The IT Support Education Center
The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.
The Department of Defense (DoD) has released a new version of Cybersecurity Maturity Model Certification (CMMC) requirements for their supply chain. The new CMMC version (referred to as CMMC 2.0) has been drafted in response to more than 850 responses that the DoD received during the public comment period following the release of the initial 1.0 version.
After languishing in a stressful job as a salesman for a discount tire company, Steve knew he needed a change. Interested in computers since he was young, he really wanted to pursue a career in IT, but he lacked a formal education or training in the field. Fortunately, the tire company gave him the flexibility to attend school for networks and communications, and he found his first IT job at Accent Computer Solutions.
Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.
If crime increased in your neighborhood, would you do something about it? Of course, you would. You’d make sure that all the doors and windows to your house were locked. You might even beef up your defenses and purchase a security system just to get the peace of mind that your family and property are safe. The risk of a cyber attack in the internet neighborhood where you do business is increasing. Still, unfortunately, many organizations aren’t successful at locking the doors and windows to their data and systems.
As a business leader, cyber liability insurance is something you've likely heard of, but you may not know exactly what it is and if your business needs it.
If you’ve been wondering if you should outsource security, the best way to determine a course of action is to get a cyber security assessment. The report that you get about your cyber security stature will point you in one of three directions.
If you're thinking about getting a cyber security assessment, it's likely because you have questions. You may be wondering: Do we have vulnerabilities that open us up to a cyber attack? Are we using the right technology for security? Does my IT team have the cyber security expertise that we need? Is IT handling everything that needs to be done?
There's currently a shortage of cybersecurity workers in the US, and it's not just a problem for companies looking to fill jobs focused on protecting data, networks, and people. Tony Coulson, Ph.D. at California State University, San Bernardino (CSUSB), calls this workforce shortage a "clear and present danger to the United States" and a problem that's been predicted for 20 years.
When he came to Accent at the end of 2019, Steve already had experience working in Business Development at other IT companies. He could tell right away that Accent is different. This is a company where people care and keep their promises. This is a company that could truly deliver what he was selling. And he soon discovered how much they care about his personal success as they provide him with lots of mentoring -- and the thing every business development rep appreciates, good leads.
Every day we’re presented with news of the “next big thing.” Disruptive technology developed by some of the most innovative minds of our time has created tremendous value for companies. These revolutionary tools, which have completely changed the ways we work and play, are simply powerful.
Phishing attacks are growing more sophisticated, and spam filters aren't effective against every kind of attack. Old-style spammers sent the same message to multiple people, hoping some of them would take the bait. The newer, more dangerous approach targets individuals. It's called spearphishing, whaling, or high-stakes phishing.