The most wonderful time of year… for scammers!

December 18th, 2017

Written by Brandi Koloski, Marketing Assistant at i3 Business Solutions
Here it comes - The most wonderful time of year! This is the prime time to be with family and to be a little more joyous and giving than usual. The winter holidays are generally considered to be a wonderful time of year – but don’t let the overpowering scent of pine trees and peppermint take you off your guard.

6 Questions For Your IT Manager

October 30th, 2017

Cyber Security threats are at an all time high. Are you or your current IT provider taking all of the necessary steps to keep everything you have worked so hard for safe? Here are 6 questions you should be asking yourself or you IT service provider.

Video Transcript:
Hello, I’m Mike Ritsema with i3 Business Solutions where our mission is to accelerate business results by integrating technology solutions.

Think patching is unimportant? Ask Equifax

September 15th, 2017

Written by Brandi Koloski, i3 Business Solutions - Marketing Assistant
Has your security ever been breached after sharing too much information online?

With i3’s ReliabilITy, The answer would be NO because the team here at i3 is constantly updating and protecting your organization, information, and technology.

i3 Cyber Security Essentials

April 12th, 2017

 

Video by: Mike Ritsema, President & Partner

As technology changes and improves, a new set of issues arise from cyberspace. Recent marches to the cloud means that Cyber Threat Vectors are changing. This means an immediate threat to your cyber wellbeing.

BEWARE: More Phishing Attempts

February 14th, 2017

Written by James Lijewski, Level 3 Network Technician/Support Center Team Leader

Be on the lookout for more phishing attempts. This went to my Junk Email folder in my Outlook, and happened to notice it when checking for other items. Moved it to my inbox, and looks like it’s an attempt to get us to go to a malicious website.

Don’t fall victim to Gmail phishing!

January 19th, 2017

Written by James Lijewski, Level 3 Network Technician/Support Center Team Leader

For those of you using Gmail, like myself, watch this quick 4-minute video and be on the lookout for a sneaky phishing attempt.

i3 Mandate: enable 2-Factor authentication like your ATM card for key online services!

 

What can we expect for 2017?

December 30th, 2016

Written by Tom Emperor, Senior Engineer

With 2016 nearing an end, we can reflect on what the year brought us and what we can expect for 2017.  2016 saw quite a few progressions to the cloud landscape.  Security was brought into the forefront as phishing, keyloggers, and hacking made the front pages on several occasions from large companies to our own election.

How to Recognize Phishing Attempts

December 16th, 2016

Written by James Lijewski, Level 3 Network Technician/Support Center Team Leader

Phishing emails, links, and phone calls are designed by hackers and thieves to steal money. They attempt to do this by various means, including calling you claiming to be a bank you do business with to confirm account information, or sending you an email pretending to be your manager and request a large money transfer for a purchase.

Are you prepared for your Cyber Breach?

November 3rd, 2016

Written by Mike Ritsema, President and Partner

You own a small business.  We own a small business.

Although i3 Business Solutions and technology specialists recommend layers of security, we say that a cyber-breach is a matter of when and how.  Be prepared.