<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=573132769549581&amp;ev=PageView&amp;noscript=1">

The ACCENT Learning Hub

The IT Support Learning Hub

The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.

{% if contact.blog_subscription|lower == "yes" %} {% else %} {% endif %}
Blog Feature

Cyber Security

Is a Cyber Security Consulting Firm Worth It?

By: Courtney Casey
February 17th, 2020

Online threats are a serious concern for every business. New cyber security risks are constantly emerging, and the cost of failing to protect information is high. IT departments do their best to keep their systems secure, but the average IT group doesn't have enough time or the specialized skills needed to deal adequately with online risks. The services of a cyber security firm, often called a managed security services provider (MSSP), will provide greater protection.

Read More

Share

{% if subscribeProperty|lower == "yes" %} {% else %} {% if (loop.index == 2) %}
{% if leadmagnetImage != "" %}
{{ leadmagnetImageALT }}
{% endif %}

{{ leadmagnetHeader }}

{{ leadmagnetSubHeader }}

{% form "my_form" form_to_use=' {{ leadmagnetForm }} ', title="", no_title=True, overrideable=False %}
{% endif %} {% endif %}
Blog Feature

Cyber Security

Cyber Security is a Shared Responsibility

By: Courtney Casey
February 10th, 2020

Cyber security sounds like something that falls under the responsibility of the IT department. The IT department may handle many of the responsibilities that go along with protecting the company from cyber threats, but that doesn't make security the sole responsibility of the IT department. Ensuring that your business doesn't fall prey to a cyber attack is everyone's responsibility. With 43% of cyber attacks targeting small businesses, it's more important than ever that everyone on your team participate in your cyber security measures. 

Read More

Share

{% if subscribeProperty|lower == "yes" %} {% else %} {% if (loop.index == 2) %}
{% if leadmagnetImage != "" %}
{{ leadmagnetImageALT }}
{% endif %}

{{ leadmagnetHeader }}

{{ leadmagnetSubHeader }}

{% form "my_form" form_to_use=' {{ leadmagnetForm }} ', title="", no_title=True, overrideable=False %}
{% endif %} {% endif %}
Blog Feature

Cyber Security

Is NIST Compliance Just for the IT Department?

By: Courtney Casey
February 3rd, 2020

If you’ve been presented with a requirement to align your cyber security practices with the NIST Cyber Security Framework, you might at first think that compliance will just be the IT department’s responsibility. Nothing could be further from the truth. Cyber security is a responsibility that all employees need to share, but there are some specific obligations that lie within each department of your organization.

Read More

Share

{% if subscribeProperty|lower == "yes" %} {% else %} {% if (loop.index == 2) %}
{% if leadmagnetImage != "" %}
{{ leadmagnetImageALT }}
{% endif %}

{{ leadmagnetHeader }}

{{ leadmagnetSubHeader }}

{% form "my_form" form_to_use=' {{ leadmagnetForm }} ', title="", no_title=True, overrideable=False %}
{% endif %} {% endif %}
Blog Feature

Cyber Security

Email Safety Best Practices: How to Stay Safe From Email Scams

By: Accent Computer Solutions
January 30th, 2020

    We all know that email scams are going around like crazy these days. Our goal is to keep you and your company safe. There are a few simple techniques that will help with our security efforts. In this article, we’ll cover: Creating a Secure Password How to Recognize and Avoid Phishing Scams And Steps to Prevent Fraudulent Payments So, let's dive in.

Read More

Share

{% if subscribeProperty|lower == "yes" %} {% else %} {% if (loop.index == 2) %}
{% if leadmagnetImage != "" %}
{{ leadmagnetImageALT }}
{% endif %}

{{ leadmagnetHeader }}

{{ leadmagnetSubHeader }}

{% form "my_form" form_to_use=' {{ leadmagnetForm }} ', title="", no_title=True, overrideable=False %}
{% endif %} {% endif %}
Blog Feature

Cyber Security

Top 3 Problems Manufacturers Have with NIST Cyber Security Compliance

By: Courtney Casey
January 27th, 2020

If you’re a manufacturer in a government supply chain, you’ve probably heard by now that it will no longer be enough to self-certify your cyber security stature. You’re going to have to prove that the data you store for the parts, products and services that you supply are protected from theft, alteration or kidnapping by following the NIST Cyber Security Framework.

