<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=573132769549581&amp;ev=PageView&amp;noscript=1">

The IT Services & Support Learning Hub

The ACCENT Learning Hub

The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.

Ryan Ziska

Ryan is the Support Desk Supervisor for Accent Computer Solutions, Inc. He keeps a close eye on our Help Desk, making sure every ticket is handled quickly, efficiently, and with the best possible customer service. When you’re in trouble, his team has you covered.

Blog Feature

Tightening IT Security | The IT Help Desk

3 Most Popular Ways Hackers Scam Small Businesses

By: Ryan Ziska
May 2nd, 2018

    In March 2018, Microsoft released their bi-annual Security Intelligence Report. Microsoft scanned 400 billion email messages, 18 billion web pages, and 1.2 billion devices for threats. But what does that mean for small business? What are the hackers' methods? How can you protect your company?

Read More

Share

Blog Feature

IT Untangled

Social Networking Safety Tips - The IT Help Desk

By: Ryan Ziska
April 4th, 2018

  An article published by the American Academy of Pediatrics in 2010 estimated the average teenager consumed nearly 11 hours of media per-day, with one and a half hours spent on social media.  A follow-up article by online marketing firm Mediakix showed social media usage had jumped in 2016 to 1 hour and 56 minutes after studying statistics gathered from YouTube, Facebook and industry analyst. 

Read More

Share

Learn how to develop an IT strategy book chapter

Do IT Right: It's Not About The Computers

Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.

Blog Feature

Tech Tips | The IT Help Desk

5 Password Policy Guidelines for Small to Mid-Size Businesses

By: Ryan Ziska
March 2nd, 2018

    Microsoft research shows that 90% of all compromised passwords come from a data breach. You read that right - 90%! Criminals use tools that can guess thousands of passwords a minute. Their goal is to wreak havoc on your network and steal your trade secrets. But, not all these criminals are hacking masterminds. These attacks can also be a result of a coworker or family member snooping around.

Read More

Share