The IT Support Education Center
The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.
Cyber criminals have access to sophisticated technologies these days, yet some of the most successful tried-and-true social engineering tactics continue to bypass technical security layers -- targeting the humans behind the technology.
January 14, 2020 marked the end of support for one of the most popular operating systems for businesses – Windows 7. It was released in 2009 and has served us well, but the end is here and it’s time to make your transition.
Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.
The word “Maturity” is part of the Cybersecurity Maturity Model Certification for a reason. Essentially, the Department of Defense wants their chain of suppliers to “grow up” in their security. When companies act like “grown-ups” in the way that they manage cyber risk, they’re a lot more serious about their responsibilities and they’re accountable for the outcome.
I wonder if everyone feels the way I do about this year compared to last year. It seems like 2020 was the longest year of my life, and 2021 is flying by at light speed. Here we are already in the 2nd quarter and activity is heating up. Companies and employees are starting to get busy again and it’s apparent that we're in a different business climate. Have you changed the way you conduct business to respond to this particular environment?
What would you say if you answered the phone, and it was the FBI investigating a cyber attack incident? “Hello, this is the FBI.” “Yeah, right...” When a call like this came into our office here at Accent, we were skeptical...but it turned out to be legit. The FBI was collaborating with Microsoft to shut down a global malware scheme, and they needed our help taking down one of the devices at a client’s site.
When you get started on your journey to Cybersecurity Maturity Model Compliance (CMMC), one of the first things that you’ll need to do is to perform a gap analysis. A CMMC gap analysis lets you know where your security controls are good and where you have, well… gaps. If you have expertise with NIST 800-171 security regulations along with a lot of extra time, then there’s no reason why you can’t do a DIY gap analysis, but many companies are finding that a facilitated gap analysis is more efficient and actually saves money in the long run.
Unless you know what goes on behind the scenes, you never realize just how much work goes into keeping IT systems running smoothly. That’s what surprised Philip, when he started his job as a Support Specialist at Accent Computer Solutions.
When you’re trying to understand what you’re supposed to do to follow Cybersecurity Maturity Model (CMMC) regulations, there’s a lot of information to digest. A lot. Unless you want to make CMMC compliance your full-time job, it would be nice to have all that information boiled down so that you get to the point where you can act. You must act because if you haven’t, you’re already late. Last year the DoD communicated with companies in their supply chain with a request to submit a CMMC Self-Assessment by the end of 2020, yet many companies have not been able to do that. Why? For many it’s a lack of knowledge and training to interpret CMMC into action.
(Rancho Cucamonga, CA – April 9, 2021) Southern California companies in the DoD supply chain now have four more consultants to guide them through Cybersecurity Maturity Model Certification (CMMC) as Accent Computer Solutions employees achieve Registered Practitioner (RP) status. John Leete, Chris Frye, Jonathan Barger, and Jackson Roberts join Corey Kaufman as CMMC Registered Practitioners, trained to act as advisors to companies seeking CMMC compliance. “Companies that must comply with CMMC need help interpreting the regulations and translating them into a viable security plan,” said Marty Kaufman, President and Founder of Accent Computer Solutions. “We’ve stepped up to the plate to fill this need, which is a natural fit with our deep expertise in cyber security.” Registered Practitioners must undergo training in CMMC methodology, follow a Professional Code of Conduct, and be employed by a Registered Provider Organization (RPO). As an RPO, Accent not only consults with companies seeking CMMC compliance, they’re also able to implement and support the company's security plans, if needed.
Spring has come in like a lion for us here at Accent – I’m not talking about the weather! Activity throughout the company has been high, including our onboarding teams who have been getting new clients up and running on our support system. We are so very thankful for the companies who’ve put their trust in us to help with their technology challenges. We see this arrival of new business as an indication that Southern California companies are feeling confidence in the future and are ready to invest in change. For everyone’s benefit, I hope this trend of recovery continues!