Read More

Share

{% if subscribeProperty|lower == "yes" %} {% else %} {% if (loop.index == 2) %}
{% if leadmagnetImage != "" %}
{{ leadmagnetImageALT }}
{% endif %}

{{ leadmagnetHeader }}

{{ leadmagnetSubHeader }}

{% form "my_form" form_to_use=' {{ leadmagnetForm }} ', title="", no_title=True, overrideable=False %}
{% endif %} {% endif %}
Blog Feature

Cyber Security

5 Reasons to Use the NIST Cyber Security Framework

By: Courtney Casey
January 14th, 2020

If you manufacture one little part for a piece of military equipment for the US government, very soon - if not already -  you’re going to be required to verify that you’re compliant with the NIST Cyber Security Framework. It might not be surprising to learn that the government is tightening up cyber security throughout their supply chain, but organizations that aren’t part of a government supply chain are also adopting the framework. The reasons may be a little different for each organization but the outcome is similar - they become better managers of cyber risk.

Read More

Share

{% if subscribeProperty|lower == "yes" %} {% else %} {% if (loop.index == 2) %}
{% if leadmagnetImage != "" %}
{{ leadmagnetImageALT }}
{% endif %}

{{ leadmagnetHeader }}

{{ leadmagnetSubHeader }}

{% form "my_form" form_to_use=' {{ leadmagnetForm }} ', title="", no_title=True, overrideable=False %}
{% endif %} {% endif %}
Blog Feature

Cyber Security

NIST Guidelines Make Passwords Easier to Remember but Hard to Crack

By: Courtney Casey
January 6th, 2020

The lock on your front door isn’t going to keep intruders out unless you make a habit of using it. The same is true for the digital locks on your data and IT systems. Strong passwords continue to provide a solid defense against hackers, but password management guidelines within the NIST Cyber Security Framework have changed.

Read More

Share

{% if subscribeProperty|lower == "yes" %} {% else %} {% if (loop.index == 2) %}
{% if leadmagnetImage != "" %}
{{ leadmagnetImageALT }}
{% endif %}

{{ leadmagnetHeader }}

{{ leadmagnetSubHeader }}

{% form "my_form" form_to_use=' {{ leadmagnetForm }} ', title="", no_title=True, overrideable=False %}
{% endif %} {% endif %}
Blog Feature

Company News

2019 Progress and 2020 Plans

By: Marty Kaufman
December 26th, 2019

The year 2019 will be remembered for many significant events; the huge Amazon Rainforest fire, the burning of Notre Dame Cathedral, the US women’s soccer team won the world cup; tons of people are running for president; and Henry County spent $650K to restore its data from a cyber attack.

Read More

Share

{% if subscribeProperty|lower == "yes" %} {% else %} {% if (loop.index == 2) %}
{% if leadmagnetImage != "" %}
{{ leadmagnetImageALT }}
{% endif %}

{{ leadmagnetHeader }}

{{ leadmagnetSubHeader }}

{% form "my_form" form_to_use=' {{ leadmagnetForm }} ', title="", no_title=True, overrideable=False %}
{% endif %} {% endif %}
Blog Feature

Business Planning | Better IT Results | Tech Tips & Trends

Top 10 Tips to Select the Best IT Support Company

By: Courtney Casey
December 18th, 2019

You’re gearing up to pick the best outsourced IT company for your business, excited about the potential benefits!  But you aren’t 100% sure how to pick the best managed IT services provider. Or maybe you’ve narrowed it down, but now you’re stuck in a dead tie. Accent Computer Solutions, Inc. has been helping companies develop their best IT strategy for over 30 years. A topic that frequently comes up is, “How can I compare IT support companies? What criteria should I evaluate?”   Since we talk about it often, we’ve compiled a list to help narrow down your search for the right IT support!

Read More

Share

{% if subscribeProperty|lower == "yes" %} {% else %} {% if (loop.index == 2) %}
{% if leadmagnetImage != "" %}
{{ leadmagnetImageALT }}
{% endif %}

{{ leadmagnetHeader }}

{{ leadmagnetSubHeader }}

{% form "my_form" form_to_use=' {{ leadmagnetForm }} ', title="", no_title=True, overrideable=False %}
{% endif %} {% endif %}
Blog Feature

Cyber Security | Tech Girl

Your IT Support Provider's Role in Regulatory Compliance

By: Courtney Casey
December 16th, 2019

These days, more and more companies are being required to comply with regulations for security, even if they're not in a regulated industry. Specifications for NIST compliance, to name one, are flowing down the supply chain and in order to continue to do business with your customers, you may be required to prove compliance with their security standards.

Read More

Share

{% if subscribeProperty|lower == "yes" %} {% else %} {% if (loop.index == 2) %}
{% if leadmagnetImage != "" %}
{{ leadmagnetImageALT }}
{% endif %}

{{ leadmagnetHeader }}

{{ leadmagnetSubHeader }}

{% form "my_form" form_to_use=' {{ leadmagnetForm }} ', title="", no_title=True, overrideable=False %}
{% endif %} {% endif %}