<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=573132769549581&amp;ev=PageView&amp;noscript=1">

The ACCENT Learning Hub

The IT Support Learning Hub

The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.

Courtney Casey

In an industry dominated by men, Courtney Casey, Director of Marketing for Accent Computer Solutions, Inc., is making her mark on the world of information technology. Courtney has been immersed in the IT field most of her life and has been molded into the tech savvy expert she is today. She began working for Accent while earning her Bachelor's degree from California State University, Long Beach. Known in the Inland Empire as the "Tech Girl," Courtney is a regular columnist for the region's newspaper of record, The Press-Enterprise. Her columns address topical news trends, new technology products, and offer advice on how to embrace technology or avoid common IT pitfalls.

Blog Feature

Company News | Team Member Spotlight

Bridging Technology and Business  – A Spotlight on Ammon Becar

By: Courtney Casey
November 13th, 2019

Anyone who has ever bought a new computer or upgraded to the latest smartphone knows that technology is changing and evolving at a breakneck pace. It can make your head spin just trying to catch up. That’s why Ammon Becar strives to offer Accent’s clients more than just a plan to solve their tech problems. He uses personalized communication to turn every interaction into a relationship-building experience.

Read More

Share

Blog Feature

5 Common Reasons Why IT Projects Fail

By: Courtney Casey
November 11th, 2019

With the pace that technology changes these days, IT projects are inevitable — hardware will need to be replaced, applications will need to be upgraded, etc. When that time comes, business owners and managers want to invest their money in solutions that will increase their efficiency so they can serve their customers better. But many times, IT projects fall short of expectations. Why is that?

Read More

Share

Learn how to develop an IT strategy book chapter

Do IT Right: It's Not About The Computers

Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.

Blog Feature

IT Support FAQs | Better IT Results

What Does the IT Department Do? 7 Metrics Executives Should Watch

By: Courtney Casey
November 6th, 2019

In today’s world, there are almost no companies that can function without Information Technology (IT). From sole proprietorships to Fortune 500s, EVERY successful business requires the right IT system implementation and management to truly thrive. 

Read More

Share

Blog Feature

Cyber Security | The IT Help Desk | Tech Tips & Trends

5 Password Policy Guidelines for Small to Mid-Size Businesses

By: Courtney Casey
November 4th, 2019

Microsoft research shows that 90% of all compromised passwords come from a data breach. You read that right - 90%! Criminals use tools that can guess thousands of passwords a minute. Their goal is to wreak havoc on your network and steal your trade secrets. But, not all these criminals are hacking masterminds. These attacks can also be a result of a coworker or family member snooping around.

Read More

Share

Blog Feature

Cyber Security

How to Give Vendors Network Access Without Compromising Security

By: Courtney Casey
October 28th, 2019

The Internet has changed how we do business, and along with everything else that your IT department does, they have the challenge of keeping your network safe. With the growing number of cyber threats combined with the increasing amount of data companies are storing today, the job of IT security has become complex, and some risky situations, like giving vendors access to your network, can get overlooked.

Read More

Share

Blog Feature

Cyber Security

Social Engineering & IT Security: What Businesses Need To Know

By: Courtney Casey
October 23rd, 2019

Every day we’re presented with news of the “next big thing.” Disruptive technology developed by some of the most resourceful minds of our time has created tremendous value for companies. These revolutionary tools, which have completely changed the ways we work and play, are simply powerful. The problem is that power isn’t always a good thing. In 1771, British-Irish statesman Edmund Burke said, “The greater the power, the more dangerous the abuse.” While his subject at the time had more to do with politics than technology, the statement holds the same truth today as it did then.

Read More

Share

Blog Feature

Cyber Security

3 Big Reasons Why Your IT Department Needs Outsourced Cyber Security Services

By: Courtney Casey
October 21st, 2019

If you knew that there was an increase in crime in your neighborhood, would you do something about it? Of course, you would. You would make sure that all the doors and windows to your house were locked. You might even beef up your defenses and purchase a security system just to get peace of mind that your family and property are safe.

Read More

Share

Blog Feature

Cyber Security | Tech Girl

Should Business Owners Phish Their Employees?

By: Courtney Casey
October 16th, 2019

We’re living in a time where cybercrime and ransomware attacks are announced like the next big box office hit. They’re making an impact worldwide, and it’s causing many businesses to suffer downtime, loss of business, and increased costs to recover from attacks. One of the most common types of scams affecting businesses is referred to as phishing. Phishing attacks are generally emails that entice users to perform an action, like clicking a link to an infected webpage, opening a malicious attachment, or even wiring money.

Read More

Share

Blog Feature

Company News | Team Member Spotlight

Daily Challenges Keeps Things Fresh - A Spotlight on Chris Frye

By: Courtney Casey
October 14th, 2019

A good day at work for Chris Frye is when he’s found a way through a challenge. That’s a good thing, because as Professional Services Manager for Accent, every day has its challenges. Whether he finds the solution on his own or by collaborating with his team, it’s the challenges that keep things fresh and exciting for Chris.

Read More

Share

Blog Feature

Cyber Security

Help! We Need NIST Cyber Security Compliance

By: Courtney Casey
October 9th, 2019

It’s not uncommon for your customers to give you specifications about how they want to do business with you. These specs increasingly include cyber security expectations, specifically compliance with the NIST(1) Cyber Security Framework. What should you do if someone with whom you do business places this requirement on you? Here’s what you need to know.

Read More

Share