2017 West Michigan Peer Groups

February 9th, 2017

Written by Mike Ritsema, President & Partner

Peer Groups have so impacted Kathy and me at i3 Business Solutions that Mary Witte and I decided to start a group right here in West Michigan.

While there are many options for peer networking available including Vistage, GR Chamber, and more – this peer group will have a little different focus.

Yearend or Full Year Strategic & Operational Planning

January 12th, 2017

Written and Recorded by Mike Ritsema, President & Partner, Directed by Molly Luxem, Marketing Assistant

 

Keith McFarland, author of The Breakthrough Company and Bounce and his keynote speech at ConnectWise IT Nation Conference

Levers to any company's Breakthrough win:

1.] Strategy

2.] People

3.] Execution.

How do I choose new Cloud or Application Software?

January 5th, 2017

Written by Kathy Labozzetta, Partner

I would like to share some relatively simple but important rules on how to start looking for New Cloud or Application Software in the New Year:

Set Clear Goals for the Project – What is your company trying to accomplish with this change (it’s normally a massive project and investment for the company)? In other words, how are we going to measure our results to know this project is successful? Is it company cost savings, productivity gains, client and customers support or decision making dashboards that make data readily available for management and leadership teams? Whatever the justification, make sure goals are clearly documented and defined including criteria for success.

What can we expect for 2017?

December 30th, 2016

Written by Tom Emperor, Senior Engineer

With 2016 nearing an end, we can reflect on what the year brought us and what we can expect for 2017.  2016 saw quite a few progressions to the cloud landscape.  Security was brought into the forefront as phishing, keyloggers, and hacking made the front pages on several occasions from large companies to our own election.

How to Recognize Phishing Attempts

December 16th, 2016

Written by James Lijewski, Level 3 Network Technician/Support Center Team Leader

Phishing emails, links, and phone calls are designed by hackers and thieves to steal money. They attempt to do this by various means, including calling you claiming to be a bank you do business with to confirm account information, or sending you an email pretending to be your manager and request a large money transfer for a purchase.

Is big data driving you forward?

November 21st, 2016

Written by Molly Luxem, Marketing Assistant

Typically, "Big Data" is a term used by researchers and enterprises, but no industry is unaffected by the value of big data. As more content is being created than ever before, companies are now leveraging compiled data in order to make more knowledgeable business choices.

Working Out Loud!

November 9th, 2016

Written by Tim Naas, Project Manager

Providing exceptional customer service requires our entire team to be connected to key information and up on the latest trends.  Applications built into Office 365, such as OneNote and Yammer, provide new ways to help keep our entire team in the know.

Are you prepared for your Cyber Breach?

November 3rd, 2016

Written by Mike Ritsema, President and Partner

You own a small business.  We own a small business.

Although i3 Business Solutions and technology specialists recommend layers of security, we say that a cyber-breach is a matter of when and how.  Be prepared.

Microsoft Office 365: What Should I Look for When Selecting a SaaS Data Protection Provider?

October 19th, 2016

Summarized by Molly Luxem, Marketing Assistant

Daily and On-Demand Backup

Daily, automated backup means that, if you choose, you can “set and forget” your backups, knowing you’ll always be protected without any effort on your part. Choose a backup provider that lets backup run quietly in the background, but also gives you the option to run a manual backup whenever you choose.

Can I retrieve that deleted file or email from Microsoft Office 365?

October 12th, 2016

Written by Mike Ritsema, President and Partner

According to Microsoft: “When you entrust your data to Office 365, you remain the sole owner of the data: you retain the rights, title, and interest in the data you store in Office 365.”  Many of us believe that if it’s in the cloud then it’s all out there somewhere.