<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=573132769549581&amp;ev=PageView&amp;noscript=1">

The ACCENT Learning Hub

The IT Support Education Center

The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.

Blog Feature

Cyber Security | Training | Tech Tips & Trends

How Email Security Awareness Training Protects Against Phishing Scams

By: Shantae' Hansen
November 3rd, 2020

There’s a new term you should learn if you don't know it already: Business Email Compromise (BEC). It’s a formal way of saying someone’s email was used as a part of a cyber attack. The FBI calls BEC “one of the most financially damaging online crimes” and according to the cyber security awareness training company, KnowBe4, more than 90% of successful data breaches began with an email tactic called phishing. Phishing is an email scam designed to trick your user into doing some kind of action, like clicking a link or downloading a file, to get access to your organization’s network. Email is a prime target for cyber criminals and it continues to be a necessity in business, even though executive concerns about email security are increasing.

Read More

Share

Blog Feature

Cyber Security | Tech Tips & Trends

Tech Alert: How to Keep a Vigilant Defense Against Increasing Cyber Attacks

By: Accent Computer Solutions
October 28th, 2020

As if we didn’t have enough to deal with during a pandemic, cyber criminals have increased their attempts to take over accounts, invade networks, kidnap data, and generally wreak havoc during 2020.

Read More

Share

Learn how to develop an IT strategy book chapter

Do IT Right: It's Not About The Computers

Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.

Blog Feature

Cyber Security | IT Untangled

IT Untangled: 8 Direct Questions to Uncover Cyber Security Gaps in Your Business

By: Accent Computer Solutions
October 23rd, 2020

You probably know of an organization that has been the victim of a cyber attack because according to the 2020 Verizon Data Breach Report, 28% of all data breaches involved small businesses.

Read More

Share

Blog Feature

Cyber Security

October is National Cyber Security Awareness Month

By: Courtney Casey
October 15th, 2020

When you buy a new device and connect it to the internet, do you think about security? If you’re like most people, your answer is “no” and that’s the reason why this year’s focus for National Cyber Security Awareness Month (NCSAM) is all about the security of connected devices. The objective of this annual campaign, started in 2003 through a collaboration between the U.S. Department of Homeland Security and the National Cyber Security Alliance (NCSA), is to increase attention on individual responsibility for security when using the internet, and the theme for 2020 is “Do Your Part. #BeCyberSmart.”

Read More

Share

Blog Feature

Cyber Security | Tech Girl

5 Simple Cyber Security Tips Every Business Can Implement to Be More Secure Today

By: Courtney Casey
October 9th, 2020

As a business owner or executive, you’re probably investing in some high-tech IT security measures to keep your company’s data safe and out of the wrong hands. What about the simple, low-tech cyber security steps? Unfortunately, sometimes people overlook the simple things they can to do to mitigate the risk of someone getting hold of something that they shouldn’t.

Read More

Share

Blog Feature

Cyber Security

Top 5 Ways Businesses Can Prevent the Most Common Cyber Security Threats

By: Peter O'Campo
September 23rd, 2020

What would you do if you got an email saying your Netflix account was canceled? “Nooooo!” might be the normal reaction, especially now when we’re all spending more time at home. Now imagine that the email tells you that you have to re-submit your billing information. You click. You type. You submit with your info and…you just gave a hacker your credit card number. That’s just one scam that’s making the rounds. As if businesses didn’t already have enough to deal with, online security threats continue to grow and are more prevalent than ever. The FBI reports an astounding 300% increase in the number of reported cybercrimes since COVID-19 hit the US in March. Here at Accent, we’ve seen an increase in cyber attacks first-hand, especially in phishing.

Read More

Share

Blog Feature

Cyber Security | Managed Security Services

What is a Managed Firewall and How Much Does a Managed Firewall Cost?

By: Shantae' Hansen
September 15th, 2020

Imagine that you had a bouncer at the door of your network inspecting all the traffic that wanted to enter. That's what your firewall does. You may not think about your firewall every day, but it's a key layer of your cyber defenses that you need to keep your people, data, and network safe. There are numerous manufacturers and models of firewalls that you can choose from, but if you have the option to lease one from your IT services provider, having a managed firewall might be a better option.

Read More

Share

Blog Feature

Cyber Security

Top 5 Places Businesses Should Use Multi-Factor Authentication

By: Peter O'Campo
September 3rd, 2020

Hackers use sophisticated tools and methods to get access to your information. This can include social engineering and phishing attacks to get access to your systems, or by hacking third-party sites where you enter your credentials. (A major reason not to use the same password for multiple sites). Everyone wants easy access to their files, email, applications, and computer, but that seamless experience can pose a risk.

Read More

Share

Blog Feature

Cyber Security | Network Security

Replacing Your WatchGuard XTM Firewall: How You Benefit When We Standardize

By: Courtney Casey
August 31st, 2020

WatchGuard XTM firewalls are being phased out and if you have one, you’re going to have to replace yours soon. Evaluating your options can be overwhelming with the number of manufacturers and models of firewalls that are available. How do you know which one will best fit your needs?

Read More

Share

Blog Feature

Technology Planning | Cyber Security

Acceptable Use Policy: What Is It, What's Included and Why Is It Important for Businesses?

By: Courtney Casey
August 26th, 2020

Technology is a vital aspect of society and involved in nearly every type of industry and business today. It's hard for most people to go for an hour, let alone a day, without looking at their cellphones. Although the digital explosion has been great for connecting anytime, anywhere, there are inherent security risks involved with technology.

Read More

Share