The IT Support Education Center
The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.
What would you say if you answered the phone, and it was the FBI investigating a cyber attack incident? “Hello, this is the FBI.” “Yeah, right...” When a call like this came into our office here at Accent, we were skeptical...but it turned out to be legit. The FBI was collaborating with Microsoft to shut down a global malware scheme, and they needed our help taking down one of the devices at a client’s site.
When you get started on your journey to Cybersecurity Maturity Model Compliance (CMMC), one of the first things that you’ll need to do is to perform a gap analysis. A CMMC gap analysis lets you know where your security controls are good and where you have, well… gaps. If you have expertise with NIST 800-171 security regulations along with a lot of extra time, then there’s no reason why you can’t do a DIY gap analysis, but many companies are finding that a facilitated gap analysis is more efficient and actually saves money in the long run.
Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.
Unless you know what goes on behind the scenes, you never realize just how much work goes into keeping IT systems running smoothly. That’s what surprised Philip, when he started his job as a Support Specialist at Accent Computer Solutions.
When you’re trying to understand what you’re supposed to do to follow Cybersecurity Maturity Model (CMMC) regulations, there’s a lot of information to digest. A lot. Unless you want to make CMMC compliance your full-time job, it would be nice to have all that information boiled down so that you get to the point where you can act. You must act because if you haven’t, you’re already late. Last year the DoD communicated with companies in their supply chain with a request to submit a CMMC Self-Assessment by the end of 2020, yet many companies have not been able to do that. Why? For many it’s a lack of knowledge and training to interpret CMMC into action.
Millions of Americans began working from home for the first time in March 2020 when the pandemic hit in full force. While some companies had the ability to provide laptops or send office desktops home with them, many more needed workers to use personal computers for work. If their computer is still running Windows 7, this inadvertently created a security vulnerability. Continuing to use Windows 7 in any capacity – even if you have antivirus and a firewall – is risky since Microsoft ended support for Windows 7 on January 14, 2020. Let’s explore why, and what you should do now...
Talking to Amanda when you call the Accent Computer Solutions Help Desk is like talking to a friend. That’s because she’s not only interested in fixing the issue that’s bothering you, but in developing a relationship through the interaction. As a Support Specialist, Amanda talks to numerous people throughout the day. The more she gets to know the people on the other end of the phone, the more she likes it. “When a call comes in from someone you’ve talked to before, you get to know them and they get to know you,” said Amanda. “You learn from them and they learn from you. It’s work, but it’s fun too.”
Scott has a reputation for being a closer at Accent. If there’s a project that’s getting tricky, or an escalated issue that’s not getting solved, he’s the guy to bring in to find the best way forward. As Senior Professional Services Engineer, Scott gets to work with the newest technology and tackle the toughest problems. It’s work that pulls from the huge knowledge base that he’s built in his 30+ years of experience, and it feeds his insatiable hunger for learning.
Not a day goes by where we don't hear stories of businesses falling victim to cyber attacks. The big ones make headlines, but there are thousands more happening worldwide each day. They're so common in fact, that some business leaders think it's normal to be hacked.
For the dedicated professionals who work in the IT industry, cutting corners and skipping ahead does not bode well for successful outcomes or satisfied clients. A robust IT plan requires careful consideration, thoughtful insight, and a well-constructed and executed design. It’s something that Accent’s Professional Services Engineer, Joshua, fully understands. That’s why he always does his homework and is prepared for any challenge that might come his way.
When a high profile password hack makes the news, it's disconcerting to say the least. And more often than not when the passwords are revealed, they couldn't be more obvious. Things like: password123, iloveyou, qwerty, or 123456. (If that just hit a little too close to home, you should go change your passwords right now).