The Datamax Thinking Blog

Educating, collaborating, and sparking ideas for maximizing the technology that matters.


Swing Your Sword: 6 Strategies for Crafting a Razor Sharp IT Business Continuity Plan

The ability to act swiftly, act confidently and swing your sword with great technique and without hesitation rests on your pre-crafted, pre-tested game plan.

Mike Leach, arguably the most notable innovator in college football’s Air Raid Attack, developed a popular mantra for his team in 2003: “Swing Your Sword.”

It was after a loss where his defense looked timid, his team confused and unprepared.

Topics: Network Management Technology Support Cloud IT Consulting Business Continuity Network Security Cybersecurity

Is Your IT Security Strategy 'All-Inclusive?'

Businesses often throw money and technology at the problem: firewalls, content filters, encrypted data and email, antivirus and anti-malware tools. But a more all-inclusive approach covers much more ground than just hardware. 

The nerves are shot. The internal screams of frustration finally slipped out across the salesroom floor. You need a vacation. And visiting an all-inclusive resort provides the ultimate peace of mind.

Topics: Network Management Network Security

Managing Workflow Feel Like Herding Cats? Consider a Technology Assessment

A thorough technology assessment – significantly more than a simple walk through – is designed to provide accurate insights and perspective on current infrastructure, workflow and personnel.

It can become a lot like herding cats.

Organizations often fall victim to processes that are unorganized, unwieldy and scattered in all directions: Delayed document approvals that gather dust on a desk or stall helplessly in a manager’s inbox. Shaky (and unsecured) IT Infrastructure that has the wheels of IT personnel spinning for hours every day. Fluctuating monthly print costs that ride along spreadsheets like a rickety wooden roller coaster – enough shake and rattle to give any CFO a migraine.

Topics: Printing Partnering Technology Pain Network Security

Recent Lawsuit Builds Even Bigger Case for Cybersecurity Education

Organizations must be accountable for guarding against cybersecurity, they must be fully aware of current risks, and they must be proactive about Cybersecurity education.

As cybersecurity increasingly becomes an agenda item inside the executive boardroom, organizations continue to recognize their own accountability in guarding against cyberattack.

But what about end users? How accountable are they?

It’s an interesting question raised in a recent news article published in KnowBe4’s Security Awareness Training Blog.

Topics: Managed Network Services Network Management Network Security Cybersecurity

5 Technology Initiatives that Will Drive Business Transformation in 2019

Paired with a barrage of potential threats, yet brimming with productive potential, technology plays an intimate role in the routines of today’s business workday. When well harnessed, it can unlock unforeseen competitive advantages.

Henry Ford once said, "I don't read history. That's in the past. I'm thinking of the future."

Ford, of course, was the Michigan-born engineer who developed a petrol-driven quadricycle into a small car; this proved the basis for the famous Model T motor car introduced in 1908. Just as Ford’s ingenuity forever transformed the auto industry, technology has been a driving force in business transformation for years.

As we look at the state of technology as it relates to business in 2019, Ford’s quote has a profound foreshadowing effect.

Topics: Scanning Printing Healthcare Solutions Network Management Cloud HIPAA Network Security Cybersecurity Managed Compliance Services Content Management

7 Trustworthy Steps in Avoiding Ransomware, Phishing Scams

Organizations today need an IT strategy that acts as a belayer, a trusted entity of support to prevent malicious attack. 

Rock climbing is an endeavor built entirely around trust: Trust in your belayer.  Trust in your equipment.  Trust in the terrain surrounding you. And, of course, trust in yourself.

Likewise, your organization’s online security often comes down to a matter of trust. But trust in this manner should never be earned without scrutiny, verification and due diligence.

Topics: Managed Network Services Network Management Network Security Cybersecurity

HIPAA: Failure to Comply Could Mean Goodbye

Your plan should begin with a Security Risk Analysis. It should also continue with the construction of a long-term compliance framework, one that offers visibility into current risks and reinforces firm security-related policies and procedures. 

When it comes to your healthcare organization and HIPAA, failure (to comply) is not an option.

Topics: Healthcare Solutions Network Management HIPAA Network Security Managed Compliance Services

Healthcare Organizations Need a Roadmap to Navigate Cybersecurity

It cannot be a one-time snapshot, or a one-time risk assessment. It has to be a continuous, ongoing process." -  Navin Balakrishnaraja, National Practice Director, Healthcare IT Services for All Covered (IT Services, Konica Minolta)

All organizations are guilty of just “going through the motions” at times.

A client services specialist leaning too heavily on his company script. The sales representative who meets her quota but fails to concentrate on continued professional development (aka, the learning zone). There are countless scenarios within a work place where crucial tasks are tackled without enthusiasm or a particular level of involvement.

But few, if any, carry the level of risk of a healthcare facility just going through the motions with its cybersecurity plan. The organization must navigate this landscape carefully, and with a trusted map that leads to long-term security and compliance for the unpredictable journey ahead.

Topics: Security Healthcare Solutions HIPAA Network Security Cybersecurity

Network Security Tactics that Cut the Strings of Socially Engineered Puppeteering

Social engineering is really no different than any old-school scam from the past, other than modern technology is the setting (for the modern attack). 

Infamous hacker turned computer security consultant Kevin Mitnick, featured in the Werner Herzog documentary “Lo and Behold, Reveries of the Connected World,” very much embodies the dark art of the Social Engineered Attack.

Mitnick is perhaps best known for breaking into the networks of IBM, Nokia and Motorola (in the case of Motorola, he stole their source code simply by talking an employee there into emailing it to him). He also claims to have compromised computers solely by using passwords and codes that he gained by social engineering.

In other words, the one-time cyber criminal’s most dangerous weapon was his gift of gab, manipulating his victims just as a puppeteer would his marionette.

Topics: Security Technology Support IT Consulting Network Security Cybersecurity

Strengthening Your IT Roots: 10 Ransomware Prevention Tips

Build strong roots from within your organization: Continue to empower employees to be proactive about cybersecurity risks and encourage them to report questionable content or activity.

An old Malay proverb states that “A tree with strong roots laughs at storms.”

Today’s workforce continues to grow remotely, with Businesswire estimating that remote workers will account for 72 percent of the US Workforce by 2020.  With more bring-your-own-devices out  in the field, endpoints continue to multiply and extend further beyond a traditional office, just like  branches on a tree.

Topics: Security Network Management IT Consulting Business Continuity Network Security Cybersecurity