Encryption: Friend or Foe?

July 14th, 2015

At i3 Business Solutions risk mitigation and security management are paramount to everything we do.  The challenge of managing encryption from both a practical and performance standpoint remains the universal challenge.  Technology marches on as new solutions innovate.

FBI Scam Alert: Educate Your Employees!

July 1st, 2015


Please wire $195,767.61 to the account information attached. Code to admin expenses and please send me confirmation when completed.



Imagine you are John and typically receive requests for wire transfers from your supervisor, George.

HIPAA Compliance

June 10th, 2015

Recently, Monica Donahue’s 19 year old daughter received a Facebook friend request and the story made the Grand Rapids Press. Surprised? I wouldn’t doubt it, because hardly ever does a Facebook friend request make the news. However, when the friend request is from a hospital security guard a day after a visit to that hospital and is in violation of HIPAA standards; it becomes a much bigger deal.

Manage Your Risk Proactively

June 2nd, 2015

I belong to you, but am used more by others. What am I?

Give up? Answer: your name. Although people do use your name more than you, it becomes more personal when they claim your name or social security number as their own. Name, birth date, social security number, and family information encompass all that we are as individuals.

Are security questions secure?

May 29th, 2015

What is your Mother’s maiden name? What street did you grow up on? Recently Google researchers’ announced a discovery: Security questions are not that secure. Many already knew this to be true, however, previously there was no research to support that assumption.

Protect Your Business from Identity Theft

May 5th, 2015

This month for the Grand Rapids Business Journal, Mike Ritsema discusses the threats of cybercrimes and highlights a proactive approach to minimize the impact on your businesses.

Your small business is at risk of substantial loss due to cybercrime.

Social engineering and phishing are two cybercrimes that threaten both your business’ and employees’ personal lives.

Why Businesses Need Office 365

March 17th, 2015

Office 365 is a service that provides businesses with all the necessary applications and software to effectively and efficiently manage their business. Microsoft offers a couple different subscription plans which allow a business to tailor it to their needs.

4 Technology Trends for 2015

March 13th, 2015

Many significant events and trends occurred in the early 1990’s.  Yet one revolutionized the world as we know it now. Hip Hop? No. Leg warmers? No. Cable TV? No. The World Wide Web. Ever since then technology is continuously improving and changing.

GRBJ Highlight: Technology marches on | Lessons from data breaches

February 5th, 2015

The staff at i3 Business Solutions contribute regularly to the Grand Rapids Business Journal blog. This month, Mike Ritsema expands on the learning lessons that have come out of recent data breaches with major companies.

Technology marches on to the benefit and detriment of society — and business.

National Cyber Security Awareness Month: Staying Safe Online

October 30th, 2014

It's somehow fitting that Halloween wraps up National Cyber Security Awareness Month as designated by Homeland Security of the federal government. At i3 Business Solutions, we take technology risk management seriously by working with a number of security experts and organizations including David Stelzl, Michael Semel, CompTIA, GRRconand the West Michigan Cyber Security Consortium (WMCSC).

Below we've compiled i3's top five cyber security mandates aligned to Week Five of National Cyber Security Awareness Month:

Change your password! If you haven't changed your password in 2014 (or in years), now is the time to do so.