<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=573132769549581&amp;ev=PageView&amp;noscript=1">

The ACCENT Learning Hub

The IT Support Education Center

The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.

Courtney Casey

In an industry dominated by men, Courtney Casey, Director of Marketing for Accent Computer Solutions, Inc., is making her mark on the world of information technology. Courtney has been immersed in the IT field most of her life and has been molded into the tech savvy expert she is today. She began working for Accent while earning her Bachelor's degree from California State University, Long Beach. Known in the Inland Empire as the "Tech Girl," Courtney is a regular columnist for the region's newspaper of record, The Press-Enterprise. Her columns address topical news trends, new technology products, and offer advice on how to embrace technology or avoid common IT pitfalls.

Blog Feature

Cyber Security

FBI Phone Call Investigating TrickBot Malware Was Not a Prank

By: Courtney Casey
April 26th, 2021

What would you say if you answered the phone, and it was the FBI investigating a cyber attack incident? “Hello, this is the FBI.” “Yeah, right...” When a call like this came into our office here at Accent, we were skeptical...but it turned out to be legit. The FBI was collaborating with Microsoft to shut down a global malware scheme, and they needed our help taking down one of the devices at a client’s site.

Read More

Share

Blog Feature

Cyber Security | CMMC Compliance

5 Reasons Why a Facilitated CMMC Gap Analysis is Better Than DIY

By: Courtney Casey
April 19th, 2021

When you get started on your journey to Cybersecurity Maturity Model Compliance (CMMC), one of the first things that you’ll need to do is to perform a gap analysis. A CMMC gap analysis lets you know where your security controls are good and where you have, well… gaps. If you have expertise with NIST 800-171 security regulations along with a lot of extra time, then there’s no reason why you can’t do a DIY gap analysis, but many companies are finding that a facilitated gap analysis is more efficient and actually saves money in the long run.

Read More

Share

Learn how to develop an IT strategy book chapter

Do IT Right: It's Not About The Computers

Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.

Blog Feature

Team Member Spotlight

Eager to Learn the Next Thing – A Spotlight on Philip

By: Courtney Casey
April 16th, 2021

Unless you know what goes on behind the scenes, you never realize just how much work goes into keeping IT systems running smoothly. That’s what surprised Philip, when he started his job as a Support Specialist at Accent Computer Solutions.

Read More

Share

Blog Feature

CMMC Compliance

CMMC Self-Assessment: What Exactly Does the DoD Want?

By: Courtney Casey
April 12th, 2021

When you’re trying to understand what you’re supposed to do to follow Cybersecurity Maturity Model (CMMC) regulations, there’s a lot of information to digest. A lot. Unless you want to make CMMC compliance your full-time job, it would be nice to have all that information boiled down so that you get to the point where you can act. You must act because if you haven’t, you’re already late. Last year the DoD communicated with companies in their supply chain with a request to submit a CMMC Self-Assessment by the end of 2020, yet many companies have not been able to do that. Why? For many it’s a lack of knowledge and training to interpret CMMC into action.

Read More

Share

Blog Feature

Cyber Security | Remote Work

Stop Letting Remote Workers Use Windows 7

By: Courtney Casey
March 25th, 2021

Millions of Americans began working from home for the first time in March 2020 when the pandemic hit in full force. While some companies had the ability to provide laptops or send office desktops home with them, many more needed workers to use personal computers for work. If their computer is still running Windows 7, this inadvertently created a security vulnerability. Continuing to use Windows 7 in any capacity – even if you have antivirus and a firewall – is risky since Microsoft ended support for Windows 7 on January 14, 2020. Let’s explore why, and what you should do now...

Read More

Share

Blog Feature

Team Member Spotlight

Your Friend on the Help Desk – A Spotlight On Amanda

By: Courtney Casey
March 19th, 2021

Talking to Amanda when you call the Accent Computer Solutions Help Desk is like talking to a friend. That’s because she’s not only interested in fixing the issue that’s bothering you, but in developing a relationship through the interaction. As a Support Specialist, Amanda talks to numerous people throughout the day. The more she gets to know the people on the other end of the phone, the more she likes it. “When a call comes in from someone you’ve talked to before, you get to know them and they get to know you,” said Amanda. “You learn from them and they learn from you. It’s work, but it’s fun too.”

Read More

Share

Blog Feature

Team Member Spotlight

Volunteer for the Hard Stuff – A Spotlight on Scott

By: Courtney Casey
February 19th, 2021

Scott has a reputation for being a closer at Accent. If there’s a project that’s getting tricky, or an escalated issue that’s not getting solved, he’s the guy to bring in to find the best way forward. As Senior Professional Services Engineer, Scott gets to work with the newest technology and tackle the toughest problems. It’s work that pulls from the huge knowledge base that he’s built in his 30+ years of experience, and it feeds his insatiable hunger for learning.

Read More

Share

Blog Feature

Managed IT Services | Managed Security Services

Managed Services Provider (MSP) vs Managed Security Services Provider (MSSP): What’s the Difference?

By: Courtney Casey
February 3rd, 2021

Not a day goes by where we don't hear stories of businesses falling victim to cyber attacks. The big ones make headlines, but there are thousands more happening worldwide each day. They're so common in fact, that some business leaders think it's normal to be hacked. 

Read More

Share

Blog Feature

Team Member Spotlight

Prepared for the Future of IT – A Spotlight on Joshua

By: Courtney Casey
January 15th, 2021

For the dedicated professionals who work in the IT industry, cutting corners and skipping ahead does not bode well for successful outcomes or satisfied clients. A robust IT plan requires careful consideration, thoughtful insight, and a well-constructed and executed design. It’s something that Accent’s Professional Services Engineer, Joshua, fully understands. That’s why he always does his homework and is prepared for any challenge that might come his way.

Read More

Share

Blog Feature

Cyber Security

Best Password Managers for Small and Medium-Sized Businesses

By: Courtney Casey
January 14th, 2021

When a high profile password hack makes the news, it's disconcerting to say the least. And more often than not when the passwords are revealed, they couldn't be more obvious. Things like: password123, iloveyou, qwerty, or 123456. (If that just hit a little too close to home, you should go change your passwords right now).

Read More

Share