I-BN Blog

I-BN

Recent Posts

Office2Home Offer Extended

Published on Apr 20, 2020 9:03:19 PM

Unique challenges require creative solutions.  .

Read More

Topics: SAP Business One Cloud, Sage 100 Cloud, Sage 100cloud, sap b1 cloud


Office2Home - Short Term Cloud for Business

Published on Mar 30, 2020 9:36:19 AM

Unique challenges require creative solutions.  Office2Home is a business continuity offering for companies who need short term package for remote access to their on-premise business management systems in the cloud due to the current global pandemic.

Read More

Topics: SAP Business One Cloud, Sage 100 Cloud, Sage 100cloud, sap b1 cloud


Cybersecurity - What an Employee Should Do After Being Hacked

Published on Feb 26, 2020 7:20:07 AM

If you realize that your e-mail or computer is compromised what should you do?  STOP doing anything!

Your company may have specific guidelines and if so, contact the point person within your organization.  If not some simple guidelines are:

  1. Turn off the computer
  2. Contact your IT department, help desk, managed service provider or whomever is responsible within your company.
  3. When you or your help desk turn it back on make certain it is not attached to any network.  Unplug the network cable, put it in plane mode, keep it disconnected from anything it could infect
Read More

Topics: Cyber Security


Cybersecurity - Awareness of Phishing

Published on Jan 7, 2020 11:07:00 AM

Cybersecurity includes the processes, procedures and technology used by companies and their employees to protect the computer networks, equipment and data from unauthorized access, use, modification, theft or destruction.  Protecting these “digital assets” has become an urgent priority for all companies to maintain the trust of their customers, compliance with contracts or laws and even its survival from an attack.

Read More


Cybersecurity Guidelines from the Employee Perspective

Published on Dec 17, 2019 10:53:00 AM

Cybersecurity includes the processes, procedures and technology used by companies and their employees to protect the computer networks, equipment and data from unauthorized access, use, modification, theft or destruction.  Protecting these “digital assets” has become an urgent priority for all companies to maintain the trust of their customers, compliance with contracts or laws and even its survival from an attack.

Read More

Topics: Cyber Security


Cybersecurity Guidelines for Your Employees

Published on Dec 10, 2019 9:59:00 PM

Cyber attacks use malicious code such as viruses and ransomware to modify computer code, data,or logic culminating into destructive consequences that can compromise your data and business. No amount of physical protections or software tools can provide 100% security for your computers and network. Most security experts also agree that the biggest risks are your users, and educating them will be the most important aspect.  Your goal is to reduce the risk of and from attack to the greatest extent possible, and educating your employees may be the most effective method for mitigating risk.

Read More

Topics: Cyber Security


Cybersecutiry Tools for Protecting Your Company

Published on Dec 2, 2019 9:33:00 AM

Cyber attacks use malicious code such as viruses and ransomware to modify computer code, data,or logic culminating into destructive consequences that can compromise your data and business. No amount of physical protections or software tools can provide 100% security for your computers and network. Your goal is to reduce the risk of and from attack to the greatest extent possible using tools and procedures.

Read More

Topics: Cyber Security


Cybersecurity - The 21st Century Business Challenge

Published on Nov 21, 2019 9:53:00 AM

 

A cyber-attack is an intentional exploitation of computer systems, networks, and software. These attacks use malicious code such as viruses and ransomware to modify computer code, data, or logic culminating into destructive consequences that can compromise your data and business. Do not think this will not happen to you! According to a 2017 Poneman study 61% of small to mid-sized businesses (SMB) were breached in 2017 in one form or another. Securing your business is not an IT job, it needs to be a responsibility of any employee, contractor or consultant who has access to your business information.

Read More

Topics: Cyber Security


SAP Business One in 90 Seconds

Published on Jul 11, 2019 1:18:00 PM

Changing business management software is not something companies or their employees look forward to.   SAP Business One and the SAPDistribution Start Program provide clear benefits and rapid implementation

Read More

Topics: Business Management Systems, Outgrowing Quickbooks, SAP Business One Cloud


Sage and SAP Working with Office 365

Published on Jul 3, 2019 4:00:04 PM

When it comes to Office Productivity Software, Microsoft Office remains the predominant player.   Over the past few years Microsoft has been working hard to improve the functionality of its web based Office 365 Suite and is driving all users to subscription based pricing.  ERP providers like Sage and SAP follow Microsoft closely and have been integrating the suite into their products in various ways.

Read More

Topics: Cloud Computing, Cloud 3.0, SAP Business One Cloud, Sage 100 Cloud


New Call-to-action

Recent Posts

Posts by Topic

see all