6 Questions For Your IT Manager

October 30th, 2017

Cyber Security threats are at an all time high. Are you or your current IT provider taking all of the necessary steps to keep everything you have worked so hard for safe? Here are 6 questions you should be asking yourself or you IT service provider.

Video Transcript:
Hello, I’m Mike Ritsema with i3 Business Solutions where our mission is to accelerate business results by integrating technology solutions.

Think patching is unimportant? Ask Equifax

September 15th, 2017

Written by Brandi Koloski, i3 Business Solutions - Marketing Assistant
Has your security ever been breached after sharing too much information online?

With i3’s ReliabilITy, The answer would be NO because the team here at i3 is constantly updating and protecting your organization, information, and technology.

Cybersecurity Education: Google Defender Scam

May 12th, 2017

If employee training and education isn’t an integral part of your cybersecurity strategy, a recent scam might force you to reconsider. Instead of relying on complicated programming code to steal and destroy data, hackers are increasingly relying on human errors to get the job done.

i3 Cyber Security Essentials

April 12th, 2017

 

Video by: Mike Ritsema, President & Partner

As technology changes and improves, a new set of issues arise from cyberspace. Recent marches to the cloud means that Cyber Threat Vectors are changing. This means an immediate threat to your cyber wellbeing.

BEWARE: More Phishing Attempts

February 14th, 2017

Written by James Lijewski, Level 3 Network Technician/Support Center Team Leader

Be on the lookout for more phishing attempts. This went to my Junk Email folder in my Outlook, and happened to notice it when checking for other items. Moved it to my inbox, and looks like it’s an attempt to get us to go to a malicious website.

Don’t fall victim to Gmail phishing!

January 19th, 2017

Written by James Lijewski, Level 3 Network Technician/Support Center Team Leader

For those of you using Gmail, like myself, watch this quick 4-minute video and be on the lookout for a sneaky phishing attempt.

i3 Mandate: enable 2-Factor authentication like your ATM card for key online services!

 

Call your bank today. Add these layers of protection.

December 23rd, 2016

Written by Mike Ritsema, President & Partner, and Rachel Dokter, Social Media Manager

Again, i3 Business Solutions is not going away on the issue of phishing and social engineering. Our previous blog discussed the same subject: phishing for email addresses and passwords, creating fake websites to request electronic transfer of bank funds.

How to Recognize Phishing Attempts

December 16th, 2016

Written by James Lijewski, Level 3 Network Technician/Support Center Team Leader

Phishing emails, links, and phone calls are designed by hackers and thieves to steal money. They attempt to do this by various means, including calling you claiming to be a bank you do business with to confirm account information, or sending you an email pretending to be your manager and request a large money transfer for a purchase.

Don’t let hackers fool you with these tricks

August 18th, 2016

According to several reports, the volume of malicious cyber attacks have increased since the beginning of the Rio Olympics. And even though our devices have the latest network security systems, hackers have a cunning trick up their sleeves — social engineering.