<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=573132769549581&amp;ev=PageView&amp;noscript=1">

The ACCENT Learning Hub

The IT Support Education Center

The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.

Courtney Casey

In an industry dominated by men, Courtney Casey, Director of Marketing for Accent Computer Solutions, Inc., is making her mark on the world of information technology. Courtney has been immersed in the IT field most of her life and has been molded into the tech savvy expert she is today. She began working for Accent while earning her Bachelor's degree from California State University, Long Beach. Known in the Inland Empire as the "Tech Girl," Courtney is a regular columnist for the region's newspaper of record, The Press-Enterprise. Her columns address topical news trends, new technology products, and offer advice on how to embrace technology or avoid common IT pitfalls.

Blog Feature

Team Member Spotlight

Cultivating the People Behind the Tech – A Spotlight on Ray

By: Courtney Casey
June 18th, 2021

Combining a lifelong passion with a successful career may seem like a dream for some, but for Ray, Support Services Manager at Accent Computer Solutions, it’s what he lives out every day. Ray combines his love of computers and people to effectively manage multiple teams of employees that provide the fast, friendly, frustration-free IT service that Accent clients expect. Ray tackles every challenge with humility and honesty, and he enthusiastically pursues the knowledge he needs to create strategies that solve problems.

Read More

Share

Blog Feature

CMMC Compliance

IT Managers: How to Tell Your Boss You Need a CMMC Consultant

By: Courtney Casey
May 25th, 2021

If you manage IT at your company, then you have a lot of roles to fill. Whether you have a small team or it's just you, you could be asked to be the network administrator, help desk technician, IT project manager, business analyst, cyber security expert, and more at any given moment. And if your company needs to comply with the Department of Defense (DoD) Cybersecurity Maturity Model Certification (CMMC), you're likely going to get another role tacked onto your responsibilities.

Read More

Share

Learn how to develop an IT strategy book chapter

Do IT Right: It's Not About The Computers

Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.

Blog Feature

Team Member Spotlight

IT Road Warrior Delivers Tech Help with Friendly Banter – A Spotlight on Jason D.

By: Courtney Casey
May 21st, 2021

Jason D’s official job title at Accent is Senior Systems Technician, but what he really is, is a road warrior. Instead of sitting behind a desk all day, Jason spends much of his time behind the wheel traveling to client sites to troubleshoot hardware and network issues that can’t be fixed remotely. It’s a job that he loves because there’s variety in each day and because he enjoys the face-to-face interactions he has with clients.

Read More

Share

Blog Feature

Tech Girl | Business Continuity

How to Keep Your Data Safe & Business Running During California's Fire Season: 5 Questions to Ask

By: Courtney Casey
May 17th, 2021

It’s that time of year in California. Dry brush and Santa Ana winds put thousands of lives, homes, and businesses at risk. The devastating fires in recent years remind us that wildfires can start any time and they make quick work of any area, destroying everything in their path.

Read More

Share

Blog Feature

Cyber Security

How to Use Employee Training to Build Up Cyber Security Defense

By: Courtney Casey
May 12th, 2021

Cyber criminals have access to sophisticated technologies these days, yet some of the most successful tried-and-true social engineering tactics continue to bypass technical security layers -- targeting the humans behind the technology.

Read More

Share

Blog Feature

Technology Planning | Tech Girl

Windows 7 End-of-Life Has Come and Gone: The Risks of Using an Unsupported Operating System

By: Courtney Casey
May 6th, 2021

January 14, 2020 marked the end of support for one of the most popular operating systems for businesses – Windows 7. It was released in 2009 and has served us well, but the end is here and it’s time to make your transition.

Read More

Share

Blog Feature

Cyber Security

FBI Phone Call Investigating TrickBot Malware Was Not a Prank

By: Courtney Casey
April 26th, 2021

What would you say if you answered the phone, and it was the FBI investigating a cyber attack incident? “Hello, this is the FBI.” “Yeah, right...” When a call like this came into our office here at Accent, we were skeptical...but it turned out to be legit. The FBI was collaborating with Microsoft to shut down a global malware scheme, and they needed our help taking down one of the devices at a client’s site.

Read More

Share

Blog Feature

Cyber Security | CMMC Compliance

Facilitated vs DIY CMMC Gap Analysis: Which is Better?

By: Courtney Casey
April 19th, 2021

When you get started on your journey to Cybersecurity Maturity Model Compliance (CMMC), one of the first things that you’ll need to do is to perform a gap analysis. A CMMC gap analysis lets you know where your security controls are good and where you have, well… gaps. If you have expertise with NIST 800-171 security regulations along with a lot of extra time, then there’s no reason why you can’t do a DIY gap analysis, but many companies are finding that a facilitated gap analysis is more efficient and actually saves money in the long run.

Read More

Share

Blog Feature

Team Member Spotlight

Eager to Learn the Next Thing – A Spotlight on Philip

By: Courtney Casey
April 16th, 2021

Unless you know what goes on behind the scenes, you never realize just how much work goes into keeping IT systems running smoothly. That’s what surprised Philip, when he started his job as a Support Specialist at Accent Computer Solutions.

Read More

Share

Blog Feature

CMMC Compliance

CMMC Self-Assessment: What Exactly Does the DoD Want?

By: Courtney Casey
April 12th, 2021

When you’re trying to understand what you’re supposed to do to follow Cybersecurity Maturity Model (CMMC) regulations, there’s a lot of information to digest. A lot. Unless you want to make CMMC compliance your full-time job, it would be nice to have all that information boiled down so that you get to the point where you can act. You must act because if you haven’t, you’re already late. Last year the DoD communicated with companies in their supply chain with a request to submit a CMMC Self-Assessment by the end of 2020, yet many companies have not been able to do that. Why? For many it’s a lack of knowledge and training to interpret CMMC into action.

Read More

Share