The IT Support Education Center
The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.
Hackers are getting more sophisticated. The minimum security protections that businesses need to defend against cyber criminals has changed. As cyber criminals have advanced the technology they use to sneak in (or bust through) network doors, the list of must-have cyber security "basics" has expanded.
Combining a lifelong passion with a successful career may seem like a dream for some, but for Ray, Support Services Manager at Accent Computer Solutions, it’s what he lives out every day. Ray combines his love of computers and people to effectively manage multiple teams of employees that provide the fast, friendly, frustration-free IT service that Accent clients expect. Ray tackles every challenge with humility and honesty, and he enthusiastically pursues the knowledge he needs to create strategies that solve problems.
Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.
When was the last time you got together with a significant number of business associates? I mean together… like in the same room with peers you have not been around in a long time. Last week I got together with a group of about 15 business executives at a local golf course. Pre-pandemic, this group would meet in person once a month to review business performance metrics, compare policy issues, share ideas, and check-in regarding our personal well-being.
If you manage IT at your company, then you have a lot of roles to fill. Whether you have a small team or it's just you, you could be asked to be the network administrator, help desk technician, IT project manager, business analyst, cyber security expert, and more at any given moment. And if your company needs to comply with the Department of Defense (DoD) Cybersecurity Maturity Model Certification (CMMC), you're likely going to get another role tacked onto your responsibilities.
Jason D’s official job title at Accent is Senior Systems Technician, but what he really is, is a road warrior. Instead of sitting behind a desk all day, Jason spends much of his time behind the wheel traveling to client sites to troubleshoot hardware and network issues that can’t be fixed remotely. It’s a job that he loves because there’s variety in each day and because he enjoys the face-to-face interactions he has with clients.
It’s that time of year in California. Dry brush and Santa Ana winds put thousands of lives, homes, and businesses at risk. The devastating fires in recent years remind us that wildfires can start any time and they make quick work of any area, destroying everything in their path.
Cyber criminals have access to sophisticated technologies these days, yet some of the most successful tried-and-true social engineering tactics continue to bypass technical security layers -- targeting the humans behind the technology.
January 14, 2020 marked the end of support for one of the most popular operating systems for businesses – Windows 7. It was released in 2009 and has served us well, but the end is here and it’s time to make your transition.
The word “Maturity” is part of the Cybersecurity Maturity Model Certification for a reason. Essentially, the Department of Defense wants their chain of suppliers to “grow up” in their security. When companies act like “grown-ups” in the way that they manage cyber risk, they’re a lot more serious about their responsibilities and they’re accountable for the outcome.
I wonder if everyone feels the way I do about this year compared to last year. It seems like 2020 was the longest year of my life, and 2021 is flying by at light speed. Here we are already in the 2nd quarter and activity is heating up. Companies and employees are starting to get busy again and it’s apparent that we're in a different business climate. Have you changed the way you conduct business to respond to this particular environment?