Blog


Ring in the new year with some of the best recommendations from i3

December 15th, 2018
Ring in the new year with some of the best recommendations from i3

If you’re a client, then thank you for your business!

If you’re not a client, then we’d welcome a year-end conversation around Raving Fans! service and checklist process excellence.

Either way, here are our year-end 2018 recommendations to any technology business user:

Replace 3 – 6 year old Windows 7 PCs and Laptops as they’re no longer supported January, 2020.
Educate your users to prevent phishing and spam trauma with KnowBe4.
Centralize and protect passwords with LastPass password manager to improve productivity and reduce risk.

A Very Merry Holiday Lunch with i3 Business Solutions!

December 10th, 2018
A Very Merry Holiday Lunch with i3 Business Solutions!

When:
Wed, December 19, 2018
11:45 AM – 1:15 PM EST

Where:
i3 Business Solutions
560 Fifth St NW, Suite 404
Grand Rapids MI, 49504

Join us this holiday season for a Holiday Lunch with i3 Business Solutions staff, clientele, friends, and family as we celebrate the true meanings of the season -- giving, serving, and gratefulness.

Cloud migration made safe and secure

November 28th, 2018
Cloud migration made safe and secure

While many IT providers tout the revolutionary benefits of the cloud, very few address the security aspect of it. The fact is, when you’re using a cloud service, you’re moving information out of your hands and into a third party. So doesn’t it make sense to take precautions? Dropbox alone has had the accounts of […]

Back up your mobile devices now

November 26th, 2018
Back up your mobile devices now

Smartphones have become so advanced that there’s virtually no business task they can’t handle. Now everyone uses mobile devices to access work documents and, naturally, hackers got the memo. There are thousands of threats targeted towards mobile devices, so you’d be well served backing up the files in your mobile device, now.

7 easy ways to prevent data loss in Office 365

November 19th, 2018
7 easy ways to prevent data loss in Office 365

For businesses, data security is critical. If this information is lost or stolen, it could lead to crippling financial losses, legal disputes, and more importantly, loss of customer trust. While Microsoft Office 365 comes with some security and compliance tools, it still needs the support of data protection best practices.

What exactly is proactive cybersecurity?

November 13th, 2018
What exactly is proactive cybersecurity?

Most managed IT services providers (MSPs) promise “proactive” cybersecurity consulting. Businesses large and small embrace the idea of preventing cyberattacks and data breaches before they happen, and MSPs themselves would much rather brainstorm safeguards than troubleshoot time-sensitive downtime events.

How Office 365 deals with phishing attacks

November 5th, 2018
How Office 365 deals with phishing attacks

Microsoft not only builds robust productivity solutions for its customers, but it also prioritizes their security above all else. This year, the company invested a lot of money to protect Office 365 subscribers from increasingly sophisticated phishing scams.

Microsoft Teams tips and tricks

October 31st, 2018
Microsoft Teams tips and tricks

If you think Microsoft Teams is good only for business instant messaging, you’re missing out on a plethora of features Teams has. Microsoft’s chat solution actually integrates with many of its Office 365 applications, including OneNote, SharePoint, and Word, among others.

5 Tricks to cut cloud costs

October 23rd, 2018
5 Tricks to cut cloud costs

As a business owner, it’s important to be aware of the unexpected costs associated with the cloud and what measures you can take to keep those costs down. They might not add up to much at first, but could eventually cost you more than the service is worth.

4 types of hackers to watch out for

October 16th, 2018
4 types of hackers to watch out for

Why do hackers attack? Is it for money, notoriety, or political reasons? As a business owner, you should always try and find out the motive behind an attack to help you determine whether or not you’re a target and what data you need to protect. Let’s take a closer look at four different types of […]