<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=573132769549581&amp;ev=PageView&amp;noscript=1">

The ACCENT Learning Hub

The IT Support Education Center

The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.

Blog Feature

Cyber Security

14 Foundational Cyber Security Measures Small & Midsize Businesses Need in 2021

By: Peter O'Campo
June 22nd, 2021

Hackers are getting more sophisticated. The minimum security protections that businesses need to defend against cyber criminals has changed. As cyber criminals have advanced the technology they use to sneak in (or bust through) network doors, the list of must-have cyber security "basics" has expanded.

Read More

Share

Blog Feature

Team Member Spotlight

Cultivating the People Behind the Tech – A Spotlight on Ray

By: Courtney Casey
June 18th, 2021

Combining a lifelong passion with a successful career may seem like a dream for some, but for Ray, Support Services Manager at Accent Computer Solutions, it’s what he lives out every day. Ray combines his love of computers and people to effectively manage multiple teams of employees that provide the fast, friendly, frustration-free IT service that Accent clients expect. Ray tackles every challenge with humility and honesty, and he enthusiastically pursues the knowledge he needs to create strategies that solve problems.

Read More

Share

Learn how to develop an IT strategy book chapter

Do IT Right: It's Not About The Computers

Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.

Blog Feature

Executive Insights

In-Person Meetings Are a Step Towards Some Sort of Normal

By: Marty Kaufman
May 26th, 2021

When was the last time you got together with a significant number of business associates? I mean together… like in the same room with peers you have not been around in a long time. Last week I got together with a group of about 15 business executives at a local golf course. Pre-pandemic, this group would meet in person once a month to review business performance metrics, compare policy issues, share ideas, and check-in regarding our personal well-being.

Read More

Share

Blog Feature

CMMC Compliance

IT Managers: How to Tell Your Boss You Need a CMMC Consultant

By: Courtney Casey
May 25th, 2021

If you manage IT at your company, then you have a lot of roles to fill. Whether you have a small team or it's just you, you could be asked to be the network administrator, help desk technician, IT project manager, business analyst, cyber security expert, and more at any given moment. And if your company needs to comply with the Department of Defense (DoD) Cybersecurity Maturity Model Certification (CMMC), you're likely going to get another role tacked onto your responsibilities.

Read More

Share

Blog Feature

Team Member Spotlight

IT Road Warrior Delivers Tech Help with Friendly Banter – A Spotlight on Jason D.

By: Courtney Casey
May 21st, 2021

Jason D’s official job title at Accent is Senior Systems Technician, but what he really is, is a road warrior. Instead of sitting behind a desk all day, Jason spends much of his time behind the wheel traveling to client sites to troubleshoot hardware and network issues that can’t be fixed remotely. It’s a job that he loves because there’s variety in each day and because he enjoys the face-to-face interactions he has with clients.

Read More

Share

Blog Feature

Tech Girl | Business Continuity

How to Keep Your Data Safe & Business Running During California's Fire Season: 5 Questions to Ask

By: Courtney Casey
May 17th, 2021

It’s that time of year in California. Dry brush and Santa Ana winds put thousands of lives, homes, and businesses at risk. The devastating fires in recent years remind us that wildfires can start any time and they make quick work of any area, destroying everything in their path.

Read More

Share

Blog Feature

Cyber Security

How to Use Employee Training to Build Up Cyber Security Defense

By: Courtney Casey
May 12th, 2021

Cyber criminals have access to sophisticated technologies these days, yet some of the most successful tried-and-true social engineering tactics continue to bypass technical security layers -- targeting the humans behind the technology.

Read More

Share

Blog Feature

Technology Planning | Tech Girl

Windows 7 End-of-Life Has Come and Gone: The Risks of Using an Unsupported Operating System

By: Courtney Casey
May 6th, 2021

January 14, 2020 marked the end of support for one of the most popular operating systems for businesses – Windows 7. It was released in 2009 and has served us well, but the end is here and it’s time to make your transition.

Read More

Share

Blog Feature

Cyber Security | CMMC Compliance

3 Most Common Advanced Technologies Businesses Need For Their CMMC Remediation Plan

By: Jonathan Barger
May 3rd, 2021

The word “Maturity” is part of the Cybersecurity Maturity Model Certification for a reason. Essentially, the Department of Defense wants their chain of suppliers to “grow up” in their security. When companies act like “grown-ups” in the way that they manage cyber risk, they’re a lot more serious about their responsibilities and they’re accountable for the outcome.

Read More

Share

Blog Feature

Executive Insights

To Move Forward, We Must Go Back to the Basics

By: Marty Kaufman
April 27th, 2021

I wonder if everyone feels the way I do about this year compared to last year. It seems like 2020 was the longest year of my life, and 2021 is flying by at light speed. Here we are already in the 2nd quarter and activity is heating up. Companies and employees are starting to get busy again and it’s apparent that we're in a different business climate. Have you changed the way you conduct business to respond to this particular environment?

Read More

Share