The Datamax Thinking Blog

Educating, collaborating, and sparking ideas for maximizing the technology that matters.


Strengthening Your IT Roots: 10 Ransomware Prevention Tips

Build strong roots from within your organization: Continue to empower employees to be proactive about cybersecurity risks and encourage them to report questionable content or activity.

An old Malay proverb states that “A tree with strong roots laughs at storms.”

Today’s workforce continues to grow remotely, with Businesswire estimating that remote workers will account for 72 percent of the US Workforce by 2020.  With more bring-your-own-devices out  in the field, endpoints continue to multiply and extend further beyond a traditional office, just like  branches on a tree.

Topics: Security Network Management IT Consulting Business Continuity Network Security Cybersecurity

GDPR Compliance: How Does Your Data Security Technology 'Stack' Up?

Even if your organization is based in the U.S., it could have a significant impact on you and your business. Every organization that processes or controls any data pertaining to EU citizens must be in compliance with the new regulation.

We share private information online today, almost subconsciously.

Downloading Apps. Online transactions. Signing up for that “free whitepaper,” filing out a survey or even hitting the “like” button on Facebook.  Consumer data today is premium fuel for businesses all over the world.

Topics: Technology Security Privacy Network Management Technology Support Business Continuity

Release Your IT Beast of Burden with Managed Network Services

A Managed Network Services program fine tunes and establishes control over all the moving components of your network. 

Your business's network steadily hums along, serving its intended purpose with what seems like relative ease. That is, until an unexpected breakdown occurs and you begin to feel the weight of every IT issue bearing down on your office's productivity.

What seems effortless can quickly become overwhelming. What traditionally seemed like a routine method for handling IT could today be more a beast of burden for your business.

Topics: Information Technology Managed Network Services Security Network Management Network Security

Three Tactics to Thwart Office 365 Ransomware Threats

So, consider this bit of recent history ... 29% of IT professionals report their clients have encountered ransomware that specifically targeted Office 365.

I must say, I love history. For humanity's sake, I deeply hope it’s never rewritten.  I’m not entirely sure whether my interest lies in the fun and fascination of discovery, or the fear of repeating failures it documents.  One thing’s for sure, as summed up by Edmund Burke, Those who don't know history are doomed to repeat it.”  

No doubt, a truth proven over and over again.

So here’s a bit of history (2,000 years in the making) every business should consider as it prepares to compete and/or to defend its resources — the focus of this blog.

Topics: Managed Network Services Network Management Document Security IT Consulting Technology Pain Business Continuity Disaster Recovery Network Security

Total Data Protection Will Give You a Secure Business Edge

Every business needs to be secure today. Data backup and disaster recovery are key tools to keep your office safe and in business.

If you’re reading this, you understand that your business or office depends on information technology (IT) to function.

As businesses of every size rely ever more on IT, there are two functions IT performs essential to a business’ ability to function:

  1. a robust, secure data network
  2. continued access to vital business information and documents

No network and no access to information equals no business.

Topics: Managed Network Services Digital Security Network Management IT Consulting Technology Pain Business Continuity Disaster Recovery Microsoft Gold Partner Network Security

Dozens of Business Productivity Tips – Our 11 Best and Most Popular Blogs of 2017

You have a lot of options on the market when you make a technology purchase. The best solution for your business isn't determined solely by the price, the feature set, or how fast the vendor gets it to your doorstep.

Every year, I learn more about copiers, document management, workflow, and, increasingly, managed IT topics.

I do my best to pass on what I learn to you.

Here are the 11 most popular posts in 2017. They cover a range of topics:

Read on for insights into those topics – and more – to get yourself ready for 2018! 

Topics: Scanning Information Technology Technology Multifunction Copier Did you know? Managed Network Services Security Digital Copiers Digital Security Productivity Tips and Tools Healthcare Solutions Office Equipment Legal Solutions Network Management Document Workflow Document Security IT Consulting Business Continuity Disaster Recovery

The 6 Things You Should Never Do When It Comes to Cybersecurity

Security isn’t always top of mind, especially when it comes to your employees. Make sure you and your employees aren’t doing any of these six things.

We’ve all had that “kick yourself” moment after something you had a second thought about tragically comes to fruition. We know it could have been prevented, and it was just plain stupid not to have taken the simple steps needed to prevent the mistake.

We take a lot for granted as humans, especially when it comes to securing our data. In fact, did you know that in your office right now it’s likely that 40% of your employees have their passwords stored on their devices in a Word document? Almost half! Not so secure right? 

Despite all the cyber security threats you hear about in the news, the simple fact is that the people within your business are far more of a threat than any software application that you are using. If you’ve ever had second thoughts about your company’s cybersecurity, take a few minutes to check yourself and make sure that you are NOT doing any of the following:

Topics: Information Technology Did you know? Managed Network Services Digital Security Healthcare Solutions Legal Solutions Network Management IT Consulting Technology Pain Microsoft Gold Partner Network Security

7 Things Every SMB Must Know About Cybersecurity

Do you think your business' size will protect you from cybercriminals. It won't.

Simple fact: cybercriminals are coming for you.

That's anyone reading this – individuals, 2-person businesses, Fortune 1000, or the mom and pop store on the corner.

All businesses have customer and other data that can be hacked. Criminals want that data.

Most SMBs attempt to secure themselves. However, they don't have the money or access to expertise that larger companies do. Their defenses aren't as strong as larger companies.

It's a lot easier to pick the lock on a doorknob (just to be 100% clear, this is you SMBs) than on a maximum security safe. Who do you think cybercriminals are going to target? 

Here are seven things every SMB must know about cybersecurity.

Topics: Information Technology Managed Network Services Security Digital Security Network Management Cybersecurity

Four Things You Should Know About HIPAA Compliance

Complying with HIPAA is impossible if you don't know where to start. These four business tips will help you get started AND help your business.

With so many rules and acronyms, maintaining a HIPAA-compliant medical office can be a daunting task. Here’s a high-level recap so you can keep your eye on patient care. 

Topics: Security Digital Copiers Digital Security Healthcare Solutions Privacy Document Management Network Management Document Security Cloud Cybersecurity

Who Needs a Cybersecurity Risk Assessment? You.

You want to be HIPAA-compliant? You need to perform a risk assessment with the help of a Certified HIPAA Professional (CHP).

It's impossible to watch the news without weekly revelations of some new data breach – Target, Equifax, the WannaCry virus, and even teddy bears have been in the news.

As cybercrime continues to pay, attacks and breaches will continue and will especially affect unprepared businesses.

One industry is squarely in the crosshairs of hackers – healthcare.

Topics: Digital Security Healthcare Solutions Privacy Network Management Document Security HIPAA Network Security Cybersecurity