Best tips to prevent watering hole attacks

September 9th, 2019

Hackers are getting creative nowadays with their illicit activities, which means the onus is on computer users to take steps to protect their computers. The first step to staying ahead of the game is by learning more about cyberattacks. Here are some pointers to help you deal with one of the ways criminals steal data: […]

Mike’s Reflections on Edward Lowe’s Legacy

September 3rd, 2019

At the beginning of this year, i3 Business Solutions was honored to receive the Michigan 50 Businesses to Watch award. The award recognized the growth and success of local organizations here in Michigan. Last week, Mike Ritsema, i3 President, visited an awardee conference at the Edward Lowe Foundation… here is what he said about his experience:

“I am amazed by … Kitty Litter.

Change old modes of thinking when migrating to the cloud

August 23rd, 2019

Not every business owner who migrates to the cloud achieves great results. As much as the service is touted with words like “freedom,” “productivity,” and “collaboration,” realizing the full benefits of the cloud is not a given. So if you’re thinking about transitioning to the cloud, how can you ensure you optimize the technology for your business? Well, it all starts with your attitude before migration. Here are some mental shifts you should make before getting started.

i3 Fortress Security Webinar

August 23rd, 2019

On Wednesday, Mike Ritsema and Dave Carey, i3’s CISSP, hosted a webinar on our new Fortress Security Services. In 2019, we have seen and heard of an overwhelming number of security threats. As we have discovered, at least two-thirds of SMBs have suffered a cyber-attack in the past 12 months alone.

Safeguarding your social media from hackers

August 16th, 2019

Social media phishing is on the rise. Facebook is one of the most commonly impersonated brands in phishing attacks. Hackers now employ more sophisticated tactics, so you must strengthen your privacy settings to keep them away. Lock screens exist for a reason Lock all your computing devices as soon as you stop using them.

Protection through browser extensions

August 13th, 2019

In these times of internet fraud, phishing scams, and high-profile hacks, you can never be too careful. Even if you think you have enough precautions in place, it always helps to take another look at your online safety. Here are some browser extensions you can add to improve your online security.

Cybersecurity and why you need managed IT services

August 5th, 2019

The saying that every company is a technology company is undeniably true, with today’s enterprises unable to function without digital hearts, veins, and arteries. This system, however, comes with a price: a daily onslaught of hacking and other cyberthreats.

What are the top 5 benefits of a cloud ERP?

July 29th, 2019

As more and more solutions are made available on the cloud, more and more businesses are flocking to use them. One increasingly popular solution is cloud-based enterprise resource planning (ERP). If you want to integrate your systems using an ERP, then you should seriously consider a cloud-based ERP. Define: Cloud-based ERP ERP is management software, […]

Mike Ritsema talks about cybersecurity and business

July 25th, 2019

This week, Mike Ritsema, president of i3 Business Solutions, shares insightful business tips on how to protect your business from cybersecurity threats and disasters. With 20 years of experience in the technology industry, Mike is well-aware of the risks your business is vulnerable to.

Use data analytics to manage backups

July 22nd, 2019

The amount of data that the average business manages is unprecedented. And with that shift comes an unavoidable challenge: Deciding which files and records are most important to business continuity. However, with a little creative thinking and implementation, you can ensure the security of your most critical data.