Surefire ways to protect your email account

December 6th, 2021

If you think your email is safe from hackers, think again. A lack of sufficient email security protocols can lead to data theft, unauthorized access to sensitive information, and successful malware attacks. Here are some tips to secure your email account from cyberthreats and the many troubles that come with them.

Printer security tips to prevent cyberattacks against your business

December 1st, 2021

Business leaders invest a lot of time and resources into cybersecurity because they understand that protecting sensitive data is a necessity in the digital age. One business component that often gets overlooked are business printers. They are also vulnerable to cyberattacks, so make sure to follow these tips to ensure your company stays protected.

5 Signs of a VoIP System Security Breach

November 22nd, 2021

Voice over Internet Protocol (VoIP) phone systems are game-changing, allowing users to make and receive calls from virtually anywhere with an internet connection. Examples of VoIP are Microsoft Teams, Facebook Messenger, and Google Hangouts. Unfortunately, as with anything on the Internet, they are not completely safe from cyberthreats.

How embracing new tech can benefit your business

November 15th, 2021

As a business owner in West Michigan, you understand the importance of upgrading your company’s technology infrastructure. You’re also aware that technology isn’t cheap, which is perhaps why you’re hesitant to invest in new hardware and software.

Consider these points when purchasing antivirus software

October 15th, 2021

If you think cybersecurity protection is only for large enterprises, think again. More and more cybercriminals are targeting small- and mid-sized businesses because of their lack of proper cybersecurity solutions. Viruses, ransomware, and other types of malware are also becoming more dangerous.

Think your password is secure? Think again

September 22nd, 2021

The National Institute of Standards and Technology (NIST) created many of the password best practices you probably loathe, including using a combination of letters, numbers, and special characters. The NIST now says those guidelines were ill-advised and has changed its stance.

[Webinar] 5 Cybersecurity Priorities Every IT Manager Must Address

October 31st, 2019

This week, Mike Ritsema and Brian Abraham, i3’s CTO, hosted a webinar on 5 cybersecurity priorities every IT manager should address. Over the past year, there have been hundreds of cyberattacks targeted at businesses right here in West Michigan – we want to ask you: how is your current IT manager mitigating risks for your business, and are they addressing the following priorities?
1. Multi-factor authentication
2. Employee training & awareness education
3. User security permissions review
4. Patching & protecting
5. Backups

To learn more about each of the priorities, listen to the webinar below:

We are continuing to improve our security services in 2019 – learn more about i3’s Fortress security services here.

Mike Ritsema talks about cybersecurity and business

July 25th, 2019

This week, Mike Ritsema, president of i3 Business Solutions, shares insightful business tips on how to protect your business from cybersecurity threats and disasters. With 20 years of experience in the technology industry, Mike is well-aware of the risks your business is vulnerable to.

Mike Ritsema talks about business in Michigan in CPN article

July 11th, 2019

Last week, Channel Partners Insight, provider of analysis news for channel business leaders, talked with state-wide players to unpack key impact points for MSPs in Michigan. Mike Ritsema, President of i3 Business Solutions and a leader in the nationwide technology community, is quoted throughout this article.