Blog


5 Tricks to cut cloud costs

October 23rd, 2018
5 Tricks to cut cloud costs

As a business owner, it’s important to be aware of the unexpected costs associated with the cloud and what measures you can take to keep those costs down. They might not add up to much at first, but could eventually cost you more than the service is worth.

4 types of hackers to watch out for

October 16th, 2018
4 types of hackers to watch out for

Why do hackers attack? Is it for money, notoriety, or political reasons? As a business owner, you should always try and find out the motive behind an attack to help you determine whether or not you’re a target and what data you need to protect. Let’s take a closer look at four different types of […]

Ignore these outdated disaster recovery myths

October 8th, 2018
Ignore these outdated disaster recovery myths

With advancements in cloud computing, disaster recovery (DR) has become more efficient and affordable than ever. But many business owners still cling to DR myths that can safely be ignored. If you’re uncertain as to how DR has changed and are ready for an update, here are some myths that you ought to ignore.

Microsoft Teams: The new Skype for Business?

October 6th, 2018
Microsoft Teams: The new Skype for Business?

Microsoft unveiled plenty of new developments and upgrades during last month’s Ignite conference, but one that shocked many users is what’s happening to Skype for Business. The tech giant confirmed that they are phasing out Skype for Business and going all in on their new collaboration platform, Microsoft Teams.

5 Easy tips for preventing data breaches

September 24th, 2018
5 Easy tips for preventing data breaches

Keeping your personal and professional information safe from cybercriminals is not easy. It takes constant vigilance and frequent training. There are dozens of simple tools and tips to help people with almost zero expertise stay safe online, but these five are our favorites.

How to master Microsoft Excel

September 19th, 2018
How to master Microsoft Excel

You may know how to use Microsoft Excel’s basic functions, but have you truly mastered the program? Excel has more advanced features, and here’s how you can master some of them. Pie and Sunburst Charts Everyone knows that bombarding stakeholders with endless numbers and decimal points is the wrong approach.

What are the risks of BYOD?

September 13th, 2018
What are the risks of BYOD?

The bring your own device (BYOD) strategy lets employees use their personal mobile devices to do work for your company from anywhere. This strategy increases efficiency and convenience to your business, but it also brings a number of security risks to your IT infrastructure and data.

We are pleased to announce placement on the 2018 CRN Fast Growth 150 list!

September 10th, 2018
We are pleased to announce placement on the 2018 CRN Fast Growth 150 list!

Contact:
Mike Ritsema
President, i3 Business Solutions
616-719-4100
mritsema@i3Bus.com
i3 Business Solutions Recognized for Excellence in Managed IT Services
Grand Rapids, MI, September 10, 2018 – i3 Business Solutions, Dedicated to Accelerating Business Results, announced that CRN®, a brand of The Channel Company, has named i3 Business Solutions to its 2018 Fast Growth 150 list.

Best practices for switching to Office 365

September 10th, 2018
Best practices for switching to Office 365

More and more small and medium-sized businesses are making the switch from on-premises systems to cloud-hosted Office 365. If you’re one of them, you need to ensure a smooth and secure transition. Here’s what you need to do. Identify your company’s sensitive data… Most files housed within your servers contain sensitive commercial and personal data […]

PhishPoint attack looks like SharePoint

September 7th, 2018
PhishPoint attack looks like SharePoint

Have you ever received an email that claimed to come from a bank or government office when it obviously didn’t? It was probably a phishing scam trying to trick you into downloading malware. The most recent campaign duplicates a trustworthy Office 365 email and can fool even the most skeptical users.