BEWARE: More Phishing Attempts

February 14th, 2017

Written by James Lijewski, Level 3 Network Technician/Support Center Team Leader

Be on the lookout for more phishing attempts. This went to my Junk Email folder in my Outlook, and happened to notice it when checking for other items. Moved it to my inbox, and looks like it’s an attempt to get us to go to a malicious website.

2017 West Michigan Peer Groups

February 9th, 2017

Written by Mike Ritsema, President & Partner

Peer Groups have so impacted Kathy and me at i3 Business Solutions that Mary Witte and I decided to start a group right here in West Michigan.

While there are many options for peer networking available including Vistage, GR Chamber, and more – this peer group will have a little different focus.

Yearend or Full Year Strategic & Operational Planning

January 12th, 2017

Written and Recorded by Mike Ritsema, President & Partner, Directed by Molly Luxem, Marketing Assistant

 

Keith McFarland, author of The Breakthrough Company and Bounce and his keynote speech at ConnectWise IT Nation Conference

Levers to any company's Breakthrough win:

1.] Strategy

2.] People

3.] Execution.

How do I choose new Cloud or Application Software?

January 5th, 2017

Written by Kathy Labozzetta, Partner

I would like to share some relatively simple but important rules on how to start looking for New Cloud or Application Software in the New Year:

Set Clear Goals for the Project – What is your company trying to accomplish with this change (it’s normally a massive project and investment for the company)? In other words, how are we going to measure our results to know this project is successful? Is it company cost savings, productivity gains, client and customers support or decision making dashboards that make data readily available for management and leadership teams? Whatever the justification, make sure goals are clearly documented and defined including criteria for success.

What can we expect for 2017?

December 30th, 2016

Written by Tom Emperor, Senior Engineer

With 2016 nearing an end, we can reflect on what the year brought us and what we can expect for 2017.  2016 saw quite a few progressions to the cloud landscape.  Security was brought into the forefront as phishing, keyloggers, and hacking made the front pages on several occasions from large companies to our own election.

Not sure what to give your techie friend for Christmas?

December 9th, 2016

Written by Benny Buljko, Level 2 Support Technician

Now that we’re closing in on the holiday season, it may not be too late to get that last-minute gift for a loved one. Although we all want the next best TV, newest smartphone, and most powerful laptop on the market, there are a few new tech gadgets to consider before making a decision! Our technology professionals at i3 Business Solutions have devised a list of “hot” tech gadgets that are rapidly gaining popularity.

Office 365 Roadmap – Large File Attachments using OneDrive

November 30th, 2016

Written by Mike Ritsema, President and Partner

At i3 Business Solutions, we rail against islands of information.  The key to I.T.:  Information Technology – is I.S.: Information Systems.  Less information systems or platforms means improved collaboration and productivity.

Are you prepared for your Cyber Breach?

November 3rd, 2016

Written by Mike Ritsema, President and Partner

You own a small business.  We own a small business.

Although i3 Business Solutions and technology specialists recommend layers of security, we say that a cyber-breach is a matter of when and how.  Be prepared.

Microsoft Office 365: Data Loss in Cloud Application

October 7th, 2016

Summarized by Molly Luxem, Marketing Assistant

When disaster strikes your organization, you can’t just “start over”, unless you have a dependable backup and restore solution for SaaS data protection. Many of us believe that while cloud solutions are highly available and highly redundant, they’re also backed up to our own expectations.

Ransomware: How expensive can it really be?

September 28th, 2016

Summarized by Molly Luxem, Marketing Assistant

I shared a meal not long ago with a source who works at a financial services company. The subject of ransomware came up and he told me that a server in his company had recently been infected with a particularly nasty strain that spread to several systems before the outbreak was quarantined.