The IT Support Education Center
The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.
People don't really know how their cyber security skills are going to measure up until they've tried them. Everyone would prefer never having to face a real-life cyber security incident. It's better if they can try out their skills on simulated threats. They can make mistakes without suffering anything worse than embarrassment. The lessons they learn will help them to deal with real threats when they happen.
Just when we think the economy is strong and steady, along comes a global event to shake it up. It's times like these when executives reassess what they're doing and look for ways to use technology to improve their business. Fortunately, you don't need to hire more internal IT staff to do this.
Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.
When Boris Johnson, Prime Minister of the UK, sent out a tweet that included his computer screen showing his first cabinet meeting on Zoom, little did he know that he was helping hackers find their way into his meeting. His monitor clearly showed the meeting ID, and sharing it with the whole world on social media was like giving hackers a key to their conference room.
Usually when you start out working for a company, you move step by step into roles that have more responsibility - but not Erik Bekke. His career path at Accent has skyrocketed since the day he first started out as a Help Desk Engineer in 2016.
An increasing number of workers are making the transition to remote employment. In fact, a recent study found that there are about 4.3 million remote workers in the United States - and that was before the outbreak of COVID-19. Now, millions more are making the shift to teleworking.
Welcome back to the second half of our two-part article on the top network security threats of 2020. If you haven't seen part one, jump back to the beginning before diving into part two.
Operating a business is expensive. Between payroll, materials, taxes, equipment, legal services, etc., it’s no surprise that every business owner would like to lower their costs to improve their margins. It seems like almost every day, a business executive tells me that they want lower IT costs without sacrificing service. There are four key areas I tell business leaders to check first to ensure they are maximizing the results from their IT investment.
Now that you're working from home, there are a few security best practices to follow to help make sure you and your company are protected from cyber security threats. For example, have you thought about the security of your home network with all of your "things" connected to it? Don't forget that working securely has as much to do with your actions as it does with your IT environment, so don't let your new work location let down your guard.
During these unprecedented times, many companies are now being challenged to deliver their products and/or services, perhaps using new (and as yet, untested) mechanisms to do so. While some businesses have been forced to close their doors, those who have the advantage of staying open and allowing staff to work from a remote location can't ignore the security implications that go along with having less control over their corporate business and technological environment.
On March 18, 2020, the World Health Organization reported 207,855 cases of COVID-19 worldwide and 8,648 deaths from this virus. The pandemic has spread to 166 countries and territories, which is almost everywhere in the world. The recommended solution for businesses, schools, religious institutions, public agencies, and non-profits is the same: start practicing social distancing as soon as possible, and that means that many businesses have had to send employees to work from home.