Blog


Data backup solutions for your business

September 16th, 2019

Any business owner worth their salt knows the value of data to business. This is why it’s bizarre that many business owners don’t have a proper data backup strategy in place. Organizations of all sizes need to take a proactive approach to backing up their data, and there are several solutions they can implement to […]

Best tips to prevent watering hole attacks

September 9th, 2019

Hackers are getting creative nowadays with their illicit activities, which means the onus is on computer users to take steps to protect their computers. The first step to staying ahead of the game is by learning more about cyberattacks. Here are some pointers to help you deal with one of the ways criminals steal data: […]

Mike’s Reflections on Edward Lowe’s Legacy

September 3rd, 2019

At the beginning of this year, i3 Business Solutions was honored to receive the Michigan 50 Businesses to Watch award. The award recognized the growth and success of local organizations here in Michigan. Last week, Mike Ritsema, i3 President, visited an awardee conference at the Edward Lowe Foundation… here is what he said about his experience:

“I am amazed by … Kitty Litter.

Change old modes of thinking when migrating to the cloud

August 23rd, 2019

Not every business owner who migrates to the cloud achieves great results. As much as the service is touted with words like “freedom,” “productivity,” and “collaboration,” realizing the full benefits of the cloud is not a given. So if you’re thinking about transitioning to the cloud, how can you ensure you optimize the technology for your business? Well, it all starts with your attitude before migration. Here are some mental shifts you should make before getting started.

i3 Fortress Security Webinar

August 23rd, 2019

On Wednesday, Mike Ritsema and Dave Carey, i3’s CISSP, hosted a webinar on our new Fortress Security Services. In 2019, we have seen and heard of an overwhelming number of security threats. As we have discovered, at least two-thirds of SMBs have suffered a cyber-attack in the past 12 months alone.

Safeguarding your social media from hackers

August 16th, 2019

Social media phishing is on the rise. Facebook is one of the most commonly impersonated brands in phishing attacks. Hackers now employ more sophisticated tactics, so you must strengthen your privacy settings to keep them away. Lock screens exist for a reason Lock all your computing devices as soon as you stop using them.

Protection through browser extensions

August 13th, 2019

In these times of internet fraud, phishing scams, and high-profile hacks, you can never be too careful. Even if you think you have enough precautions in place, it always helps to take another look at your online safety. Here are some browser extensions you can add to improve your online security.

Cybersecurity and why you need managed IT services

August 5th, 2019

The saying that every company is a technology company is undeniably true, with today’s enterprises unable to function without digital hearts, veins, and arteries. This system, however, comes with a price: a daily onslaught of hacking and other cyberthreats.

What are the top 5 benefits of a cloud ERP?

July 29th, 2019

As more and more solutions are made available on the cloud, more and more businesses are flocking to use them. One increasingly popular solution is cloud-based enterprise resource planning (ERP). If you want to integrate your systems using an ERP, then you should seriously consider a cloud-based ERP. Define: Cloud-based ERP ERP is management software, […]