<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=573132769549581&amp;ev=PageView&amp;noscript=1">

The ACCENT Learning Hub

The IT Support Education Center

The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.

Blog Feature

Business Continuity | Microsoft 365 | Cloud Services | Digital Transformation

Behind the Scenes: How Accent Computer Solutions Responds Faster and Improves Teamwork by Using Microsoft Teams for its After-hours IT Support Process

By: Peter O'Campo
July 1st, 2020

When the idea of using Microsoft Teams for handling after-hours calls came up, we were skeptical. After all, technology professionals know that it’s a lot easier to get an application to do what it’s designed to do, rather than ask it to do something that’s not its primary purpose. But after lots of investigation and testing, Accent has changed the way after-hours IT support calls are handled and has started using Microsoft Teams.

Read More

Share

Blog Feature

Employee Retention | Executive Insights

Are You Overlooking the Impact That Your Culture Has on Your Success?

By: Marty Kaufman
June 29th, 2020

When you’re going about your daily business, does the culture of your organization pop up into your mind? Maybe you’re prompted to think about culture as you’re reading books and articles on organizational improvement by folks such as Patrick Lencioni, Jim Collins, or Gino Wickman. The books may spark interest and a few great ideas, but then the real world takes you to another fire and culture takes a back seat to what you have right in front of you.

Read More

Share

Learn how to develop an IT strategy book chapter

Do IT Right: It's Not About The Computers

Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.

Blog Feature

Backup & Disaster Recovery | Remote Work | Data Security

Data Integrity and Your Remote Workforce: Did You Adjust Your Business Data Backup Strategy When Employees Went Home?

By: Jonathan Barger
June 26th, 2020

You may not always think of it this way, but your business information is a valuable asset. Without your data, business operations would come to a screeching halt or at least a slow crawl. Like any other asset, your business data needs to be protected. Unfortunately, many companies unknowingly compromised the integrity of their data when they sent people home to work. What’s more, they don’t realize how spreading out their people to their individual remote locations may have affected their data backup strategy.

Read More

Share

Blog Feature

Remote Work | Business Continuity

How to Stay in Compliance When Employees are Working From Home

By: Courtney Casey
June 22nd, 2020

Suddenly, more employees than ever are working from home. Many employers have transformed their companies into a remote workforce practically overnight. While you want to keep your business operational and allow your employees to continue working remotely, you also want to ensure that you are still meeting regulatory compliance standards, protecting business, your employees, and your customers. Here are a few tips to help you remain in compliance while working from home. 

Read More

Share

Blog Feature

Team Member Spotlight

Turning Around Your Horrible Day – A Spotlight on Jason Barnes

By: Courtney Casey
June 18th, 2020

As he has adapted to working from home during the COVID-19 pandemic, getting set up with the technology that he needs to continue in his role as Senior Support Specialist at Accent Computer Solutions has not been a problem for Jason Barnes. Preventing his kids from bursting into the room while he’s working is another story. Jason is a lead technician on the Alpha Support Team, the front line for handling day-to-day issues and user requests from Accent’s numerous clients. Not only has he had to adapt to working from home a few days each week while California has been under shelter-in-place orders, he has been on a learning curve with the rest of the team as they have been faced with new problem-solving situations that have arisen because of the explosion of remote workers within their client companies.

Read More

Share

Blog Feature

Cyber Security

6 Common WordPress Vulnerabilities

By: Courtney Casey
June 15th, 2020

It's no surprise to hear that WordPress is the single most hacked website platform on the internet. Considering that WordPress sites make up about one-third of websites, you might even think this is a normal statistical fact, but it's not. Time and time again, dozens to thousands of sites are exposed to hackers and actively hacked, not because WordPress sites are a common target, but because WordPress sites are unbelievably easy to hack.

Read More

Share

Blog Feature

Remote Work | Data Security

Do You Know Where Your Data Is? Out-of-Sight Data and Your Remote Workforce

By: Jonathan Barger
June 11th, 2020

Do you have employees working from home? Congratulations! You’re now a multi-location business! As a multi-location business, your IT network is a lot more complex than it used to be when everyone was working under the same roof. You have more to think about in terms of security and productivity, which includes making sure that your data is 100% visible to IT. If your data isn’t visible, what is it? Invisible? Let’s call it out-of-sight. Before we talk about how this happens, let’s explore why you should be concerned about out-of-sight data.

Read More

Share

Blog Feature

Compliance | Data Security

The Business Impact of the California Consumer Privacy Act (CCPA)

By: Courtney Casey
June 10th, 2020

For decades, consumers on both sides of the Atlantic have been concerned about the ways in which businesses collect, protect and use their sensitive, personal data.  Those concerns resulted several years ago to the passage of the General Data Protection Regulation (GDPR) in the European Union.  That legislation impacted American companies collecting personal data from customers in Europe, but many states felt the need to extend broader rights to consumers in the U.S.  One of those states was California, which in 2018 passed the California Consumer Privacy Act (CCPA).

Read More

Share

Blog Feature

Cyber Security

Train Your Team to Spot High-Stakes Phishing

By: Courtney Casey
June 3rd, 2020

Phishing attacks are growing more sophisticated and spam filters aren't as effective for every kind of attack. Old-style spammers sent the same message to many people, hoping some of them would take the bait. The newer, more dangerous approach targets individuals. It's called spearphishing, whaling, or high-stakes phishing.

Read More

Share

Blog Feature

Cloud Computing | Technology Planning

10 Precautions Your Business Should Take When Transitioning to the Cloud

By: Courtney Casey
June 1st, 2020

More and more businesses are moving parts or all of their IT operations to the cloud. According to one estimate, in 2019 about 60% of business workloads were being hosted in the cloud. And that figure can only be expected to increase. For many businesses, the advantages the cloud offers, such as reduced costs, increased flexibility, higher scalability, and easier disaster recovery, are too compelling to forego.

Read More

Share