Blog


4 types of hackers to watch out for

October 16th, 2018
4 types of hackers to watch out for

Why do hackers attack? Is it for money, notoriety, or political reasons? As a business owner, you should always try and find out the motive behind an attack to help you determine whether or not you’re a target and what data you need to protect. Let’s take a closer look at four different types of hackers and their motives.

Ignore these outdated disaster recovery myths

October 8th, 2018
Ignore these outdated disaster recovery myths

With advancements in cloud computing, disaster recovery (DR) has become more efficient and affordable than ever. But many business owners still cling to DR myths that can safely be ignored. If you’re uncertain as to how DR has changed and are ready for an update, here are some myths that you ought to ignore.

5 Easy tips for preventing data breaches

September 24th, 2018
5 Easy tips for preventing data breaches

Keeping your personal and professional information safe from cybercriminals is not easy. It takes constant vigilance and frequent training. There are dozens of simple tools and tips to help people with almost zero expertise stay safe online, but these five are our favorites.

How to master Microsoft Excel

September 19th, 2018
How to master Microsoft Excel

You may know how to use Microsoft Excel’s basic functions, but have you truly mastered the program? Excel has more advanced features, and here’s how you can master some of them.
Pie and Sunburst Charts
Everyone knows that bombarding stakeholders with endless numbers and decimal points is the wrong approach.

What are the risks of BYOD?

September 13th, 2018
What are the risks of BYOD?

The bring your own device (BYOD) strategy lets employees use their personal mobile devices to do work for your company from anywhere. This strategy increases efficiency and convenience to your business, but it also brings a number of security risks to your IT infrastructure and data.

We are pleased to announce placement on the 2018 CRN Fast Growth 150 list!

September 10th, 2018
We are pleased to announce placement on the 2018 CRN Fast Growth 150 list!

Contact:
Mike Ritsema
President, i3 Business Solutions
616-719-4100
mritsema@i3Bus.com
i3 Business Solutions Recognized for Excellence in Managed IT Services
Grand Rapids, MI, September 10, 2018 – i3 Business Solutions, Dedicated to Accelerating Business Results, announced that CRN®, a brand of The Channel Company, has named i3 Business Solutions to its 2018 Fast Growth 150 list.

Best practices for switching to Office 365

September 10th, 2018
Best practices for switching to Office 365

More and more small and medium-sized businesses are making the switch from on-premises systems to cloud-hosted Office 365. If you’re one of them, you need to ensure a smooth and secure transition. Here’s what you need to do.

Identify your company’s sensitive data…
Most files housed within your servers contain sensitive commercial and personal data that must be properly identified and protected.

PhishPoint attack looks like SharePoint

September 7th, 2018
PhishPoint attack looks like SharePoint

Have you ever received an email that claimed to come from a bank or government office when it obviously didn’t? It was probably a phishing scam trying to trick you into downloading malware. The most recent campaign duplicates a trustworthy Office 365 email and can fool even the most skeptical users.

Leave no room for hackers to operate

May 22nd, 2018
Leave no room for hackers to operate

For most people, social media is a convenient way to stay in touch with family and friends. For a small group of people, it’s an opportunity to profit off other people’s trust. Here are some things you can do to continue enjoying Facebook and Twitter without compromising your privacy.