The Datamax Thinking Blog

Educating, collaborating, and sparking ideas for maximizing the technology that matters.


Authentication: A Significant Step in Your Winding Journey to Securing & Controlling Copier Output

Today's copier, of course, is much more than just a copier. But does your organization treat it with the same vigilance as other network devices?

Chinese philosopher Laozi once said “A journey of a thousand miles begins with a single step.”

Topics: Printing Security Print Management

Cloud of Suspicion: Ease Security Concerns with Full Control over Cloud-based Content

Cloud-based content management systems like Box unify all people, information and applications together in the cloud to transform the way they work, giving IT departments the tools they need to match the tightness of security with the speed of collaboration.

As humans, we are suspicious by nature.

Anything that’s not visually identifiable – or right in front of our eyes - can often be difficult to trust. We trust the local Italian restaurant because we know the owners. We trust local government because we’re neighbors with an elected official, and we see direct results from his or her public service in our own city. Excruciatingly cliché TV ad campaigns mention ad nauseam being “locally trusted.”

Topics: Security Productivity Tips and Tools Cloud Content Management

Fresh Ideas, Further Technology Innovation: Most Read Blogs of 2018

From document workflow, network security to print management and many things in between, our intent is to serve as a vehicle for helping YOU maximize YOUR technology investment.

Technology, much like life, moves pretty fast. If you don’t stop and look around once in a while, you could miss it.

We, the dedicated scribes of the Datamax Thinking Blog, certainly don’t want our readers to miss it. We work hard each year to contemplate, to evaluate and, ultimately, educate on many of the moving parts of an ever-changing business technology landscape. From document workflow, network security to print management and many things in between, our intent is to serve as a vehicle for helping YOU maximize YOUR technology investment.

Topics: Printing Security Digital Security Healthcare Solutions Creating Raving Fans Education Tips and Tools

Healthcare Organizations Need a Roadmap to Navigate Cybersecurity

It cannot be a one-time snapshot, or a one-time risk assessment. It has to be a continuous, ongoing process." -  Navin Balakrishnaraja, National Practice Director, Healthcare IT Services for All Covered (IT Services, Konica Minolta)

All organizations are guilty of just “going through the motions” at times.

A client services specialist leaning too heavily on his company script. The sales representative who meets her quota but fails to concentrate on continued professional development (aka, the learning zone). There are countless scenarios within a work place where crucial tasks are tackled without enthusiasm or a particular level of involvement.

But few, if any, carry the level of risk of a healthcare facility just going through the motions with its cybersecurity plan. The organization must navigate this landscape carefully, and with a trusted map that leads to long-term security and compliance for the unpredictable journey ahead.

Topics: Security Healthcare Solutions HIPAA Network Security Cybersecurity

Network Security Tactics that Cut the Strings of Socially Engineered Puppeteering

Social engineering is really no different than any old-school scam from the past, other than modern technology is the setting (for the modern attack). 

Infamous hacker turned computer security consultant Kevin Mitnick, featured in the Werner Herzog documentary “Lo and Behold, Reveries of the Connected World,” very much embodies the dark art of the Social Engineered Attack.

Mitnick is perhaps best known for breaking into the networks of IBM, Nokia and Motorola (in the case of Motorola, he stole their source code simply by talking an employee there into emailing it to him). He also claims to have compromised computers solely by using passwords and codes that he gained by social engineering.

In other words, the one-time cyber criminal’s most dangerous weapon was his gift of gab, manipulating his victims just as a puppeteer would his marionette.

Topics: Security Technology Support IT Consulting Network Security Cybersecurity

Strengthening Your IT Roots: 10 Ransomware Prevention Tips

Build strong roots from within your organization: Continue to empower employees to be proactive about cybersecurity risks and encourage them to report questionable content or activity.

An old Malay proverb states that “A tree with strong roots laughs at storms.”

Today’s workforce continues to grow remotely, with Businesswire estimating that remote workers will account for 72 percent of the US Workforce by 2020.  With more bring-your-own-devices out  in the field, endpoints continue to multiply and extend further beyond a traditional office, just like  branches on a tree.

Topics: Security Network Management IT Consulting Business Continuity Network Security Cybersecurity

GDPR Compliance: How Does Your Data Security Technology 'Stack' Up?

Even if your organization is based in the U.S., it could have a significant impact on you and your business. Every organization that processes or controls any data pertaining to EU citizens must be in compliance with the new regulation.

We share private information online today, almost subconsciously.

Downloading Apps. Online transactions. Signing up for that “free whitepaper,” filing out a survey or even hitting the “like” button on Facebook.  Consumer data today is premium fuel for businesses all over the world.

Topics: Technology Security Privacy Network Management Technology Support Business Continuity

The Elephant in the (Waiting) Room: Why Your Healthcare Facility Needs a Security Risk Analysis Now

 

Whether they are complying with HIPAA or attesting to the Merit-based Incentive Payment System (MIPS) under MACRA for positive incentives, healthcare professionals cannot avoid (and certainly cannot AFFORD to avoid) the Security Risk Analysis.

For many health organizations, the elephant in the waiting room is still seated there, anxiously anticipating when it might be acknowledged or tended to.

That elephant is the Security Risk Analysis (SRA). Originally mandated by HIPAA and subsequently further enforced by government programs such as Meaningful Use and now the Medicare Access and CHIP Reauthorization Act (MACRA), the SRA is a vital component to both healthcare facilities’ ultimate livelihood and the confidential information of their clients.

Topics: Security Healthcare Solutions HIPAA Cybersecurity

Tracking Your Steps: Five Questions for Your Document Workflow Processes

Document automation and workflow solutions help organizations share information not only more efficiently, but with the confidence of enhanced security and the ease of quicker access.

With the emergence of wearable technology, we are quickly becoming a society of health trackers.

Apps, watches and other tracking devices play a growing role in our everyday life, as this technology counts our daily steps, sleeping hours and much, much more.  These wearables keep us keenly mindful of our daily movement during waking hours and our overall health, with more and more data available to track and share. 

Topics: Security Automation Document Workflow Document Security

Release Your IT Beast of Burden with Managed Network Services

A Managed Network Services program fine tunes and establishes control over all the moving components of your network. 

Your business's network steadily hums along, serving its intended purpose with what seems like relative ease. That is, until an unexpected breakdown occurs and you begin to feel the weight of every IT issue bearing down on your office's productivity.

What seems effortless can quickly become overwhelming. What traditionally seemed like a routine method for handling IT could today be more a beast of burden for your business.

Topics: Information Technology Managed Network Services Security Network Management Network Security