Blog

10 Tips to Take Better Notes with Microsoft OneNote

10 Tips to Take Better Notes with Microsoft OneNote

Written By Kathy Labozzetta, i3 Business Solutions, Vice-President & partner Keeping Tabs with Microsoft Note Taking Looking for a great digital note taking app? Try Microsoft One Note. The app is available for all O365 users as both a personal and business productivity toolset.

The Weakest Link

The Weakest Link

Written by Greg Heighton, i3 Business Solutions, Network Support Technician With many of the recent high profile ransomware attacks, many companies are asking themselves about where the weakest link in their security system is. Some questions that should inevitably be asked are as follows: Do we have a firewall with properly configured rules? Do we have backups of all our critical systems? Do we have proper patching procedures in place? One question that is often overlooked is “Does everyone in the company understand the risk of malware?” In this article from ZD Net, they explain a scenario where an employee plugged an infected USB thumb drive into a system and infected the speed camera system in Victoria Australia.

Top 6 Office 365 Tips

Top 6 Office 365 Tips

Office 365 Tips:
Microsoft’s Office 365 comes with a broad range of tools that will make you and your colleagues more productive. It has simultaneous co-authoring features, SharePoint, OneDrive, and Groups, just to name a few. However, there may be some features you might not be using.

Summer is here: Help your servers beat the heat!

Summer is here: Help your servers beat the heat!

Written by Jame Lijewski, Network technician & Support Center Summer is here, and so is the heat! Servers and other network equipment gets hot, but how hot is too hot? Those high temperatures and other environmental conditions can threaten your business productivity as much as security threats.

Raving Fans! and Checklist Process Excellence

Raving Fans! and Checklist Process Excellence

Written by Mike Ritsema, President & Partner   The Winner of the Customer Service Darwin Award goes to … United Airlines for bringing in security to physically drag a passenger off a plane for not complying with their bump policy.  We now know that four United employees needed seats and he was the odd man out.

Cloud security: everything you need to know

Cloud security: everything you need to know

Cloud technology is becoming more pervasive every day. Some reports claim that almost 90% of businesses will utilize some form of the technology in 2017. But somehow myths about its lack of security remain. From cloud-based software to data storage, we believe it’s security is swiftly becoming better than that of local area networks.

Lessons learned from the WannaCry ransomware

Lessons learned from the WannaCry ransomware

WannaCry is one of the few malware campaigns to become a household name. It’s educated countless people on the reality of ransomware and the vulnerability of their data. If you’re still worried about whether you’re at risk, we’ve collected everything you need to know right here.

Precautions against WannaCry ransomware

Precautions against WannaCry ransomware

The WannaCry ransomware, a type of malware that encrypts a victim’s files and extorts them for money, has already affected thousands of machines worldwide. Unfortunately, the success of this attack is just the beginning. According to security researchers, other hackers will probably develop stronger WannaCry variants in the coming months.

Office 365 receives security upgrades

Office 365 receives security upgrades

With the increasing sophistication of cyberattacks, businesses need even stronger security tools to defend their sensitive documents. Fortunately, Office 365 subscribers now have more advanced security tools to stay ahead of the ever-evolving threat landscape.

Cybersecurity Education: Google Defender Scam

Cybersecurity Education: Google Defender Scam

If employee training and education isn’t an integral part of your cybersecurity strategy, a recent scam might force you to reconsider. Instead of relying on complicated programming code to steal and destroy data, hackers are increasingly relying on human errors to get the job done.