The Datamax Thinking Blog

Educating, collaborating, and sparking ideas for maximizing the technology that matters.


Ransomware Attack Report: Equipping Front Lines of Defense - Employees

While attacks declined slightly this year, phishing attacks remained the most successful attack vector, followed by a number of other employee errors that could be mitigated with better security training.

The front line, in military terminology, is the position(s) closest to the area of conflict of an armed force's personnel and equipment. It's a vulnerable position on the battlefield, but also in the office.

Employee cyber security education is an essential piece of any effective ransomware protection strategy. But as SMBs keep taking the phishing bait, their front lines — their own employees — are exposed as a weak link in their defense plan. 

Topics: Network Management Network Security Ransomware

5 Questions to Ask When Choosing a Managed IT Services Provider

From offering timely onsite and remote support, to the ability to avoid buzzwords and communicate clearly to your end users, you should expect more for your organization.

With overall small to medium-sized business spending on managed services growing at 15% per year (According to Datto’s 2020 State of the MSP Report), it’s no surprise that most Managed Service Providers are growing.

Topics: Network Management Microsoft Gold Partner Network Security

3 COVID-19 Phishing Email Examples To Help Your Business Identify Scams

But what might a COVID-19 phishing email scam look like? We looked in our own inbox, and accessed a valuable cybersecurity resource, to show you things to be looking for.

Two basic qualities that cybercriminals prey on are vulnerability and desperation. With so many on high alert with COVID-19 information and updates, phishing season is in full swing.

Topics: Network Management Network Security Coronavirus

How Businesses Can Help Employees Securely Work From Home

With the likely increase in remote work, companies will have to prepare in various ways to avoid cybersecurity risks or interruptions to business.

As the coronavirus (COVID-19) continues to spread uncertainty regarding routine business operations, employee safety stands as a top concern for employers ... as does network management and IT security.

Topics: Managed Network Services Network Management IT Consulting Business Continuity Network Security Cybersecurity Coronavirus Remote Workforce Planning Managed Services Provider

Among Online Criminal Activities, Ransomware Remains the Biggest Offender

According to the report, 1 in 5 SMBs report that they’ve fallen victim to a ransomware attack. 85 percent of MSPs report attacks against SMBs in the last two years

Cyberspace is overflowing with malicious activity. But among online criminal acts affecting businesses today, Ransomware remains the biggest offender.

Datto's "Global State of the Channel Ransomware Report" sheds light on the current state of this notorious online threat, pulling together perspectives from Managed Service Providers (MSPs), their partners, and their clients from around the world. It also eyes the perspectives from both the IT channel and the SMB clients it serves.

The bottom line? Ransomware is still the #1 villain.

Topics: Network Management Network Security Ransomware

3 Best Practices for Filling the Healthcare IT Security Gap

Nearly a third of all healthcare employee respondents (32%) said that they had never received cybersecurity training from their workplace ... but should have.

Healthcare today has its share of gaps: Gaps in healthcare access, gaps in the treatment of chronic diseases, and gaps in communication between patient and provider.

But what about the existing gaps in a medical facility's IT security plan?

Topics: Healthcare Solutions Network Management Network Security Secure Printing

Tax Season is Here: Have You Audited for Social Engineered Attacks?

This is not a sophisticated scam. However, it is an effective and profitable one and it happens to an increasing number of companies across America each year around tax time.

Tax season is here. Are you safe? That seems like an odd question to ask; nevertheless, with the increasing sophistication of cybercriminals it must be considered and answered.

Topics: Network Management Technology Support Network Security Social Engineering

Swing Your Sword: 6 Strategies for Crafting a Razor Sharp IT Business Continuity Plan

The ability to act swiftly, act confidently and swing your sword with great technique and without hesitation rests on your pre-crafted, pre-tested game plan.

Mike Leach, arguably the most notable innovator in college football’s Air Raid Attack, developed a popular mantra for his team in 2003: “Swing Your Sword.”

It was after a loss where his defense looked timid, his team confused and unprepared.

Topics: Network Management Technology Support Cloud IT Consulting Business Continuity Network Security Cybersecurity

Is Your IT Security Strategy 'All-Inclusive?'

Businesses often throw money and technology at the problem: firewalls, content filters, encrypted data and email, antivirus and anti-malware tools. But a more all-inclusive approach covers much more ground than just hardware. 

The nerves are shot. The internal screams of frustration finally slipped out across the salesroom floor. You need a vacation. And visiting an all-inclusive resort provides the ultimate peace of mind.

Topics: Network Management Network Security

Managing Workflow Feel Like Herding Cats? Consider a Technology Assessment

A thorough technology assessment – significantly more than a simple walk through – is designed to provide accurate insights and perspective on current infrastructure, workflow and personnel.

It can become a lot like herding cats.

Organizations often fall victim to processes that are unorganized, unwieldy and scattered in all directions: Delayed document approvals that gather dust on a desk or stall helplessly in a manager’s inbox. Shaky (and unsecured) IT Infrastructure that has the wheels of IT personnel spinning for hours every day. Fluctuating monthly print costs that ride along spreadsheets like a rickety wooden roller coaster – enough shake and rattle to give any CFO a migraine.

Topics: Printing Partnering Technology Pain Network Security