The Datamax Thinking Blog

Educating, collaborating, and sparking ideas for maximizing the technology that matters.


The Elephant in the (Waiting) Room: Why Your Healthcare Facility Needs a Security Risk Analysis Now

Whether they are complying with HIPAA or attesting to the Merit-based Incentive Payment System (MIPS) under MACRA for positive incentives, healthcare professionals cannot avoid (and certainly cannot AFFORD to avoid) the Security Risk Analysis.

For many health organizations, the elephant in the waiting room is still seated there, anxiously anticipating when it might be acknowledged or tended to.

That elephant is the Security Risk Analysis (SRA). Originally mandated by HIPAA and subsequently further enforced by government programs such as Meaningful Use and now the Medicare Access and CHIP Reauthorization Act (MACRA), the SRA is a vital component to both healthcare facilities’ ultimate livelihood and the confidential information of their clients.

Topics: Security Healthcare Solutions HIPAA Cybersecurity

Tracking Your Steps: Five Questions for Your Document Workflow Processes

Document automation and workflow solutions help organizations share information not only more efficiently, but with the confidence of enhanced security and the ease of quicker access.

With the emergence of wearable technology, we are quickly becoming a society of health trackers.

Apps, watches and other tracking devices play a growing role in our everyday life, as this technology counts our daily steps, sleeping hours and much, much more.  These wearables keep us keenly mindful of our daily movement during waking hours and our overall health, with more and more data available to track and share. 

Topics: Security Automation Document Workflow Document Security

Release Your IT Beast of Burden with Managed Network Services

A Managed Network Services program fine tunes and establishes control over all the moving components of your network. 

Your business's network steadily hums along, serving its intended purpose with what seems like relative ease. That is, until an unexpected breakdown occurs and you begin to feel the weight of every IT issue bearing down on your office's productivity.

What seems effortless can quickly become overwhelming. What traditionally seemed like a routine method for handling IT could today be more a beast of burden for your business.

Topics: Information Technology Managed Network Services Security Network Management Network Security

Dozens of Business Productivity Tips – Our 11 Best and Most Popular Blogs of 2017

You have a lot of options on the market when you make a technology purchase. The best solution for your business isn't determined solely by the price, the feature set, or how fast the vendor gets it to your doorstep.

Every year, I learn more about copiers, document management, workflow, and, increasingly, managed IT topics.

I do my best to pass on what I learn to you.

Here are the 11 most popular posts in 2017. They cover a range of topics:

Read on for insights into those topics – and more – to get yourself ready for 2018! 

Topics: Scanning Information Technology Technology Multifunction Copier Did you know? Managed Network Services Security Digital Copiers Digital Security Productivity Tips and Tools Healthcare Solutions Office Equipment Legal Solutions Network Management Document Workflow Document Security IT Consulting Business Continuity Disaster Recovery

7 Things Every SMB Must Know About Cybersecurity

Do you think your business' size will protect you from cybercriminals. It won't.

Simple fact: cybercriminals are coming for you.

That's anyone reading this – individuals, 2-person businesses, Fortune 1000, or the mom and pop store on the corner.

All businesses have customer and other data that can be hacked. Criminals want that data.

Most SMBs attempt to secure themselves. However, they don't have the money or access to expertise that larger companies do. Their defenses aren't as strong as larger companies.

It's a lot easier to pick the lock on a doorknob (just to be 100% clear, this is you SMBs) than on a maximum security safe. Who do you think cybercriminals are going to target? 

Here are seven things every SMB must know about cybersecurity.

Topics: Information Technology Managed Network Services Security Digital Security Network Management Cybersecurity

Four Things You Should Know About HIPAA Compliance

Complying with HIPAA is impossible if you don't know where to start. These four business tips will help you get started AND help your business.

With so many rules and acronyms, maintaining a HIPAA-compliant medical office can be a daunting task. Here’s a high-level recap so you can keep your eye on patient care. 

Topics: Security Digital Copiers Digital Security Healthcare Solutions Privacy Document Management Network Management Document Security Cloud Cybersecurity

Ransomware Attacks Target SMBs – A Data Backup Strategy Minimizes Any Damage

Every company is vulnerable to cybercriminals – especially SMBs because their infrastructure is usually less secure. Use data backup as part of your security strategy against ransomware.

Cybercriminals want to hold your information for ransom. And they are coming after your small to medium sized business because your networks are usually less secure than larger businesses.

Don't just take my word for it.

The FBI estimates that the “ransomware industry” was worth $1 billion in 2016. That number is expected to grow in 2017. 

Topics: Information Technology Managed Network Services Security Digital Security Network Management Cloud IT Consulting Business Continuity Disaster Recovery

Train Your Law Firm Employees on Security Awareness

Most high-profile cyber security breaches occur when hackers target an organization's weakest link – its people.

Want to see a lawyer (or IT director) sweat? Whisper the words “data breach” in their ear.

One way for law firms to keep themselves from becoming the next cyber victim is to make everyone in the firm a member of the “defense.” Security awareness training is a great place to start. 

To add that extra layer of data security, 49% of firms having security awareness training programs in place – and for law firms with more than 350 attorneys, that number increases to 86%.

Why are law firms investing in security awareness training? Since 2009 the FBI has been warning that hackers are targeting law firms.

Topics: Security Legal Solutions Network Security Cybersecurity

Document Security Is A Necessity to Every Law Office

Though each one of the security concerns bulleted above is important, there are still a few other information security issues that copiers can help with.

The biggest concern for legal IT departments is no longer email management.

“Whew!” is what’s going through your mind right?

Don’t get too excited. Now the number 1 concern is . . . security management.*

Topics: Security Digital Security Legal Solutions Secure Printing

You Could Be A Sitting Duck For Hackers – Here’s Why

Obviously in order to secure your business and sensitive data you have to know your points of weakness.

How many printers, scanners, copiers, computers, laptops, webcams, tablets, and smartphones are in your office right now? Every one of them is a ripe target for hackers. 

So, if you truly counted, and I know you did because what better way to spend your already limited time, then that’s how many points of penetration the cyber-thieves of the world have to gain access to your network (and your data). Oh, and if you have any videoconferencing systems, smart TVs, or DVRs, go ahead and tack that on to your list of hacker-vulnerable equipment.

Topics: Security Productivity Tips and Tools Network Management