<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=573132769549581&amp;ev=PageView&amp;noscript=1">

The IT Support Learning Hub

The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.

Blog Feature

Tightening IT Security

Cyber Security in Your Business Strategy is Like a Fitness Plan

By: Accent Computer Solutions
September 11th, 2018

When cyber security is part of your business strategy, it acts like a fitness plan. You’ll never know what illnesses or injuries you avoided by being on the plan, but you notice that your ability to maneuver is much better than your peers. Still, it’s often difficult for executives to contemplate the ROI of cyber security. Maybe that’s because you can’t directly measure the output from the input. You can, however, when you make it a habit to consider security alongside your business goals.

Read More

Share

Blog Feature

Tightening IT Security

5 Questions to Ask Yourself if You Don’t Think Cyber Security is an Executive Problem

By: Accent Computer Solutions
September 5th, 2018

It might be time to drop the word “cyber” when talking about cyber security because managing cyber risk is really about managing business risk. IT certainly plays an important role in how information technology systems and stored data are protected, but executives need to understand that there is more at risk than they realize. For example, executives sometimes make decisions in the name of productivity or cost savings that compromise security. Perhaps these decisions would be made differently if the executives realized what a risky situation their actions created and they asked themselves these five questions.

Read More

Share

Learn how to develop an IT strategy book chapter

Do IT Right: It's Not About The Computers

Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.

Blog Feature

Executive Insights | Tightening IT Security

Cyber Risk is Business Risk

By: Marty Kaufman
August 30th, 2018

Just recently, I learned about a local business that experienced a cyber attack. All of the employees were sent home to work from their personal computers because the owner was afraid that using their business systems would make matters worse. This business owner called and asked me to come over to talk with him about the situation. As I sat in his conference room and discussed what was going on, he was actually being attacked while I was there! Bank accounts and financial information were being compromised real time.

Read More

Share

Blog Feature

Tech Girl | Tech Tips

How to Make Sure Your Emails Get Delivered, Not Blacklisted

By: Courtney Casey
August 20th, 2018

You’ve just typed up your monthly email to your loyal followers and clients and you hit the magic button — send!

Read More

Share

Blog Feature

Executive Insights | Leadership

What IT Needs Most in This Super Complex Technological World: Communication

By: Marty Kaufman
July 31st, 2018

Threats from malware, complicated projects, and out-of-date equipment are front and center in executive conversations with Information Technology (IT) support firms right now. This past month, demand for my consulting time has been at an all-time high. As I advise business leaders and managers who are trying to get better results from IT, the first part of the discussion usually consists of defining exactly what IT is.

Read More

Share

Blog Feature

Tech Girl | Strategic Technology Planning

The End is Near for Windows 7: Start Planning For Windows 10 Now

By: Courtney Casey
July 2nd, 2018

January 14, 2020 marks the end of support for one of the most popular operating systems for businesses – Windows 7. It was released in 2009 and has served us well, but the end is near and it’s time to start planning your transition.

Read More

Share

Blog Feature

Executive Insights

Protect Your Investment & Stay Productive With Proactive Network Management

By: Marty Kaufman
June 28th, 2018

I bet most of you don’t wake up in the middle of the night sweating about Internet Bandwidth – my team and I do. Over the course of the last few years, the Internet and connectivity have become one of the most important topics of business conversations. Why, you ask? Today, almost every organization uses the Internet and its associated bandwidth for mission-critical applications. Companies are using cloud based-applications ranging environmental control systems (thermostats) and billing software, to ERPs and Shop Floor Control systems. Software manufacturers and the users of these systems (you and your employees) have become completely dependent on Internet availability. We expect it from jacks on the wall and from Wi-Fi systems, and we’re lost without it. Even a little blip in business Internet performance today interrupts voice calls, manufacturing production, billing, warehouse management, distribution systems, medical office patient processing, etc.

Read More

Share

Blog Feature

Tightening IT Security

Email Safety Best Practices: How to Stay Safe From Email Scams

By: Jessica Duncan
June 26th, 2018

    We all know that email scams are going around like crazy these days. Our goal is to keep you and your company safe. There are a few simple techniques that will help with our security efforts. In this article, we’ll cover: Creating a Secure Password How to Recognize and Avoid Phishing Scams And Steps to Prevent Fraudulent Payments So, let's dive in.

Read More

Share

Blog Feature

Executive Insights | Tightening IT Security

IT Security and GDPR: What to Do Next

By: Marty Kaufman
May 31st, 2018

This month has been a security and compliance whirlwind! The European Union’s General Data Protection Regulation (GDPR) went into effect on May 25, 2018. I’m sure you’ve received a LOT of emails from companies notifying you that they’ve updated their privacy policies. This is just one step companies are taking to become GDPR compliant. We’ve been getting a lot of questions about GDPR and compliance, so here’s a brief overview about what’s going on, and what you may need to do.

Read More

Share

Blog Feature

The IT Help Desk

How Small Businesses Can Protect Against the Growing Ransomware Threats

By: Ryan Ziska
May 30th, 2018

    Since 2009, there has been a significant rise in ransomware attacks, and it shows no signs of slowing down. BUT WHY?!?!? To put it simply: because it works. Ransomware is a form of malware designed to take over your computer, files, folders, and networks. And according to Norton Antivirus, it isn’t always just one cybercriminal -- it could be cyber-gangs working together to make money off unsuspecting users. It’s time for all companies, especially small businesses, to be on high alert and have the proper protection against ransomware.

Read More

Share