<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=3018339815089949&amp;ev=PageView&amp;noscript=1">

The ACCENT Learning Hub

The IT Support Education Center

The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.

Blog Feature

CMMC Compliance

CMMC 2.0: What’s Different About the New Cybersecurity Maturity Model Certification

By: Courtney Casey
November 30th, 2021

The Department of Defense (DoD) has released a new version of Cybersecurity Maturity Model Certification (CMMC) requirements for their supply chain. The new CMMC version (referred to as CMMC 2.0) has been drafted in response to more than 850 responses that the DoD received during the public comment period following the release of the initial 1.0 version.

Read More

Share

Blog Feature

Executive Insights

Building a Farm Team: The Strategy for Long-Term Recruiting

By: Marty Kaufman
November 29th, 2021

If you want a really good long-term strategy for building talent at your company, look at how it’s done in baseball. In baseball, the beginning of the recruiting process isn’t focused merely on capability. Instead, it’s focused on potential, and that’s the whole reason for the farm team. The farm team is where talent is grown.

Read More

Share

Learn how to develop an IT strategy book chapter

Do IT Right: It's Not About The Computers

Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.

Blog Feature

Cyber Security

17 Foundational Cyber Security Measures Southern California Businesses Need in 2022

By: Accent Computer Solutions
November 23rd, 2021

Hackers are getting more sophisticated. As a result, the minimum security protections that businesses need to defend against cyber criminals have changed. Cyber criminals have advanced the technology they use to sneak in (or bust through) network doors, so the list of must-have cyber security basics has expanded. To have a fighting chance, you need a layered cyber security strategy.  It might be hard to know what those layers should be if you’re not a technology specialist. You might even have a gut feeling that what you’re doing right now isn’t enough. So we’re here to help.

Read More

Share

Blog Feature

Team Member Spotlight

Challenged to Be Extraordinary – A Spotlight on Steve C.

By: Courtney Casey
November 19th, 2021

After languishing in a stressful job as a salesman for a discount tire company, Steve knew he needed a change. Interested in computers since he was young, he really wanted to pursue a career in IT, but he lacked a formal education or training in the field. Fortunately, the tire company gave him the flexibility to attend school for networks and communications, and he found his first IT job at Accent Computer Solutions.

Read More

Share

Blog Feature

Cyber Security

3 Reasons Why Southern California Businesses Outsource Cyber Security Services

By: Courtney Casey
November 18th, 2021

If crime increased in your neighborhood, would you do something about it? Of course, you would. You’d make sure that all the doors and windows to your house were locked. You might even beef up your defenses and purchase a security system just to get the peace of mind that your family and property are safe. The risk of a cyber attack in the internet neighborhood where you do business is increasing. Still, unfortunately, many organizations aren’t successful at locking the doors and windows to their data and systems.

Read More

Share

Blog Feature

Cyber Security

What is Cyber Insurance and Does My Small Business Need It?

By: Courtney Casey
November 9th, 2021

As a business leader, cyber liability insurance is something you've likely heard of, but you may not know exactly what it is and if your business needs it.

Read More

Share

Blog Feature

Cyber Security

Hackers, The WiFi Pineapple, and Small Business

By: Accent Computer Solutions
November 4th, 2021

WiFi-enabled devices are now a part of our everyday lives. Think about it, what isn’t WiFi-enabled in your life? From our cars to our coffee pots, the Internet of Things (IoT) has taken over the world.

Read More

Share

Blog Feature

Cyber Security

Should My Business Outsource Cyber Security? Get the Answer with a Cyber Security Assessment

By: Courtney Casey
November 1st, 2021

If you’ve been wondering if you should outsource security, the best way to determine a course of action is to get a cyber security assessment. The report that you get about your cyber security stature will point you in one of three directions.

Read More

Share

Blog Feature

Executive Insights

Creating a Recruiting Process with a Human Touch

By: Marty Kaufman
October 29th, 2021

I’ve been spending a lot of my time on the phone with job candidates lately. That might be surprising to you if you know that I’m not usually on the front line for recruiting. We’re hiring for several positions at the moment and our experience through “The Great Resignation” is not too different from what my peers in the IT industry around the nation have been going through.

Read More

Share

Blog Feature

Cyber Security

What is Endpoint Detection and Response (EDR)?

By: Accent Computer Solutions
October 26th, 2021

Far too often, small and medium-sized businesses tend to think that they’re not on a hacker’s radar or that a firewall and antivirus will keep them 100% protected against a breach. But that’s not the case. Cyber criminals steal whatever data they can and often use the compromised network to launch further attacks after penetrating your system or for extortion to sell your data back to you (or the highest bidder). That makes a business of ANY size a prime target.

Read More

Share