<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=3018339815089949&amp;ev=PageView&amp;noscript=1">

The ACCENT Learning Hub

The IT Support Education Center

The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.

Courtney Casey

In an industry dominated by men, Courtney Casey, Director of Marketing for Accent Computer Solutions, Inc., is making her mark on the world of information technology. Courtney has been immersed in the IT field most of her life and has been molded into the tech savvy expert she is today. She began working for Accent while earning her Bachelor's degree from California State University, Long Beach. Known in the Inland Empire as the "Tech Girl," Courtney is a regular columnist for the region's newspaper of record, The Press-Enterprise. Her columns address topical news trends, new technology products, and offer advice on how to embrace technology or avoid common IT pitfalls.

Blog Feature

CMMC Compliance

CMMC 2.0: What’s Different About the New Cybersecurity Maturity Model Certification

By: Courtney Casey
November 30th, 2021

The Department of Defense (DoD) has released a new version of Cybersecurity Maturity Model Certification (CMMC) requirements for their supply chain. The new CMMC version (referred to as CMMC 2.0) has been drafted in response to more than 850 responses that the DoD received during the public comment period following the release of the initial 1.0 version.

Read More

Share

Blog Feature

Team Member Spotlight

Challenged to Be Extraordinary – A Spotlight on Steve C.

By: Courtney Casey
November 19th, 2021

After languishing in a stressful job as a salesman for a discount tire company, Steve knew he needed a change. Interested in computers since he was young, he really wanted to pursue a career in IT, but he lacked a formal education or training in the field. Fortunately, the tire company gave him the flexibility to attend school for networks and communications, and he found his first IT job at Accent Computer Solutions.

Read More

Share

Learn how to develop an IT strategy book chapter

Do IT Right: It's Not About The Computers

Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.

Blog Feature

Cyber Security

3 Reasons Why Southern California Businesses Outsource Cyber Security Services

By: Courtney Casey
November 18th, 2021

If crime increased in your neighborhood, would you do something about it? Of course, you would. You’d make sure that all the doors and windows to your house were locked. You might even beef up your defenses and purchase a security system just to get the peace of mind that your family and property are safe. The risk of a cyber attack in the internet neighborhood where you do business is increasing. Still, unfortunately, many organizations aren’t successful at locking the doors and windows to their data and systems.

Read More

Share

Blog Feature

Cyber Security

What is Cyber Insurance and Does My Small Business Need It?

By: Courtney Casey
November 9th, 2021

As a business leader, cyber liability insurance is something you've likely heard of, but you may not know exactly what it is and if your business needs it.

Read More

Share

Blog Feature

Cyber Security

Should My Business Outsource Cyber Security? Get the Answer with a Cyber Security Assessment

By: Courtney Casey
November 1st, 2021

If you’ve been wondering if you should outsource security, the best way to determine a course of action is to get a cyber security assessment. The report that you get about your cyber security stature will point you in one of three directions.

Read More

Share

Blog Feature

Cyber Security

What Will a Cyber Security Assessment Report Show? 10 Common Findings & Recommendations

By: Courtney Casey
October 22nd, 2021

If you're thinking about getting a cyber security assessment, it's likely because you have questions. You may be wondering: Do we have vulnerabilities that open us up to a cyber attack? Are we using the right technology for security? Does my IT team have the cyber security expertise that we need? Is IT handling everything that needs to be done?

Read More

Share

Blog Feature

Cyber Security

CSUSB's Cybersecurity Center Filling Worker Gap with Innovation and Grassroots Outreach

By: Courtney Casey
October 20th, 2021

There's currently a shortage of cybersecurity workers in the US, and it's not just a problem for companies looking to fill jobs focused on protecting data, networks, and people. Tony Coulson, Ph.D. at California State University, San Bernardino (CSUSB), calls this workforce shortage a "clear and present danger to the United States" and a problem that's been predicted for 20 years.

Read More

Share

Blog Feature

Team Member Spotlight

Opening Doors Through Confidence in His Team – A Spotlight on Steve K.

By: Courtney Casey
October 15th, 2021

When he came to Accent at the end of 2019, Steve already had experience working in Business Development at other IT companies. He could tell right away that Accent is different. This is a company where people care and keep their promises. This is a company that could truly deliver what he was selling. And he soon discovered how much they care about his personal success as they provide him with lots of mentoring -- and the thing every business development rep appreciates, good leads.

Read More

Share

Blog Feature

Cyber Security

Social Engineering & IT Security: What Businesses Need To Know

By: Courtney Casey
October 14th, 2021

Every day we’re presented with news of the “next big thing.” Disruptive technology developed by some of the most innovative minds of our time has created tremendous value for companies. These revolutionary tools, which have completely changed the ways we work and play, are simply powerful.

Read More

Share

Blog Feature

Cyber Security

Train Your Team to Spot High-Stakes Phishing

By: Courtney Casey
October 13th, 2021

Phishing attacks are growing more sophisticated, and spam filters aren't effective against every kind of attack. Old-style spammers sent the same message to multiple people, hoping some of them would take the bait. The newer, more dangerous approach targets individuals. It's called spearphishing, whaling, or high-stakes phishing.

Read More

Share