<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=573132769549581&amp;ev=PageView&amp;noscript=1">
Need Better I.T. Support Results? Call Today 800.481.4369 Client Support Center

Education Center

Articles, Training, Videos, Tips, eBooks, and More!

Accent Computer Solutions

Accent Computer Solutions

Local IT Support Company Earns Top Microsoft Partner Recognition

Accent Computer Solutions, Inc. Is Honored To Be Named One of the Top 200 U.S. Microsoft Partners

RANCHO CUCAMONGA, CA--(Marketwired - December 29, 2016) - Accent Computer Solutions, Inc., a leading information technology (IT) support and managed IT services provider in Southern California, today announced that it has been named one of Microsoft's Top 200 U.S. Partners by Redmond Channel Partner (RCP) magazine, a publication focused on driving success in the Microsoft Partner community.

This is the first annual list of its kind. RCP put this list together to help businesses figure out which are the best IT companies in their area when they search for a new IT consultant.

Read More

Local IT Support Company Wins A 2016 Top Workplace Award

Accent Computer Solutions, Inc. Is Honored To Be Named A 2016 Top Workplace By The Press-Enterprise

RANCHO CUCAMONGA, CA (December 5, 2016) — Accent Computer Solutions, Inc., a leading information technology (IT) support and consulting company in Southern California, has been awarded a 2016 Top Workplaces honor by The Press-Enterprise.

Read More

Could One Tiny Leak Wipe Out Your Entire Company?

Things were going great at Michael Daugherty’s up-and-coming $4 million medical-testing company.


He was a happy man. He ran a good business in a nice place. His Atlanta-based LabMD had about 30 employees and tested blood, urine and tissue samples for urologists. Life was good for this middle-aged businessman from Detroit.

Then, one Tuesday afternoon in May 2008, the phone call came that changed his life. His general manager came in to tell Daugherty about a call he’d just fielded from a man claiming to have nabbed a file full of LabMD patient documents. For a medical business that had to comply with strict federal rules on privacy, this was bad. Very bad.

Read More
Topics: I.T. Security

Go Mobile - Without Killing Your Data

What if you could tap into the top talent in your industry, no matter where in the world they are? With the power of the mobile web, your all-star team is now – literally – at your fingertips.

Read More
Topics: I.T. Security

5 Ways To Spot A Social Engineering Attack

“I’m not going to make payroll – we’re going to close our doors as a result of the fraud.”

Unfortunately, that statement is becoming more common among smaller businesses, according to Mitchell Thompson, head of an FBI financial cybercrimes task force in New York.

The FBI reports that since October 2013 more than 12,000 businesses worldwide have been targeted by social engineering–type cyberscams, netting criminals well over $2 billion. And those are just the reported cases. Often, due to customer relationships, PR or other concerns, incidents go unreported.

These unfortunate events were triggered by a particularly nasty form of cyberattack known as “social engineering.”

Read More
Topics: I.T. Security

The Pros and Cons of Outsourcing IT Services

In today’s digital business world, it’s rare to find tasks that don’t require the use of a computer, tablet, or smartphone. This means that delighting your clients and keeping your employees productive depends heavily on the efficiency and competency of your company’s Information Technology department processes, whether it’s internally staffed or outsourced to a third party.

Read More

Shadow IT: Ignore At Your Own Risk

It’s one of those little secrets that nobody wants to talk about…

The term “Shadow IT” refers to apps and devices used at work that operate outside your company’s sanctioned policies and protocols.

Shadow IT takes many forms, like conversations on Facebook Messenger, Google Hangouts, Gmail or Skype. It can include software from Excel macros to cloud-based data storage apps such as Dropbox, Google Docs and Evernote. Or collaboration spaces like Slack, Asana and Wrike. And then there are devices: USB sticks, smartphones, tablets and laptops within your network that you have no control over.

Robert J. Moore, CEO of RJMetrics, relates how companies like Slack and Dropbox craft their pricing models to encourage rapid proliferation. One day, a few of his engineers were using Slack, then all the engineers, then the whole rest of the company was using it. He said, “We reached a point of no return and paying for it was pretty much our only option.”

Read More
Topics: I.T. Security

Southern California Business Technology News - Week of June 6, 2016

This Week's News Recap:

Who are the top accounting firms, banks, software providers, and professional services firms? Readers of CFO voted on those 4 major categories and the winners have been chosen - the results may surprise you. Joe Biden believes that Big Data could be a key factor in combatting cancer. Google cofounder investing in flying cars. Millions of Twitter passwords have been compromised, so some accounts have been locked.

Read More

Accent Computer Solutions, Inc. Ranked Top Managed IT Services Company in Inland Empire

Local IT Firm Ranked Top 5 Total Service Provider in California

RANCHO CUCAMONGA, CA (June 8, 2016) — Accent Computer Solutions, Inc., a leading information technology (IT) and cloud computing firm in Southern California, has been ranked top managed IT service provider (MSP) in the Inland Empire by Penton Technology’s global MSPmentor 501 list for the fourth year in a row.

Read More

Southern California Business Technology News - Week of May 30, 2016

This Week's News Recap:

Some online service businesses may need to start paying state sales tax. Microsoft is beefing up security features for Office 365. Coding is not required for many positions today, but having that additional skill can give candidates a leg up on the competition. Due to its ease to create, ransomware is gaining in popularity and continues to hold many businesses' data hostage. 

Read More