EVERY
[MANAGED SERVICES]
VISION ACHIEVED

Finally, a Grand Rapids IT company
that puts YOUR business first.

Compliance

Cybersecurity

Cloud Services

Managed IT

Home2021-06-01T13:02:57+00:00

MEET YOUR GRAND RAPIDS IT LEADERSHIP TEAM

Micro Visions Team Collage

For the past 30 years Micro Visions has been at the heart of the Grand Rapids community.

Micro Visions is the leading provider of managed IT services and technology consulting in Western Michigan. For more than 30 years, our woman-owned business has helped businesses of all sizes to address critical business needs. Our employees work closely with your team to understand your unique business challenges and develop cost-effective, reliable solutions.

Contact Us

ARE YOU A BUSINESS OWNER?

Do you need IT solutions that complement your strategic business goals? We can help! If you’ve experienced the cost of IT, we’d like to show you the VALUE.

Read More

ARE YOU AN IT MANAGER/CIO?

Have your company’s computer systems grown from a few PCs to a complex network? We can help!

Read More

ARE YOU A CHIEF INFORMATION SECURITY OFFICER?

Does your outsourced IT support team take days to return your call? We can help!

Read More

ARE YOU A COMPUTER GO-TO PERSON?

Are you tired of the blame-game between vendors eroding your precious time? We can help!

Read More

ARE YOU A BUSINESS OWNER?

Do you need IT solutions that complement your strategic business goals? We can help! If you’ve experienced the cost of IT, we’d like to show you the VALUE.

Read More

ARE YOU AN IT MANAGER/CIO?

Have your company’s computer systems grown from a few PCs to a complex network? We can help!

Read More

ARE YOU A CHIEF INFORMATION SECURITY OFFICER?

Does your outsourced IT support team take days to return your call? We can help!

Read More

ARE YOU A COMPUTER GO-TO PERSON?

Are you tired of the blame-game between vendors eroding your precious time? We can help!

Read More

★★★★★

Micro Visions has aligned their goals with ours, and are viewed as a partner, not just an IT provider. They are proactive, responsive, and provide an invaluable service… they really have everything to offer that I was looking for.

Brent, Vice President, Manufacturer

★★★★★

They were very organized and methodical. It was not a quick fix, but rather a well-planned and executed solution.

Don, CFO, Food Processing Facility

★★★★★

Micro Visions has consistently gone above and beyond in trying to help us solve more than just the issues we bring forth. Their response times are quite impressive and have always been proactive in their approach. They definitely provide more than just computer support.

Cody, Controller Insurance Agency

★★★★★

Micro Visions provide the on-call support our municipality requires from open to close. The on-call support, whether that be calling Micro Visions’ helpdesk directly or the submission of an issue “ticket” through the user’s desktop is invaluable to our staff.

Shay, Deputy City Manager, Local Municipality

LET’S WORK TOGETHER

Our aim is to offer clients the highest level of quality, service and value. This is achieved by professional management, skilled and experienced analysts and engineers with years of experience in the field of information technology.

Contact Us

INSIGHTS

FEATURED INSIGHT

1401, 2022

What the FBI Email System Hack Means for SMBs

When it comes to cybersecurity attacks, it’s more apparent than ever that no one is immune. This includes SMBs and major government organizations like the Federal Bureau of Investigation (FBI). In November, news emerged that hackers had targeted the FBI’s email servers. Reports said this was a sophisticated attack, reports said, and the attackers leveraged their access to send out more than 100,000 messages to a broad array of recipients to claim they were under attack and needed to be on high alert. “Our intelligence monitoring indicates exfiltration of several of your virtualized clusters in a sophisticated chain attack,” the email reads, with the headline “Urgent: Threat actor in systems.” The emails looked entirely legitimate, as they came from the FBI’s public-facing email system, and its headers were authenticated using the domain keys identified mail (DKIM) process used by Gmail to show which emails are legitimate. While the motivation from attackers seemed to be to delegitimize another hacker, the effects of the attack could have been more drastic. Attackers could have leveraged the legitimate-looking emails from a trusted source (the FBI) to steal data, spread ransomware, or other nefarious goals. The FBI has since remediated the vulnerability that allowed the attackers to enter the systems and send the fake emails, it said in a statement at the time, and performed further network integrity measures. It also alerted all those that could be impacted of the fake emails. However, there are still many vital lessons that can be learned from the situation: Don’t trust emails, no matter the source. Remaining skeptical of emails wherever possible and assuming they could pose a risk to your organization is critical. If the FBI cannot be considered a legitimate source and can be potentially comprised, other partners can also be vulnerable. SMBs should train their employees thoroughly on signs of potentially compromised emails and reiterate this training regularly to combat this type of risk. Supply chain attacks present significant risks. If 2021 has taught us anything (and it’s taught us a lot), it is that supply chain attacks are on the rise. Attackers are increasingly leveraging a third-party organization, like the FBI or other source, to compromise another organization whose employees would inherently trust that organization. SMBs should ensure they have protections in place to guard against these types of attacks or put stipulations for cybersecurity protections in their contracts with these partners or suppliers. Practice incident response. When attacks like this arise and potentially impact your organization, an SMB should make sure to have a game plan in place for how to respond. This should include technology to help mitigate the threat and playbooks for what individual contributors need to do to secure the organization (including IT, leadership, communications, customer relations, legal and more). As we head into 2022, attacks like this will only inevitably continue to rise. By learning from past mistakes or closely watching the latest attacks, an SMB business leader can make sure the organization is fully prepared to protect themselves [...]

FEATURED INSIGHT

Go to Top