I-BN Blog

Reason #1 to Select a Leading Partner  - Size and Stability

Published on Jan 16, 2020 10:32:00 AM

You may think size and stability are old school evaluation parameters, and you would be correct. But the way we think about size and stability are different today than they were 10 years ago or even 2 years ago. In the past larger publishers used size and stability concerns to create fear, uncertainty and doubt and to discredit small companies entering the market. 

Read More

Topics: SMB ERP Software, business management software, Cloud ERP


3 Reasons to Partner with a Leading Software Company

Published on Jan 11, 2020 9:45:18 PM

I recently came to the realization that I have been implementing business management systems for over 30 years.  In the early days, most of the time it was the company's first computer system and generating value was relatively easy.   By the time Y2K came around, the ERP boom was over and most companies had been through either implementing a new system or upgrading to prevent the potential disaster.  

Read More

Topics: SMB ERP Software, business management software


Cybersecurity - Awareness of Phishing

Published on Jan 7, 2020 11:07:00 AM

Cybersecurity includes the processes, procedures and technology used by companies and their employees to protect the computer networks, equipment and data from unauthorized access, use, modification, theft or destruction.  Protecting these “digital assets” has become an urgent priority for all companies to maintain the trust of their customers, compliance with contracts or laws and even its survival from an attack.

Read More


Cybersecurity Guidelines from the Employee Perspective

Published on Dec 17, 2019 10:53:00 AM

Cybersecurity includes the processes, procedures and technology used by companies and their employees to protect the computer networks, equipment and data from unauthorized access, use, modification, theft or destruction.  Protecting these “digital assets” has become an urgent priority for all companies to maintain the trust of their customers, compliance with contracts or laws and even its survival from an attack.

Read More

Topics: Cyber Security


Cybersecurity Guidelines for Your Employees

Published on Dec 10, 2019 9:59:00 PM

Cyber attacks use malicious code such as viruses and ransomware to modify computer code, data,or logic culminating into destructive consequences that can compromise your data and business. No amount of physical protections or software tools can provide 100% security for your computers and network. Most security experts also agree that the biggest risks are your users, and educating them will be the most important aspect.  Your goal is to reduce the risk of and from attack to the greatest extent possible, and educating your employees may be the most effective method for mitigating risk.

Read More

Topics: Cyber Security


Cybersecutiry Tools for Protecting Your Company

Published on Dec 2, 2019 9:33:00 AM

Cyber attacks use malicious code such as viruses and ransomware to modify computer code, data,or logic culminating into destructive consequences that can compromise your data and business. No amount of physical protections or software tools can provide 100% security for your computers and network. Your goal is to reduce the risk of and from attack to the greatest extent possible using tools and procedures.

Read More

Topics: Cyber Security


What is New in SAP Business One Version 10

Published on Nov 27, 2019 1:50:49 PM

Business One version 10 is the latest major release from SAP for its small to mid-market product.  SAP continues to deliver on its vision of the Intelligent Enterprise through a strategy centered around:

Read More


Cybersecurity - The 21st Century Business Challenge

Published on Nov 21, 2019 9:53:00 AM

 

A cyber-attack is an intentional exploitation of computer systems, networks, and software. These attacks use malicious code such as viruses and ransomware to modify computer code, data, or logic culminating into destructive consequences that can compromise your data and business. Do not think this will not happen to you! According to a 2017 Poneman study 61% of small to mid-sized businesses (SMB) were breached in 2017 in one form or another. Securing your business is not an IT job, it needs to be a responsibility of any employee, contractor or consultant who has access to your business information.

Read More

Topics: Cyber Security


New Call-to-action

Recent Posts

Posts by Topic

see all