The IT Services & Cyber Security Education Center
The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.
By:
Marty Kaufman
June 29th, 2022
Summer is in full force here in Southern California. It’s been a while since we’ve had a proper vacation season, so I hope everyone plans to have some fun with RV trips, airline travel, waterpark play, golf outings, ball games, and other adventures. With the return of our favorite summer past times, it feels like we’re back to normal.
By:
Accent Computer Solutions
June 23rd, 2022
2022 MSP 501 List Recognizes Company for Innovation and High Performance (June 23, 2022 – Rancho Cucamonga, CA) It’s not surprising to find the Inland Empire’s Accent Computer Solutions on the Channel Futures MSP 501 List for 9 consecutive years. Inclusion on the list is a sign of the managed IT service company’s commitment to operational excellence.
Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.
Managed IT Services | IT Outsourcing | Working with Accent
By:
Courtney Casey
June 22nd, 2022
Making the move to a different managed IT services provider can take a leap of faith. While you’re sure that you want and need everything that the new provider offers, getting started with a new vendor is unknown territory. As you go from one managed services provider (MSP) to another, how the new provider delivers services may differ from what you’re used to. So how can you really know what you’re going to get?
By:
Courtney Casey
June 17th, 2022
Everything about delivering a great client experience at Accent involves teamwork. Many team members work behind the scenes, and an ordinary computer user might never speak to them or know who they are. Then there are the people in the Client Strategy and Success department. They’re the ones who have regular contact with clients as they work beside them to create their organization’s custom technology strategy and walk with them hand-in-hand as it’s implemented.
By:
Courtney Casey
June 15th, 2022
When a high-profile password hack makes the news, it’s disconcerting, to say the least. And more often than not, when the passwords are revealed, they couldn’t be more obvious. Things like: password123, iloveyou, qwerty, or 123456. (If that just hit a little too close to home, you should go change your passwords right now).
By:
Jonathan Barger
June 14th, 2022
After a decade of service, Microsoft’s Windows Server 2012 operating system is reaching its end-of-life on October 10, 2023. This means that if any of your business systems run on Windows Server 2012, you have a decision to make soon. It may seem too early to start planning for its replacement, but with hardware shortages, price volatility, and increasing lead times, now’s the time to start planning, budgeting, and figuring out what to do next.
By:
Vincent Weppner
June 3rd, 2022
It can be difficult to measure the value you’re getting from your investment in cyber security because you may not really notice that it’s working until you have an intruder. At the same time, business leaders ask for cyber security KPIs so they can justify the expense. So how do you measure something that is designed to keep you safe?
Managed IT Services | IT Outsourcing
By:
Courtney Casey
June 1st, 2022
After you’ve decided that you need the benefits that managed IT services can bring your organization, you still have another question to ponder. Which managed IT services option is best for my business: all-inclusive or co-managed?
By:
Marty Kaufman
May 26th, 2022
Many years ago, my leadership team engaged in a super cool exercise to come up with our core values. It was called the Mission to Mars. We learned about it from the book Mastering the Rockefeller Habits by Verne Harnish. If you’ve ever participated in something like this, it’s likely that you still remember it. The exercise went kind of like this…
By:
Courtney Casey
May 24th, 2022
If you manage IT at your company, then you have a lot of roles to fill. Whether you have a small team or it's just you, you could be asked to be the network administrator, help desk technician, IT project manager, business analyst, cyber security expert, and more at any given moment. And if your company needs to comply with the Department of Defense (DoD) Cybersecurity Maturity Model Certification (CMMC), you're likely going to get another role tacked onto your responsibilities.