Help Employees Securely Work From Home

With the likely increase in remote work, companies will have to prepare in various ways to avoid cybersecurity risks or interruptions to business.

As the coronavirus (COVID-19) continues to spread uncertainty regarding routine business operations, employee safety stands as a top concern for employers ... as does network management and IT security.

Topics: Managed Network Services Network Management IT Consulting Business Continuity Network Security Cybersecurity Coronavirus Remote Workforce Planning Managed Services Provider

10 Relevant Statistics Regarding Remote Work in 2020

How organizations accommodate and — more importantly, manage – remote work moving forward should involve an important discussion with their trusted technology partner.

Working remotely – it’s an upward workplace trend that has escalated tremendously since the events surrounding COVID-19 began affecting businesses recently.

Topics: Network Management Unified Communications Coronavirus Remote Workforce Planning Cloud Technology Remote Work

Continuity Of Voice In Disaster (COVID-19): Prepared to Work Remotely?

While the impact of the virus is yet to be determined, the COVID-19 outbreak serves as one poignant example of the need for agility, flexibility and cohesion in the way organizations communicate (via voice or data) and conduct business.

What happens when working remotely ceases to be a luxury … and starts to become a necessity?

With the series of events unfolding surrounding the Coronavirus, employers are making operational adjustments to comply with a quickly-evolving public narrative — one that may soon include a work-from-home strategy.  Given these circumstances, how do businesses maintain effective communication with customers? With their team? How do they preserve standard business operations if employees aren't at the office? 

Topics: Network Management Unified Communications Coronavirus Remote Workforce Planning

Among Online Criminal Activities, Ransomware Remains the Biggest Offender

According to the report, 1 in 5 SMBs report that they’ve fallen victim to a ransomware attack. 85 percent of MSPs report attacks against SMBs in the last two years

Cyberspace is overflowing with malicious activity. But among online criminal acts affecting businesses today, Ransomware remains the biggest offender.

Datto's "Global State of the Channel Ransomware Report" sheds light on the current state of this notorious online threat, pulling together perspectives from Managed Service Providers (MSPs), their partners, and their clients from around the world. It also eyes the perspectives from both the IT channel and the SMB clients it serves.

The bottom line? Ransomware is still the #1 villain.

Topics: Network Management Network Security Ransomware

3 Best Practices for Filling the Healthcare IT Security Gap

Nearly a third of all healthcare employee respondents (32%) said that they had never received cybersecurity training from their workplace ... but should have.

Healthcare today has its share of gaps: Gaps in healthcare access, gaps in the treatment of chronic diseases, and gaps in communication between patient and provider.

But what about the existing gaps in a medical facility's IT security plan?

Topics: Healthcare Solutions Network Management Network Security Secure Printing

Tax Season is Here: Have You Audited for Social Engineered Attacks?

This is not a sophisticated scam. However, it is an effective and profitable one and it happens to an increasing number of companies across America each year around tax time.

Tax season is here. Are you safe? That seems like an odd question to ask; nevertheless, with the increasing sophistication of cybercriminals it must be considered and answered.

Topics: Network Management Technology Support Network Security Social Engineering

Swing Your Sword: 6 Strategies for Crafting a Razor Sharp IT Business Continuity Plan

The ability to act swiftly, act confidently and swing your sword with great technique and without hesitation rests on your pre-crafted, pre-tested game plan.

Mike Leach, arguably the most notable innovator in college football’s Air Raid Attack, developed a popular mantra for his team in 2003: “Swing Your Sword.”

It was after a loss where his defense looked timid, his team confused and unprepared.

Topics: Network Management Technology Support Cloud IT Consulting Business Continuity Network Security Cybersecurity

5 Checkpoints that Any Managed IT Services Partner Should Clear

Before proceeding with a Managed IT partner, it's important to set up checkpoints that ultimately secure your return on technology investment.

In the process of securing a competitive business advantage, organizations are moving fast toward the growing trend of outsourcing.

It stands to reason. Finding a trusted team in any particular business function – be it finance, technology or other – gives companies the opportunity to reduce costs, focus more on core business goals and planning, and also benefit from the specific expertise of these professional service organizations.

Topics: Information Technology Managed Network Services Network Management