The most wonderful time of year… for scammers!

December 18th, 2017

Written by Brandi Koloski, Marketing Assistant at i3 Business Solutions
Here it comes - The most wonderful time of year! This is the prime time to be with family and to be a little more joyous and giving than usual. The winter holidays are generally considered to be a wonderful time of year – but don’t let the overpowering scent of pine trees and peppermint take you off your guard.

6 Questions For Your IT Manager

October 30th, 2017

Cyber Security threats are at an all time high. Are you or your current IT provider taking all of the necessary steps to keep everything you have worked so hard for safe? Here are 6 questions you should be asking yourself or you IT service provider.

Video Transcript:
Hello, I’m Mike Ritsema with i3 Business Solutions where our mission is to accelerate business results by integrating technology solutions.

Think patching is unimportant? Ask Equifax

September 15th, 2017

Written by Brandi Koloski, i3 Business Solutions - Marketing Assistant
Has your security ever been breached after sharing too much information online?

With i3’s ReliabilITy, The answer would be NO because the team here at i3 is constantly updating and protecting your organization, information, and technology.

i3 Cyber Security Essentials

April 12th, 2017

 

Video by: Mike Ritsema, President & Partner

As technology changes and improves, a new set of issues arise from cyberspace. Recent marches to the cloud means that Cyber Threat Vectors are changing. This means an immediate threat to your cyber wellbeing.

BEWARE: More Phishing Attempts

February 14th, 2017

Written by James Lijewski, Level 3 Network Technician/Support Center Team Leader

Be on the lookout for more phishing attempts. This went to my Junk Email folder in my Outlook, and happened to notice it when checking for other items. Moved it to my inbox, and looks like it’s an attempt to get us to go to a malicious website.

Don’t fall victim to Gmail phishing!

January 19th, 2017

Written by James Lijewski, Level 3 Network Technician/Support Center Team Leader

For those of you using Gmail, like myself, watch this quick 4-minute video and be on the lookout for a sneaky phishing attempt.

i3 Mandate: enable 2-Factor authentication like your ATM card for key online services!

 

How to Recognize Phishing Attempts

December 16th, 2016

Written by James Lijewski, Level 3 Network Technician/Support Center Team Leader

Phishing emails, links, and phone calls are designed by hackers and thieves to steal money. They attempt to do this by various means, including calling you claiming to be a bank you do business with to confirm account information, or sending you an email pretending to be your manager and request a large money transfer for a purchase.

Are you prepared for your Cyber Breach?

November 3rd, 2016

Written by Mike Ritsema, President and Partner

You own a small business.  We own a small business.

Although i3 Business Solutions and technology specialists recommend layers of security, we say that a cyber-breach is a matter of when and how.  Be prepared.

Ransomware: How expensive can it really be?

September 28th, 2016

Summarized by Molly Luxem, Marketing Assistant

I shared a meal not long ago with a source who works at a financial services company. The subject of ransomware came up and he told me that a server in his company had recently been infected with a particularly nasty strain that spread to several systems before the outbreak was quarantined.

Would You Use This ATM?

August 1st, 2016

Summarized by Molly Luxem, Marketing Assistant

One simple principle of computer security is this: If you can’t prove the physical security of a networked thing, you also cannot prove its cybersecurity. That’s because in most cases, networked things really aren’t designed to defend an experienced and driven attacker who can physically connect his own devices.