Can I retrieve that deleted file or email from Microsoft Office 365?

October 12th, 2016

Written by Mike Ritsema, President and Partner

According to Microsoft: “When you entrust your data to Office 365, you remain the sole owner of the data: you retain the rights, title, and interest in the data you store in Office 365.”  Many of us believe that if it’s in the cloud then it’s all out there somewhere.

Microsoft Office 365: Data Loss in Cloud Application

October 7th, 2016

Summarized by Molly Luxem, Marketing Assistant

When disaster strikes your organization, you can’t just “start over”, unless you have a dependable backup and restore solution for SaaS data protection. Many of us believe that while cloud solutions are highly available and highly redundant, they’re also backed up to our own expectations.

Ransomware: How expensive can it really be?

September 28th, 2016

Summarized by Molly Luxem, Marketing Assistant

I shared a meal not long ago with a source who works at a financial services company. The subject of ransomware came up and he told me that a server in his company had recently been infected with a particularly nasty strain that spread to several systems before the outbreak was quarantined.

Do you have a backup plan that’s better than the White House?

September 21st, 2016

Written by Rachel Dokter, Social Media Manager

Anita McBride recalls her memory of Sept. 11, 2001 while working at the White House. Upon hearing that a plane had struck the World Trade Center, the threat was made real to her when the Secret Service directed her to a different room.

Disaster Recovery

September 16th, 2016

Written by Rachel Dokter, Social Media Manager

On August 20, a tornado swept through West Michigan destroying trees, damaging homes and leaving a mess behind it.  This elevated fear due to the risk of fire and natural disaster- along with the affects it may have on local businesses in its path.

Would You Use This ATM?

August 1st, 2016

Summarized by Molly Luxem, Marketing Assistant

One simple principle of computer security is this: If you can’t prove the physical security of a networked thing, you also cannot prove its cybersecurity. That’s because in most cases, networked things really aren’t designed to defend an experienced and driven attacker who can physically connect his own devices.

You’re Invited: Security Executive Briefing

May 10th, 2016

 i3 Business Solutions would like to personally invite you to an exclusive Security Executive Briefing on Thursday, May 26th at 11:45AM.
i3 continues to see a rise in ransom ware and phishing attacks. Disasters of all shapes and sizes linger in the shadows waiting to attack.

New Threat for Apple Devices – Updates are Advised

April 15th, 2016

Anyone with an Apple iPhone or iPad should check to see if their device is running the latest version of Apple’s mobile operating system – version 9.3.1.

A recent article posted by Krebs On Security explains that failing to update may expose your device to automatic threats that can easily render them to become unresponsive or useless.

Tax Data Scammers Strike Again

March 16th, 2016

The firm Moneytree recently joined a growing list of companies targeted by W2 phishing scams this year.
The company alerted employees on March 4th that their tax data had been given to the scammer by accident.

The scammer was able to impersonate a targeted employee at Moneytree by sending an email, asking for information regarding the company’s payroll.

Don’t Fall Victim to W-2 Phishing

March 8th, 2016

Employees can never be too careful when dealing with their W-2 tax documents.
According to Krebs on Security, the major data company, Seagate Technology, became victim to a W-2 phishing scam on March 1st. An employee at Seagate received what they thought to be an internal company request and regrettably gave out all current and past employees W-2 tax documents.