What is most important in your business? Your data!

November 13th, 2017

Stop for a moment and consider your most important business asset. Your data may be the first thing to come to mind. So if your data is so important, shouldn't you be taking the necessary steps to protect it from disaster?

Take a peek at our video on backup and data recovery and how we can help you protect your most important assets.

6 Questions For Your IT Manager

October 30th, 2017

Cyber Security threats are at an all time high. Are you or your current IT provider taking all of the necessary steps to keep everything you have worked so hard for safe? Here are 6 questions you should be asking yourself or you IT service provider.

Video Transcript:
Hello, I’m Mike Ritsema with i3 Business Solutions where our mission is to accelerate business results by integrating technology solutions.

Why Managed IT Services? Check out our new video!

October 19th, 2017

 

Video Transcript:
So you're a business owner.
You might be a doctor's office or a bakery or maybe you're a financial advisor, and no matter what your core business is, there's no denying that technology plays an important role in your daily operations.

BEWARE: More Phishing Attempts

February 14th, 2017

Written by James Lijewski, Level 3 Network Technician/Support Center Team Leader

Be on the lookout for more phishing attempts. This went to my Junk Email folder in my Outlook, and happened to notice it when checking for other items. Moved it to my inbox, and looks like it’s an attempt to get us to go to a malicious website.

Don’t fall victim to Gmail phishing!

January 19th, 2017

Written by James Lijewski, Level 3 Network Technician/Support Center Team Leader

For those of you using Gmail, like myself, watch this quick 4-minute video and be on the lookout for a sneaky phishing attempt.

i3 Mandate: enable 2-Factor authentication like your ATM card for key online services!

 

How do I choose new Cloud or Application Software?

January 5th, 2017

Written by Kathy Labozzetta, Partner

I would like to share some relatively simple but important rules on how to start looking for New Cloud or Application Software in the New Year:

Set Clear Goals for the Project – What is your company trying to accomplish with this change (it’s normally a massive project and investment for the company)? In other words, how are we going to measure our results to know this project is successful? Is it company cost savings, productivity gains, client and customers support or decision making dashboards that make data readily available for management and leadership teams? Whatever the justification, make sure goals are clearly documented and defined including criteria for success.

What can we expect for 2017?

December 30th, 2016

Written by Tom Emperor, Senior Engineer

With 2016 nearing an end, we can reflect on what the year brought us and what we can expect for 2017.  2016 saw quite a few progressions to the cloud landscape.  Security was brought into the forefront as phishing, keyloggers, and hacking made the front pages on several occasions from large companies to our own election.

Call your bank today. Add these layers of protection.

December 23rd, 2016

Written by Mike Ritsema, President & Partner, and Rachel Dokter, Social Media Manager

Again, i3 Business Solutions is not going away on the issue of phishing and social engineering. Our previous blog discussed the same subject: phishing for email addresses and passwords, creating fake websites to request electronic transfer of bank funds.

How to Recognize Phishing Attempts

December 16th, 2016

Written by James Lijewski, Level 3 Network Technician/Support Center Team Leader

Phishing emails, links, and phone calls are designed by hackers and thieves to steal money. They attempt to do this by various means, including calling you claiming to be a bank you do business with to confirm account information, or sending you an email pretending to be your manager and request a large money transfer for a purchase.